Get my own profile
Public access
View all30 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Marc FischlinProfessor of Computer Science, Technische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
- Estuardo Alpírez BockAalto UniversityVerified email at aalto.fi
- Arno MittelbachVerified email at arno-mittelbach.de
- Anja LehmannHasso Plattner Institute, University of PotsdamVerified email at hpi.de
- Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
- Markulf KohlweissUniveristy of EdinburghVerified email at ed.ac.uk
- Stefan KatzenbeisserProfessor, Chair of Computer Engineering, University of PassauVerified email at uni-passau.de
- Cédric FournetMicrosoft ResearchVerified email at microsoft.com
- Henrich C. PöhlsUniversity of PassauVerified email at uni-passau.de
- Nigel SmartKU LeuvenVerified email at kuleuven.be
- Kai SamelinDZ HypVerified email at dzhyp.de
- Antoine Delignat-LavaudMicrosoft ResearchVerified email at microsoft.com
- Pooya FarshimIOG Research & Durham UniversityVerified email at durham.ac.uk
- Florian VolkProvadis HochschuleVerified email at florian-volk.net
- Tobias FreudenreichDVS, TU DarmstadtVerified email at dvs.tu-darmstadt.de
- Geoffroy CouteauCNRS Researcher in Theoretical Computer Science, IRIF, Université de ParisVerified email at irif.fr
- Paul BaecherTechnische Universität DarmstadtVerified email at cs.tu-darmstadt.de
- Bertram PoetteringIBM Research Labs - ZurichVerified email at zurich.ibm.com
- Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
- Andreas PeterProfessor, Safety-Security-Interaction Group, Carl von Ossietzky Universität Oldenburg, GermanyVerified email at uol.de