Get my own profile
Public access
View all16 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Konrad RieckTechnische Universität BerlinVerified email at tu-berlin.de
- Christian WressneggerKarlsruhe Institute of Technology (KIT)Verified email at kit.edu
- Hugo GascónWIITVerified email at wiit.cloud
- Aylin CaliskanAssistant Professor, University of WashingtonVerified email at uw.edu
- Arvind NarayananProfessor, Princeton UniversityVerified email at cs.princeton.edu
- Rachel GreenstadtComputer Science and Engineering Department, New York UniversityVerified email at nyu.edu
- Rich HarangNVIDIAVerified email at nvidia.com
- Henning PerlFraunhofer FKIE, BonnVerified email at fkie.fraunhofer.de
- Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Jean-Pierre SeifertProfessor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
- Bhargava ShastrySecurity researcherVerified email at ethereum.org
- Clare R. VossARLVerified email at acm.org
- Ben StockCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Tobias FiebigMax-Planck-Institut für Informatik, FG INETVerified email at fiebig.nl
- Anja FeldmannDirektor, Max Planck Institut für Informatik, Saarland Informatics Campus, Saarland UniversityVerified email at mpi-inf.mpg.de