Get my own profile
Public access
View all37 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jörg SchwenkProfessor für Netz- und Datensicherheit, Ruhr-Universität BochumVerified email at rub.de
Dennis HofheinzDepartment of Computer Science, ETH ZürichVerified email at inf.ethz.ch
Sven SchägeEindhoven University of TechnologyVerified email at tue.nl
Juraj SomorovskyPaderborn UniversityVerified email at upb.de
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
Christoph StriecksAIT Austrian Institute of TechnologyVerified email at ait.ac.at
Andy RuppUniversity of LuxembourgVerified email at rub.de
Sebastian LauerRuhr-Universität BochumVerified email at rub.de
Felix GüntherPostdoc, ETH ZurichVerified email at inf.ethz.ch
Nils FleischhackerAssistant Professor, Ruhr-University BochumVerified email at rub.de
Dominique SchröderFull Professor, Computer Science, Friedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
Edward KnappUniversity of WaterlooVerified email at uwaterloo.ca
Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
Sebastian GajekProfessor of Information Security and Cryptography, Flensburg University of Applied SciencesVerified email at hs-flensburg.de
Victor ShoupPrincipal Researcher, DFINITY; Professor, NYU (on leave)Verified email at dfinity.org
Jae Hong SeoAssociate Professor, Hanyang UniversityVerified email at hanyang.ac.kr
Dakshita KhuranaUniversity of Illinois Urbana-ChampaignVerified email at illinois.edu
Martin GrotheSenior Cyber Security Architect @ EYVerified email at rub.de