Get my own profile
Public access
View all7 articles
1 article
available
not available
Based on funding mandates
Co-authors
Alexander De LucaGoogleVerified email at google.com
Heinrich HussmannProfessor of Computer Science, Ludwig-Maximilians-Universität MünchenVerified email at ifi.lmu.de
Florian AltUniversität der BundeswehrVerified email at unibw.de
Mohamed KhamisReader (Associate Professor), School of Computing Science, University of GlasgowVerified email at glasgow.ac.uk
Alina HangUniversity of MunichVerified email at ifi.lmu.de
Max-Emanuel MaurerResearch Fellow, University of MunichVerified email at ifi.lmu.de
Katharina KrombholzFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Daniel BuschekUniversity of BayreuthVerified email at uni-bayreuth.de
Marian HarbachGoogle, MunichVerified email at google.com
Christian TiefenauUniversity of BonnVerified email at cs.uni-bonn.de
Andreas BullingProfessor of Computer Science, University of StuttgartVerified email at vis.uni-stuttgart.de
Mariam HassibFortiss GmbHVerified email at fortiss.org
Ceenu GeorgeTU BerlinVerified email at tu-berlin.de
Paul DunphyGenVerified email at gendigital.com
Marcello Paolo ScipioniUniversity of Lugano (USI)Verified email at usi.ch
Marc LangheinrichProfessor, Faculty of Informatics, Università della Svizzera italiana (USI)Verified email at usi.ch
Bernhard SlawikPhD Student, HCI Group at the University of Munich (LMU)Verified email at ifi.lmu.de
Andreas ButzProfessor of Computer Science, University of Munich (LMU)Verified email at ifi.lmu.de
Simon StusakUniversity of Munich (LMU)Verified email at ifi.lmu.de
Sarah TauschUniversity of Munich (LMU)Verified email at ifi.lmu.de