Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Thomas SchneiderProfessor of Computer Science, TU DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Jian LiuProfessor at Zhejiang UniversityVerified email at zju.edu.cn
Daniel GüntherTechnical University of DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
Benny PinkasBar Ilan UniversityVerified email at biu.ac.il
Juliane KrämerProfessor, University of RegensburgVerified email at ur.de
Kimmo JärvinenXiphera Ltd.Verified email at xiphera.com
Zheng YANGSouthwest UniversityVerified email at swu.edu.cn
Oleksandr TkachenkoSoftware Engineer, DFINITYVerified email at dfinity.org
Jean-Pierre SeifertEinstein Professor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
Christian WeinertRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Deevashwer RatheeUC BerkeleyVerified email at berkeley.edu
Cristian-Alexandru StaicuCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Sazzadur RahamanAssistant Professor of Computer Science at The University of ArizonaVerified email at cs.arizona.edu
Tommaso FrassettoBlueRock Security Inc.Verified email at bedrocksystems.com
Ghada DessoukyTU Darmstadt | GoogleVerified email at trust.tu-darmstadt.de
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de