Get my own profile
Public access
View all32 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Max MühlhäuserProfessor of Computer Science, Technische Universität DarmstadtVerified email at informatik.tu-darmstadt.de
Kai KunzeKeio Media DesignVerified email at kmd.keio.ac.jp
Martin SchmitzSaarland University, Saarland Informatics CampusVerified email at cs.uni-saarland.de
Melanie VolkamerKarlsruher Institut für TechnologieVerified email at kit.edu
Florian MüllerLMU MunichVerified email at um.ifi.lmu.de
Markus FunkCerence Inc.Verified email at cerence.com
Oksana KulykIT University of CopenhagenVerified email at itu.dk
Mohamed KhamisReader (Associate Professor), School of Computing Science, University of GlasgowVerified email at glasgow.ac.uk
Verena ZimmermannAssistant Professor at ETH ZürichVerified email at gess.ethz.ch
Andrii MatviienkoKTH Royal Institute of TechnologyVerified email at kth.se
Thomas KoschProfessor of Computer Science, Humboldt University of BerlinVerified email at hu-berlin.de
Florian AltProfessor of Usable Security at the Bundeswehr University MunichVerified email at unibw.de
Alina StöverTechnical University of DarmstadtVerified email at tu-darmstadt.de
Jan RiemannTU DarmstadtVerified email at tk.tu-darmstadt.de
Sarah PrangeBundeswehr University Munich, LMU MunichVerified email at ifi.lmu.de
Paul GerberTechnische Universität DarmstadtVerified email at psychologie.tu-darmstadt.de
Sebastian GüntherTechnical University of Darmstadt (TU Darmstadt)Verified email at tk.tu-darmstadt.de
Dr. Nina GerberTechnical University of DarmstadtVerified email at tu-darmstadt.de
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
HABIBA FARZANDUniversity of GlasgowVerified email at glasgow.ac.uk
Follow