Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
- Yves RoudierProfessor, UCA - I3S - CNRS - Université Côte d'AzurVerified email at i3s.unice.fr
- Olaf HennigerFraunhofer-GesellschaftVerified email at igd.fraunhofer.de
- Timo GendrullisRuhr University Bochum, ESCRYPT, ETAS, BoschVerified email at rub.de
- Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
- Ludovic ApvrilleTelecom ParisVerified email at telecom-paris.fr
- Sebastian SteinhorstAssociate Professor, Dept. of Computer Engineering, Technical University of MunichVerified email at tum.de
- Thomas EisenbarthUniversity of LübeckVerified email at uni-luebeck.de
- Jan PelzlProfessor für Cybersecurity, University of Applied Sciences Hamm LippstadtVerified email at hshl.de
- Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
- Florian SagstetterResearch AssociateVerified email at tum-create.edu.sg
- Samarjit ChakrabortyKenan Professor of Computer Science, The University of North Carolina at Chapel HillVerified email at cs.unc.edu
- Alastair RuddleChief Scientist, Vehicle Resilience Technologies, HORIBA MIRA LimitedVerified email at horiba-mira.com
- Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
- Axel Y. PoschmannVP of ProductVerified email at pqshield.com
- Martin LukasiewyczGoogleVerified email at google.com
- N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Michael FriedewaldFraunhofer Inst. Syst. & Innov. ResearchVerified email at isi.fraunhofer.de
- antonio kungTrialogVerified email at trialog.com
- Lotfi ben OthmaneUniversity of North TexasVerified email at unt.edu