Get my own profile
Public access
View all26 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Katharina KohlsRadboud UniversityVerified email at cs.ru.nl
David RupprechtRuhr-University BochumVerified email at rub.de
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Kai JansenPHYSEC GmbHVerified email at physec.de
Kasper RasmussenUniversity of OxfordVerified email at cs.ox.ac.uk
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
Liang NiuNew York UniversityVerified email at nyu.edu
Theodor SchnitzlerResearch Center Trustworthy Data Science and Security and TU DortmundVerified email at tu-dortmund.de
Shujaat MirzaNew York UniversityVerified email at nyu.edu
Evangelos BitsikasPhD Student, Northeastern UniversityVerified email at northeastern.edu
Mathy Vanhoefimec-DistriNet, KU LeuvenVerified email at nyu.edu
Nian XueNew York UniversityVerified email at nyu.edu
Jens B. SchmittProfessor of Computer Science, University of KaiserslauternVerified email at cs.uni-kl.de
Vincent LendersCyber-Defence Campus, armasuisseVerified email at lenders.ch
Matthias SchäferUniversity of KaiserslauternVerified email at cs.uni-kl.de
Merlin ChlostaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Adrian DabrowskiCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Boris DanevDoctor in Computer Science, ETH ZurichVerified email at inf.ethz.ch