Get my own profile
Public access
View all27 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
David RupprechtRuhr-University BochumVerified email at rub.de
Katharina KohlsRadboud UniversityVerified email at cs.ru.nl
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Kai JansenPHYSEC GmbHVerified email at physec.de
Kasper RasmussenUniversity of OxfordVerified email at cs.ox.ac.uk
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
Theodor SchnitzlerResearch Center Trustworthy Data Science and Security and TU DortmundVerified email at tu-dortmund.de
Jens B. SchmittProfessor of Computer Science, University of KaiserslauternVerified email at cs.uni-kl.de
Vincent LendersCyber-Defence Campus, armasuisseVerified email at lenders.ch
Matthias SchäferUniversity of KaiserslauternVerified email at cs.uni-kl.de
Liang NiuNew York UniversityVerified email at nyu.edu
Mathy Vanhoefimec-DistriNet, KU LeuvenVerified email at nyu.edu
Merlin ChlostaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Shujaat MirzaNew York UniversityVerified email at nyu.edu
Evangelos BitsikasPhD Student, Northeastern UniversityVerified email at northeastern.edu
Boris DanevDoctor in Computer Science, ETH ZurichVerified email at inf.ethz.ch
Adrian DabrowskiUniversity of California, IrvineVerified email at uci.edu
Nian XueNew York UniversityVerified email at nyu.edu