Get my own profile
Public access
View all59 articles
0 articles
available
not available
Based on funding mandates
Co-authors
David DerlerDFINITYVerified email at dfinity.org
Sebastian RamacherScientist, AIT Austrian Institute of TechnologyVerified email at ait.ac.at
Christian HanserSGS Digital Trust ServicesVerified email at sgs.com
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Christoph StriecksAIT Austrian Institute of TechnologyVerified email at ait.ac.at
Henrich C. PöhlsUniversity of PassauVerified email at uni-passau.de
Stephan KrennAIT Austrian Institute of Technology GmbHVerified email at ait.ac.at
Kai SamelinDZ HypVerified email at dzhyp.de
Steven GoldfederCornell TechVerified email at cornell.edu
Thomas LoruenserSenior Scientist, AIT Austrian Institute of TechnologyVerified email at ait.ac.at
Georg FuchsbauerTU WienVerified email at ist.ac.at
Stefan RassFull Professor, LIT Secure and Correct Systems Lab, Johannes Kepler University Linz, AustriaVerified email at jku.at
Claudio OrlandiProfessor, Department of Computer Science, Aarhus University, DenmarkVerified email at cs.au.dk
Raphael SpreitzerSGSVerified email at sgs.com
Behzad AbdolmalekiMax Planck Institute for Security and Privacy, GermanyVerified email at csp.mpg.de
Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
Simone Fischer-HübnerProfessor, Karlstad UniversityVerified email at kau.se
Jan CamenischDFINITYVerified email at dfinity.org
Melissa ChaseMicrosoft ResearchVerified email at microsoft.com
Thomas GroßProfessor of System Security, Newcastle UniversityVerified email at ncl.ac.uk