Get my own profile
Public access
View all7 articles
1 article
available
not available
Based on funding mandates
Co-authors
Alexander De LucaGoogleVerified email at google.com
Heinrich HussmannProfessor of Computer Science, Ludwig-Maximilians-Universität MünchenVerified email at ifi.lmu.de
Florian AltProfessor of Usable Security at the Bundeswehr University MunichVerified email at unibw.de
Mohamed KhamisReader (Associate Professor), School of Computing Science, University of GlasgowVerified email at glasgow.ac.uk
Alina HangUniversity of MunichVerified email at ifi.lmu.de
Max-Emanuel MaurerResearch Fellow, University of MunichVerified email at ifi.lmu.de
Marian HarbachGoogle, MunichVerified email at google.com
Daniel BuschekUniversity of BayreuthVerified email at uni-bayreuth.de
Katharina KrombholzFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Andreas BullingProfessor of Computer Science, University of StuttgartVerified email at vis.uni-stuttgart.de
Christian TiefenauUniversity of BonnVerified email at cs.uni-bonn.de
Mariam HassibFortiss GmbHVerified email at fortiss.org
Ceenu GeorgeVisiting Professor, University of AugsburgVerified email at ifi.lmu.de
Marcello Paolo ScipioniUniversity of Lugano (USI)Verified email at usi.ch
Marc LangheinrichProfessor, Faculty of Informatics, Università della Svizzera italiana (USI)Verified email at usi.ch
Elisa RubegniAssistant Professor, Lancaster University, UKVerified email at rubegni.it
Paul DunphyGenVerified email at gendigital.com
Bernhard SlawikPhD Student, HCI Group at the University of Munich (LMU)Verified email at ifi.lmu.de
Andreas ButzProfessor of Computer Science, University of Munich (LMU)Verified email at ifi.lmu.de
Simon StusakUniversity of Munich (LMU)Verified email at ifi.lmu.de