Crea il mio profilo
Accesso pubblico
Visualizza tutto16 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Lucas Vincenzo DaviUniversity of Duisburg-EssenEmail verificata su uni-due.de
- Marcel WinandySenior Expert Cyber Security Architect at E.ONEmail verificata su eon.com
- Stephan HeuserIntelEmail verificata su heuser.ws
- Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Sven BugielCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- N. AsokanProfessor of Computer Science, University of WaterlooEmail verificata su uwaterloo.ca
- Stefan NürnbergerELEXIR AGEmail verificata su elexir.eu
- Bhargava ShastrySecurity researcherEmail verificata su ethereum.org
- Fabian MonroseProfessor, ECE, Georgia Institute of TechnologyEmail verificata su ece.gatech.edu
- Christian WachsmannIntel CorporationEmail verificata su intel.com
- Thorsten HolzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Manuel EgeleBoston UniversityEmail verificata su bu.edu
- Ralf HundRuhr-Universität BochumEmail verificata su rub.de
- Stephen CheckowayAssociate Professor at Oberlin CollegeEmail verificata su oberlin.edu
- Hovav ShachamProfessor of Computer Science, The University of Texas at AustinEmail verificata su cs.utexas.edu
- Christian RossowCISPA – Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
- Thomas SchneiderProfessor of Computer Science, TU DarmstadtEmail verificata su encrypto.cs.tu-darmstadt.de
- Moti YungDistinguished Research Scientist Google; Adjunct Research Prof. Columbia U.Email verificata su cs.columbia.edu
- Marcin NagyPhD student, Aalto University, FinlandEmail verificata su avsystem.com
- Sandeep TamrakarPhD Candidate, Aalto UniverisityEmail verificata su aalto.fi