Get my own profile
Public access
View all18 articles
1 article
available
not available
Based on funding mandates
Co-authors
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Léo DucasCWI, Amsterdam & Leiden University, The NetherlandsVerified email at cwi.nl
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Ingo von MaurichNXP SemiconductorsVerified email at rub.de
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Stefan NürnbergerVeecle GmbHVerified email at veecle.io
Thomas SchneiderProfessor of Computer Science, TU DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
Sven BugielCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Zheng GongProfessor of Computer Science, South China Normal UniversityVerified email at scnu.edu.cn
Francois-Xavier StandaertResearch Director (FNRS-F.R.S), Professor, UCLouvainVerified email at uclouvain.be
Stéphanie KerckhofPhD Student, ELEN, ICTEAM, EPL, Université catholique de Louvain, BelgiumVerified email at uclouvain.be
Marcel WinandySenior Expert Cyber Security Architect at E.ONVerified email at eon.com