Crea il mio profilo
Accesso pubblico
Visualizza tutto19 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jörn-Marc SchmidtInstitute for Applied Information Processing and Communications, Graz University of TechnologyEmail verificata su iaik.tugraz.at
- Erich WengerInfineon TechnologiesEmail verificata su infineon.com
- Peter SchwabeMPI-SP and Radboud UniversityEmail verificata su mpi-sp.org
- Stefan MangardGraz University of TechnologyEmail verificata su tugraz.at
- Christof PaarMax Planck Institute for Security and Privacy, BochumEmail verificata su rub.de
- Manfred AignerYagoba GmbHEmail verificata su yagoba.com
- Frank K. GürkaynakSenior Scientist, ETH ZurichEmail verificata su ee.ethz.ch
- Honorio Martin GonzalezElectronic Technology Department, Carlos III UniversityEmail verificata su ing.uc3m.es
- Peter PesslInfineon TechnologiesEmail verificata su infineon.com
- Marcel MedwedNXP SemiconductorsEmail verificata su nxp.com
- Barış EgeRiscure B.V.Email verificata su riscure.com
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsEmail verificata su cs.ru.nl
- Amir MoradiTechnische Universität Darmstadt, GermanyEmail verificata su tu-darmstadt.de
- Daniel HeinGraz Universitz of TechnologyEmail verificata su iaik.tugraz.at
- Hannes GrossGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Ivan GudymenkoTU DresdenEmail verificata su tu-dresden.de
- Momtchil PeevHuawei Technologies Duesseldorf GmbHEmail verificata su huawei.com
- Thomas MatyusEmail verificata su aon.at
- Thomas LoruenserSenior Scientist, AIT Austrian Institute of TechnologyEmail verificata su ait.ac.at