Get my own profile
Public access
View all25 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Christian J. DietrichWestphalian UniversityVerified email at cj2s.de
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Herbert BosVrije Universiteit AmsterdamVerified email at cs.vu.nl
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Johannes KruppCISPA, Saarland UniversityVerified email at cispa.saarland
Giancarlo PellegrinoCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Katsunari YoshiokaYokohama National UniversityVerified email at ynu.ac.jp
Giorgi MaisuradzeCISPA, Helmholtz Center for Information SecurityVerified email at cispa.saarland
Ben StockCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Martin JohnsProfessor of Computer Science, TU BraunschweigVerified email at tu-braunschweig.de
Maarten van SteenProfessor of Computer Science, Scientific Director of the Digital Society Institute, U. TwenteVerified email at utwente.nl
Jonas BushartHelmholtz Center for Information Security (CISPA)Verified email at cispa.saarland
D. AndriesseSecurity Researcher at IntelVerified email at few.vu.nl
Chris GrierUniversity of California, BerkeleyVerified email at imchris.org
Vern PaxsonProfessor, EECS, University of California, BerkeleyVerified email at berkeley.edu
Brett Stone-GrossUniversity of California, Santa BarbaraVerified email at cs.ucsb.edu
Daniel PlohmannFraunhofer FKIEVerified email at fkie.fraunhofer.de
Damon McCoyProfessor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
Christian KreibichAn engineer at CorelightVerified email at icir.org
Juan CaballeroResearch Professor, IMDEA Software InstituteVerified email at imdea.org