Get my own profile
Public access
View all23 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Daniel GenkinGeorgia TechVerified email at gatech.edu
Yuval YaromThe University of AdelaideVerified email at cs.adelaide.edu.au
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Clémentine MauriceUniv Lille, CNRS, InriaVerified email at inria.fr
Anders FoghPrincipal Security Researcher, GDATA Advanced AnalyticsVerified email at gdata-adan.de
Daniel MoghimiUniversity of California San DiegoVerified email at ucsd.edu
Claudio CanellaGraz University of TechnologyVerified email at iaik.tugraz.at
Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
Raphael SpreitzerSGSVerified email at sgs.com
Marina MinkinUniversity of MichiganVerified email at umich.edu
Julian StecklinaEngineer at Cyberus TechnologyVerified email at os.inf.tu-dresden.de
Martin SchwarzlGraz University of TechnologyVerified email at iaik.tugraz.at
Dmitry EvtyushkinAssistant Professor, William & MaryVerified email at wm.edu
Robert SchillingGraz University of TechnologyVerified email at iaik.tugraz.at
Lukas GinerGraz University of TechnologyVerified email at iaik.tugraz.at
Andreas KoglerGraz University of TechnologyVerified email at iaik.tugraz.at