Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Yves RoudierProfessor, UCA - I3S - CNRS - Université Côte d'AzurVerified email at i3s.unice.fr
Olaf HennigerFraunhofer-GesellschaftVerified email at igd.fraunhofer.de
Timo GendrullisRuhr University Bochum, ESCRYPT, ETAS, BoschVerified email at rub.de
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Ludovic ApvrilleTelecom ParisVerified email at telecom-paris.fr
Sebastian SteinhorstAssociate Professor, Dept. of Computer Engineering, Technical University of MunichVerified email at tum.de
Thomas EisenbarthUniversity of LübeckVerified email at uni-luebeck.de
Jan PelzlProfessor für Cybersecurity, University of Applied Sciences Hamm LippstadtVerified email at hshl.de
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Florian SagstetterResearch AssociateVerified email at tum-create.edu.sg
Samarjit ChakrabortyKenan Professor of Computer Science, The University of North Carolina at Chapel HillVerified email at cs.unc.edu
Alastair RuddleChief Scientist, Vehicle Resilience Technologies, HORIBA MIRA LimitedVerified email at horiba-mira.com
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Axel Y. PoschmannVP of ProductVerified email at pqshield.com
Martin LukasiewyczGoogleVerified email at google.com
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
antonio kungTrialogVerified email at trialog.com
Dries SchellekensCOSIC, KU Leuven, SeptentrioVerified email at esat.kuleuven.be
Lotfi ben OthmaneUniversity of North TexasVerified email at unt.edu