Get my own profile
Public access
View all24 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Daniel SlamanigProfessor @ Universität der Bundeswehr MünchenVerified email at unibw.de
- Stephan KrennAIT Austrian Institute of Technology GmbHVerified email at ait.ac.at
- David DerlerDFINITYVerified email at dfinity.org
- Sebastian RamacherScientist, AIT Austrian Institute of TechnologyVerified email at ait.ac.at
- Dennis HofheinzDepartment of Computer Science, ETH ZürichVerified email at inf.ethz.ch
- Thomas LoruenserSenior Scientist, AIT Austrian Institute of TechnologyVerified email at ait.ac.at
- Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
- Kai SamelinDZ HypVerified email at dzhyp.de
- Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Kai GellertUniversity of WuppertalVerified email at uni-wuppertal.de
- Erkan TairiENS ParisVerified email at ens.fr
- Peter ChvojkaPhD Student, University of WuppertalVerified email at uni-wuppertal.de
- Jae Hong SeoAssociate Professor, Hanyang UniversityVerified email at hanyang.ac.kr
- Simone Fischer-HübnerProfessor, Karlstad UniversityVerified email at kau.se
- Vasenev AlexandrResearcherVerified email at utwente.nl
- Fabian EidensPaderborn UniversityVerified email at uni-paderborn.de
- Jan BobolzUniversity of EdinburghVerified email at jan-bobolz.de
- Abida Haqueassistant teaching professor, North Carolina State UniversityVerified email at ncsu.edu
- Paul RöslerFAU Erlangen-NürnbergVerified email at fau.de
- Stefan MarksteinerTechnology Scout Cyber Security, AVL List GmbHVerified email at avl.com