Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Markus KrauszRuhr-University BochumVerified email at rub.de
Gregor LeanderRuhr University BochumVerified email at rub.de
Lucas Vincenzo DaviUniversity of Duisburg-EssenVerified email at uni-due.de
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Dominic A. FunkeInstitute for Integrated Systems, Ruhr University BochumVerified email at rub.de
Nils PohlRuhr-Universität Bochum, Fraunhofer FHRVerified email at rub.de
Ming-Shing ChenAcademia SiniceVerified email at crypto.tw
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
Rei UenoKyoto UniversityVerified email at kyoto-u.ac.jp
Pascal SasdrichChair for Security Engineering, Ruhr-Universität Bochum, GermanyVerified email at rub.de
Pascal CotretResearch scientistVerified email at ensta-bretagne.fr
Vianney LapotreAssociate professor / Lab-STICCVerified email at univ-ubs.fr
Guy GOGNIATProfessor, Université Bretagne SudVerified email at univ-ubs.fr
Nicolas GaudinPhD student, Université de Bretagne Sud, Lab-STICC, FranceVerified email at univ-ubs.fr
Moritz PetersRuhr-Universität BochumVerified email at rub.de
Rebecca PelkeRWTH Aachen UniversityVerified email at ice.rwth-aachen.de
Felix StaudiglRWTH Aachen UniversityVerified email at ice.rwth-aachen.de
Georg LandRuhr-Universität BochumVerified email at ruhr-uni-bochum.de