Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Konrad RieckProfessor of Computer Science, TU BraunschweigVerified email at tu-bs.de
Daniel ArpTechnische Universität BraunschweigVerified email at tu-bs.de
Christian WressneggerKarlsruhe Institute of Technology (KIT)Verified email at kit.edu
Hugo GascónDCSO Deutsche Cyber-Sicherheitsorganisation GmbHVerified email at dcso.de
Aylin CaliskanAssistant Professor of Computer Science, The George Washington UniversityVerified email at gwu.edu
Arvind NarayananAssociate Professor, Princeton UniversityVerified email at cs.princeton.edu
Rachel GreenstadtComputer Science and Engineering Department, New York UniversityVerified email at nyu.edu
Rich HarangSophosVerified email at sophos.com
Jean-Pierre SeifertProfessor for Computer & Communication Security, TU Berlin & T-LabsVerified email at sec.t-labs.tu-berlin.de
Clare R. VossARLVerified email at acm.org
Henning PerlFraunhofer FKIE, BonnVerified email at fkie.fraunhofer.de
Sascha FahlCISPA Helmholtz Center for Information Security and Leibniz University Hannover, GermanyVerified email at cispa.de
Ben StockCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Tobias FiebigTU DelftVerified email at tudelft.nl
Anja FeldmannDirektor, Max Planck Institut für Informatik, Saarland Informatics Campus, Saarland UniversityVerified email at mpi-inf.mpg.de
Bhargava ShastrySecurity researcher