Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Michael RolandJohannes Kepler University Linz, Institute of Networks and SecurityVerified email at ins.jku.at
- Rainhard Dieter FindlingFormer Researcher in the Ambient Intelligence Group, Aalto UniversityVerified email at aalto.fi
- Muhammad MuaazResearcherVerified email at uia.no
- Hans GellersenProfessor of Interactive Systems, Lancaster University and Aarhus UniversityVerified email at cs.au.dk
- Alois FerschaProfessor of Computer Science, JKUVerified email at jku.at
- Daniel HintzeGoogleVerified email at hintze-it.de
- Bogdan GrozaPolitehnica University of TimisoaraVerified email at aut.upt.ro
- Eckhard KochProfessor & Dekan für Informatik, Fachhochschule der WirtschaftVerified email at fhdw.de
- Andreas AichhornResearch and Development / Company Sprecher AutomationVerified email at sprecher-automation.com
- Philipp HoferJohannes Kepler University, Institute of Networks and SecurityVerified email at ins.jku.at
- Michael AffenzellerUniversity of Applied Sciences Upper AustriaVerified email at fh-ooe.at
- Iulia IonGoogleVerified email at google.com
- Mike HazasProfessor, Uppsala UniversityVerified email at it.uu.se
- Clemens HolzmannUniversity of Applied Sciences Upper AustriaVerified email at fh-hagenberg.at
- Adriana BerdichPolitehnica University of TimisoaraVerified email at aut.upt.ro
- Stephan SiggAalto UniversityVerified email at aalto.fi
- Bernhard EtzlingerResearcher, Johannes Kepler University LinzVerified email at jku.at
- Jürgen Fuß (Ecker)Professor of Applied Mathematics and CryptographyVerified email at fh-hagenberg.at
- Manuel RiggerNational University of SingaporeVerified email at comp.nus.edu.sg
- Andreas MöllerTechnische Universität MünchenVerified email at tum.de