Get my own profile
Public access
View all34 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
- Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
- Raoul StrackxFortanixVerified email at fortanix.com
- Jan Tobias MuehlbergProf. for Embedded Systems Security, Universite Libre de Bruxelles, BelgiumVerified email at ulb.be
- Yuval YaromRuhr University BochumVerified email at rub.de
- Daniel GenkinGeorgia TechVerified email at gatech.edu
- Marina MinkinUniversity of MichiganVerified email at umich.edu
- Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Moritz LippVerified email at mlq.me
- Daniel MoghimiSenior Research Scientist, GoogleVerified email at google.com
- Mark SilbersteinProfessor, Technion, IsraelVerified email at ee.technion.ac.il
- David OswaldSecurity and Privacy Group, University of BirminghamVerified email at bham.ac.uk
- Thomas F. WenischProf. of CSE, University of MichiganVerified email at umich.edu
- Ofir WeisseUniversity of MichiganVerified email at umich.edu
- Flavio D. GarciaProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
- Claudio CanellaAmazon Web ServicesVerified email at amazon.com
- Julian StecklinaEngineer at Cyberus TechnologyVerified email at os.inf.tu-dresden.de
- Rüdiger KapitzaFriedrich-Alexander-Universität Erlangen-NürnbergVerified email at cs.fau.de
- Nico WeichbrodtTU Braunschweig, IBRVerified email at ibr.cs.tu-bs.de