Get my own profile
Public access
View all31 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Yasemin AcarPaderborn University & The George Washington UniversityVerified email at sec.uni-hannover.de
- Christian StranskyKKH Kaufmännische KrankenkasseVerified email at sec.uni-hannover.de
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Dominik WermkeNC State UniversityVerified email at ncsu.edu
- Nicolas HuamanLeibniz University HannoverVerified email at sec.uni-hannover.de
- Michelle L. MazurekAssociate Professor, University of MarylandVerified email at umd.edu
- Henning PerlFraunhofer FKIE, BonnVerified email at fkie.fraunhofer.de
- Doowon KimUniversity of Tennessee, KnoxvilleVerified email at utk.edu
- Jan H. KlemmerCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Sven BugielCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Bernd FreislebenProfessor of Computer Science, University of Marburg, GermanyVerified email at informatik.uni-marburg.de
- Florian SchaubUniversity of MichiganVerified email at umich.edu
- Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Felix FischerChair of Cyber Trust, Technical University of MunichVerified email at tum.de
- Alexander KrauseCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Simson GarfinkelBasisTech, LLCVerified email at acm.org
- Fabian YamaguchiWhirly Labs (Pty) Ltd, Qwiet.AI, Stellenbosch UniversityVerified email at codeminers.org
- Konrad RieckTechnische Universität BerlinVerified email at tu-berlin.de
- Elissa M. RedmilesClare Luce Boothe Assistant Professor, Georgetown UniversityVerified email at georgetown.edu
- Joseph BonneauNew York UniversityVerified email at cs.nyu.edu