Get my own profile
Public access
View all37 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Christian MainkaRuhr University BochumVerified email at rub.de
- Juraj SomorovskyPaderborn UniversityVerified email at upb.de
- Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
- Sven SchägeEindhoven University of TechnologyVerified email at tue.nl
- Albrecht BeutelspacherProfessor für Mathematik, Justus-Liebig-Universität GießenVerified email at math.uni-giessen.de
- Nils GruschkaProfessor, University of Oslo, NorwayVerified email at ifi.uio.no
- Marcus NiemietzNiederrhein University of Applied Sciences / Hackmanit GmbHVerified email at mniemietz.de
- Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
- Christopher MeyerReserach Assistant, Horst Görtz Institute for IT-Security, Ruhr-University BochumVerified email at rub.de
- Mario HeiderichPhD, Ruhr-University BochumVerified email at rub.de
- Paul RöslerFAU Erlangen-NürnbergVerified email at fau.de
- Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Martin GrotheSenior Cyber Security Architect @ EYVerified email at rub.de
- Tilman FroschHorst Görtz Institute for IT Security, Ruhr-Universität BochumVerified email at rub.de
- Douglas StebilaUniversity of WaterlooVerified email at uwaterloo.ca
- Ashar JavedHyundai AutoEver Europe GmbHVerified email at hyundai-autoever.eu
- Benjamin DowlingKing's College LondonVerified email at kcl.ac.uk
- Olivier PereiraUCLouvainVerified email at uclouvain.be
- Erik TewsUniversity of TwenteVerified email at utwente.nl
- Jens-Matthias BohliHochschule MannheimVerified email at hs-mannheim.de
Follow
Jörg Schwenk
Professor für Netz- und Datensicherheit, Ruhr-Universität Bochum
Verified email at rub.de