Get my own profile
Public access
View all29 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Raoul StrackxFortanixVerified email at fortanix.com
Yuval YaromRuhr University BochumVerified email at rub.de
Daniel GenkinGeorgia TechVerified email at gatech.edu
Marina MinkinUniversity of MichiganVerified email at umich.edu
Jan Tobias MuehlbergResearcher in Computer Science, KU Leuven, BelgiumVerified email at cs.kuleuven.be
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Moritz LippVerified email at mlq.me
Daniel MoghimiGoogleVerified email at google.com
Thomas F. WenischProf. of CSE, University of MichiganVerified email at umich.edu
Mark SilbersteinAssociate Professor, Technion, IsraelVerified email at ee.technion.ac.il
Baris KasikciUniversity of MichiganVerified email at umich.edu
Ofir WeisseUniversity of MichiganVerified email at umich.edu
David OswaldSecurity and Privacy Group, University of BirminghamVerified email at bham.ac.uk
Flavio D. GarciaProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
Claudio CanellaVerified email at iaik.tugraz.at
Julian StecklinaEngineer at Cyberus TechnologyVerified email at os.inf.tu-dresden.de
Rüdiger KapitzaFriedrich-Alexander-Universität Erlangen-NürnbergVerified email at cs.fau.de
Nico WeichbrodtTU Braunschweig, IBRVerified email at ibr.cs.tu-bs.de