Get my own profile
Public access
View all20 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Daniel SlamanigAIT Austrian Institute of TechnologyVerified email at ait.ac.at
Stephan KrennAIT Austrian Institute of Technology GmbHVerified email at ait.ac.at
David DerlerDFINITYVerified email at dfinity.org
Dennis HofheinzDepartment of Computer Science, ETH ZürichVerified email at inf.ethz.ch
Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
Thomas LoruenserScientist, AIT Austrian Institute of TechnologyVerified email at ait.ac.at
Sebastian RamacherScientist, AIT Austrian Institute of TechnologyVerified email at ait.ac.at
Kai SamelinDräxlmaier GroupVerified email at draexlmaier.com
Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Kai GellertUniversity of WuppertalVerified email at uni-wuppertal.de
Jae Hong SeoAssociate Professor, Hanyang UniversityVerified email at hanyang.ac.kr
Simone Fischer-HübnerProfessor, Karlstad UniversityVerified email at kau.se
Vasenev AlexandrResearcherVerified email at utwente.nl
Peter ChvojkaPhD Student, University of WuppertalVerified email at uni-wuppertal.de
Abida HaquePh.D. Student, North Carolina State UniversityVerified email at ncsu.edu
Fabian EidensPaderborn UniversityVerified email at uni-paderborn.de
Jan BobolzPaderborn UniversityVerified email at jan-bobolz.de
Stefan MarksteinerTechnology Scout Cyber Security, AVL List GmbHVerified email at avl.com
Erkan TairiTU WienVerified email at tuwien.ac.at