Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Thomas SchneiderProfessor of Computer Science, TU DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
- N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Jian LiuProfessor at Zhejiang UniversityVerified email at zju.edu.cn
- Daniel GüntherTechnical University of DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
- Benny PinkasBar Ilan University and Aptos LabsVerified email at biu.ac.il
- Kimmo JärvinenXiphera Ltd.Verified email at xiphera.com
- Juliane KrämerProfessor, University of RegensburgVerified email at ur.de
- Zheng YANGSouthwest UniversityVerified email at swu.edu.cn
- Oleksandr TkachenkoSoftware Engineer, DFINITYVerified email at dfinity.org
- Jean-Pierre SeifertProfessor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
- Christian WeinertRoyal Holloway, University of LondonVerified email at rhul.ac.uk
- Cristian-Alexandru StaicuCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Sazzadur RahamanAssistant Professor of Computer Science at The University of ArizonaVerified email at cs.arizona.edu
- Deevashwer RatheeUC BerkeleyVerified email at berkeley.edu
- Tommaso FrassettoBlueRock Security Inc.Verified email at bedrocksystems.com
- Ghada DessoukyTU Darmstadt | GoogleVerified email at trust.tu-darmstadt.de
- Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de