Crea il mio profilo
Accesso pubblico
Visualizza tutto26 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Katharina KohlsRuhr University BochumEmail verificata su rub.de
- David RupprechtRuhr-University BochumEmail verificata su rub.de
- Thorsten HolzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Kai JansenPHYSEC GmbHEmail verificata su physec.de
- Kasper RasmussenUniversity of OxfordEmail verificata su cs.ox.ac.uk
- Shujaat MirzaNew York UniversityEmail verificata su nyu.edu
- Markus DürmuthProfessor for IT Security, Leibniz University HannoverEmail verificata su itsec.uni-hannover.de
- Theodor SchnitzlerAssistant Professor at Maastricht UniversityEmail verificata su maastrichtuniversity.nl
- Liang NiuNew York UniversityEmail verificata su nyu.edu
- Mathy VanhoefDistriNet, KU LeuvenEmail verificata su kuleuven.be
- Evangelos BitsikasPhD Student, Northeastern UniversityEmail verificata su northeastern.edu
- Nian XueNew York UniversityEmail verificata su nyu.edu
- Jens B. SchmittProfessor of Computer Science, University of KaiserslauternEmail verificata su cs.uni-kl.de
- Vincent LendersCyber-Defence Campus, armasuisseEmail verificata su lenders.ch
- Matthias SchäferUniversity of KaiserslauternEmail verificata su cs.uni-kl.de
- Merlin ChlostaCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Adrian DabrowskiCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Boris DanevDoctor in Computer Science, ETH ZurichEmail verificata su inf.ethz.ch