Get my own profile
Public access
View all22 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Daniel GenkinGeorgia TechVerified email at gatech.edu
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Yuval YaromRuhr University BochumVerified email at rub.de
Clémentine MauriceUniv Lille, CNRS, InriaVerified email at inria.fr
Daniel MoghimiGoogleVerified email at google.com
Claudio CanellaAmazon Web ServicesVerified email at amazon.com
Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Anders FoghPrincipal Security Researcher, GDATA Advanced AnalyticsVerified email at gdata-adan.de
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
Raphael SpreitzerSGSVerified email at sgs.com
Marina MinkinUniversity of MichiganVerified email at umich.edu
Andreas KoglerGraz University of TechnologyVerified email at iaik.tugraz.at
Julian StecklinaEngineer at Cyberus TechnologyVerified email at os.inf.tu-dresden.de
Martin SchwarzlGraz University of TechnologyVerified email at iaik.tugraz.at
Jonas JuffingerGraz University of TechnologyVerified email at iaik.tugraz.at
Dmitry EvtyushkinAssistant Professor, William & MaryVerified email at wm.edu
Robert SchillingGraz University of TechnologyVerified email at iaik.tugraz.at