Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Konrad RieckTechnische Universität BerlinVerified email at tu-berlin.de
Hugo GascónGerman Edge Cloud, ICAI School of EngineeringVerified email at gec.io
Christian WressneggerKarlsruhe Institute of Technology (KIT)Verified email at kit.edu
Aylin CaliskanAssistant Professor, University of WashingtonVerified email at uw.edu
Arvind NarayananAssociate Professor, Princeton UniversityVerified email at cs.princeton.edu
Rachel GreenstadtComputer Science and Engineering Department, New York UniversityVerified email at nyu.edu
Rich HarangNVIDIAVerified email at nvidia.com
Henning PerlFraunhofer FKIE, BonnVerified email at fkie.fraunhofer.de
Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Jean-Pierre SeifertProfessor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
Clare R. VossARLVerified email at acm.org
Ben StockCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Tobias FiebigMax-Planck-Institut für Informatik, FG INETVerified email at fiebig.nl
Anja FeldmannDirektor, Max Planck Institut für Informatik, Saarland Informatics Campus, Saarland UniversityVerified email at mpi-inf.mpg.de
Bhargava ShastrySecurity researcher