Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Léo DucasCWI, Amsterdam, The NetherlandsVerified email at cwi.nl
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Ingo von MaurichNXP SemiconductorsVerified email at rub.de
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Stefan NürnbergerELEXIR AGVerified email at elexir.eu
Thomas SchneiderProfessor of Computer Science, TU DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
Sven BugielCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Zheng GongProfessor of Computer Science, South China Normal UniversityVerified email at scnu.edu.cn
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Stéphanie KerckhofPhD Student, ELEN, ICTEAM, EPL, Université catholique de Louvain, BelgiumVerified email at uclouvain.be
Marcel WinandySenior Expert Cyber Security Architect at E.ONVerified email at eon.com