Get my own profile
Public access
View all22 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Daniel GenkinGeorgia TechVerified email at gatech.edu
Yuval YaromRuhr University BochumVerified email at rub.de
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Clémentine MauriceCNRSVerified email at cnrs.fr
Daniel MoghimiSenior Research Scientist, GoogleVerified email at google.com
Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Claudio CanellaAmazon Web ServicesVerified email at amazon.com
Anders FoghPrincipal Security Researcher, GDATA Advanced AnalyticsVerified email at gdata-adan.de
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
Andreas KoglerGraz University of TechnologyVerified email at iaik.tugraz.at
Marina MinkinUniversity of MichiganVerified email at umich.edu
Raphael SpreitzerSGSVerified email at sgs.com
Martin SchwarzlGraz University of TechnologyVerified email at iaik.tugraz.at
Julian StecklinaEngineer at Cyberus TechnologyVerified email at os.inf.tu-dresden.de
Jonas JuffingerGraz University of TechnologyVerified email at iaik.tugraz.at
Robert SchillingRivos Inc.Verified email at rivosinc.com
Dmitry EvtyushkinAssistant Professor, William & MaryVerified email at wm.edu