Get my own profile
Public access
View all42 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Jörg SchwenkProfessor für Netz- und Datensicherheit, Ruhr-Universität BochumVerified email at rub.de
- Dennis HofheinzDepartment of Computer Science, ETH ZürichVerified email at inf.ethz.ch
- Sven SchägeEindhoven University of TechnologyVerified email at tue.nl
- Kai GellertUniversity of WuppertalVerified email at uni-wuppertal.de
- Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
- Juraj SomorovskyPaderborn UniversityVerified email at upb.de
- Christoph StriecksAIT Austrian Institute of TechnologyVerified email at ait.ac.at
- Denis DiemertUniversity of WuppertalVerified email at uni-wuppertal.de
- Kristian GjøsteenNTNUVerified email at ntnu.no
- Andy RuppUniversity of LuxembourgVerified email at rub.de
- Daniel SlamanigProfessor @ Universität der Bundeswehr MünchenVerified email at unibw.de
- Saqib A. KakviRoyal Holloway, University of LondonVerified email at rhul.ac.uk
- Sebastian LauerZF AGVerified email at rub.de
- Britta HaleNPSVerified email at nps.edu
- Peter ChvojkaPhD Student, University of WuppertalVerified email at uni-wuppertal.de
- Nils FleischhackerAssistant Professor, Ruhr University BochumVerified email at rub.de
- Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
- Felix GüntherIBM Research - ZurichVerified email at zurich.ibm.com
- David DerlerDFINITYVerified email at dfinity.org
- Lin LyuBergische Universität WuppertalVerified email at uni-wuppertal.de