Crea il mio profilo
Accesso pubblico
Visualizza tutto36 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Christian MainkaRuhr University BochumEmail verificata su rub.de
- Juraj SomorovskyPaderborn UniversityEmail verificata su upb.de
- Tibor JagerUniversity of WuppertalEmail verificata su uni-wuppertal.de
- Sven SchägeEindhoven University of TechnologyEmail verificata su tue.nl
- Albrecht BeutelspacherProfessor für Mathematik, Justus-Liebig-Universität GießenEmail verificata su math.uni-giessen.de
- Nils GruschkaUniversity of Oslo, NorwayEmail verificata su ifi.uio.no
- Marcus NiemietzNiederrhein University of Applied Sciences / Hackmanit GmbHEmail verificata su mniemietz.de
- Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenEmail verificata su unibw.de
- Christopher MeyerReserach Assistant, Horst Görtz Institute for IT-Security, Ruhr-University BochumEmail verificata su rub.de
- Mario HeiderichPhD, Ruhr-University BochumEmail verificata su rub.de
- Paul RöslerFAU Erlangen-NürnbergEmail verificata su fau.de
- Thorsten HolzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Tilman FroschHorst Görtz Institute for IT Security, Ruhr-Universität BochumEmail verificata su rub.de
- Martin GrotheSenior Cyber Security Architect @ EYEmail verificata su rub.de
- Douglas StebilaUniversity of WaterlooEmail verificata su uwaterloo.ca
- Ashar JavedHyundai AutoEver Europe GmbHEmail verificata su hyundai-autoever.eu
- Benjamin DowlingUniversity of SheffieldEmail verificata su sheffield.ac.uk
- Olivier PereiraUCLouvainEmail verificata su uclouvain.be
- Erik TewsUniversity of TwenteEmail verificata su utwente.nl
- Jonas MagaziniusPhD of Computer Science, Chalmers UniversityEmail verificata su assured.se
Segui
Jörg Schwenk
Professor für Netz- und Datensicherheit, Ruhr-Universität Bochum
Email verificata su rub.de