Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Clémentine MauriceUniv Lille, CNRS, InriaVerified email at inria.fr
Moritz LippGraz University of TechnologyVerified email at iaik.tugraz.at
Daniel SlamanigAIT Austrian Institute of TechnologyVerified email at ait.ac.at
Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
Veelasha MoonsamyTenured Research Faculty at Ruhr University Bochum, GermanyVerified email at veelasha.org
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Andreas ZanklSecurity Researcher, Fraunhofer AISECVerified email at aisec.fraunhofer.de
Jasmin GrosingerAssociate Professor, Institute of Microwave and Photonic Engineering, Graz University of TechnologyVerified email at tugraz.at
Marko HölblAssistant Professor of Computer Science, University of MariborVerified email at um.si
David DerlerDFINITYVerified email at dfinity.org
Olivier BlazyEcole PolytechniqueVerified email at polytechnique.edu
David SchrammelGraz University of TechnologyVerified email at iaik.tugraz.at
Jörn-Marc SchmidtInstitute for Applied Information Processing and Communications, Graz University of TechnologyVerified email at iaik.tugraz.at