Get my own profile
Public access
View all55 articles
1 article
available
not available
Based on funding mandates
Co-authors
David DerlerDFINITYVerified email at dfinity.org
Sebastian RamacherScientist, AIT Austrian Institute of TechnologyVerified email at ait.ac.at
Christian HanserSGS Digital Trust ServicesVerified email at sgs.com
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Christoph StriecksAIT Austrian Institute of TechnologyVerified email at ait.ac.at
Henrich C. PöhlsUniversity of PassauVerified email at uni-passau.de
Stephan KrennAIT Austrian Institute of Technology GmbHVerified email at ait.ac.at
Kai SamelinDräxlmaier GroupVerified email at draexlmaier.com
Thomas LoruenserScientist, AIT Austrian Institute of TechnologyVerified email at ait.ac.at
Steven GoldfederCornell TechVerified email at cornell.edu
Georg FuchsbauerTU WienVerified email at ist.ac.at
Stefan RassFull Professor, LIT Secure and Correct Systems Lab, Johannes Kepler University Linz, AustriaVerified email at jku.at
Claudio OrlandiAssociate Professor, Department of Computer Science, Aarhus University, DenmarkVerified email at cs.au.dk
Raphael SpreitzerSGSVerified email at sgs.com
Behzad AbdolmalekiMax Planck Institute for Security and Privacy, GermanyVerified email at csp.mpg.de
Simone Fischer-HübnerProfessor, Karlstad UniversityVerified email at kau.se
Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
Jan CamenischDFINITYVerified email at dfinity.org
Melissa ChaseMicrosoft ResearchVerified email at microsoft.com
Thomas GroßReader in System Security, Newcastle UniversityVerified email at ncl.ac.uk