Crea il mio profilo
Coautori
- Ahmad-Reza SadeghiTechnische Universität DarmstadtEmail verificata su trust.tu-darmstadt.de
- Lucas Vincenzo DaviUniversity of Duisburg-EssenEmail verificata su uni-due.de
- Alexandra DmitrienkoWürzburg UniversityEmail verificata su uni-wuerzburg.de
- Sebastian GajekProfessor of Information Security and Cryptography, Flensburg University of Applied SciencesEmail verificata su hs-flensburg.de
- Stephen CheckowayAssociate Professor at Oberlin CollegeEmail verificata su oberlin.edu
- Hovav ShachamProfessor of Computer Science, The University of Texas at AustinEmail verificata su cs.utexas.edu
- Luigi CatuognoDipartimento di Informatica, Università degli Studi di Salerno, ITALYEmail verificata su dia.unisa.it
- Thomas SchneiderProfessor of Computer Science, TU DarmstadtEmail verificata su encrypto.cs.tu-darmstadt.de
- Christian WachsmannIntel CorporationEmail verificata su intel.com
- Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenEmail verificata su unibw.de
- Thomas HupperichEuropean Research Center for Information Systems, University Münster, GermanyEmail verificata su ercis.de
- Armin CremersProfessor of Computer Science, University of BonnEmail verificata su iai.uni-bonn.de
- Thorsten HolzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Teemu RytilahtiRuhr University BochumEmail verificata su rub.de
- Davide MaiorcaAssistant Professor of Computer Engineering at University of Cagliari, ItalyEmail verificata su unica.it
- Kari KostiainenSenior Scientist at ETH ZurichEmail verificata su inf.ethz.ch
- Sven BugielCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Adrian SpalkaEmail verificata su spalka.com
- Angelo LiguoriUniversità degli Studi Roma TreEmail verificata su uniroma3.it
- Claire VishikIntelEmail verificata su intel.com