Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
Rainhard Dieter FindlingFormer Researcher in the Ambient Intelligence Group, Aalto UniversityVerified email at aalto.fi
Michael RolandJohannes Kepler University Linz, Institute of Networks and SecurityVerified email at ins.jku.at
Muhammad MuaazResearcherVerified email at uia.no
Hans GellersenProfessor of Interactive Systems, Lancaster University and Aarhus UniversityVerified email at cs.au.dk
Alois FerschaProfessor of Computer Science, JKUVerified email at jku.at
Daniel HintzeGoogleVerified email at hintze-it.de
Bogdan GrozaPolitehnica University of TimisoaraVerified email at aut.upt.ro
Eckhard KochProfessor & Dekan für Informatik, Fachhochschule der WirtschaftVerified email at fhdw.de
Andreas AichhornResearch and Development / Company Sprecher AutomationVerified email at sprecher-automation.com
Iulia IonGoogleVerified email at google.com
Mike HazasProfessor, Uppsala UniversityVerified email at it.uu.se
Clemens HolzmannUniversity of Applied Sciences Upper AustriaVerified email at fh-hagenberg.at
Adriana BerdichPolitehnica University of TimisoaraVerified email at aut.upt.ro
Michael AffenzellerUniversity of Applied Sciences Upper AustriaVerified email at fh-ooe.at
Philipp HoferJohannes Kepler University, Institute of Networks and SecurityVerified email at ins.jku.at
Bernhard EtzlingerResearcher, Johannes Kepler University LinzVerified email at jku.at
Stephan SiggAssociate Professor, Aalto UniversityVerified email at aalto.fi
Jürgen Fuß (Ecker)Professor of Applied Mathematics and CryptographyVerified email at fh-hagenberg.at
Manuel RiggerNational University of SingaporeVerified email at comp.nus.edu.sg
Andreas MöllerTechnische Universität MünchenVerified email at tum.de