Crea il mio profilo
Accesso pubblico
Visualizza tutto27 articoli
6 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Prof. Dr. Andreas SchaadUniversity of Applied Sciences OffenburgEmail verificata su hs-offenburg.de
- Florian HahnUniversity of TwenteEmail verificata su utwente.nl
- Martin HärterichResearch Expert, SAP Security ResearchEmail verificata su sap.com
- Nils LukasUniversity of WaterlooEmail verificata su uwaterloo.ca
- Anselme TuenoSAP Security ResearchEmail verificata su sap.com
- Simon OyaThe University of British ColumbiaEmail verificata su ece.ubc.ca
- Benny FuhryIntelEmail verificata su intel.com
- Erik-Oliver BlassSenior Research Scientist, Airbus Senior Expert for Applied CryptographyEmail verificata su airbus.com
- Daniel BernauSAP Security ResearchEmail verificata su sap.com
- Leonardo Weiss Ferreira ChavesSAP Research (ex)Email verificata su teco.edu
- Mikhail AtallahDistinguished Professor of Computer ScienceEmail verificata su cs.purdue.edu
- Richard PibernikProfessor of Logistics, University of WürzburgEmail verificata su uni-wuerzburg.de
- Debmalya BiswasWipro Data Analytics & AIEmail verificata su Wipro.com
- Jonas BöhlerSAP Security ResearchEmail verificata su sap.com
- Alessandro SorniottiIBM Research - ZurichEmail verificata su zurich.ibm.com
- Xinda LiUniversity of WaterlooEmail verificata su uwaterloo.ca
- Christian F. HempelmannTexas A&M University-CommerceEmail verificata su tamuc.edu
- Thomas HumphriesUniversity of WaterlooEmail verificata su uwaterloo.ca
- Ernesto DamianiKhalifa UniversityEmail verificata su ku.ac.ae
- Masoumeh ShafieinejadResearcher at Vector InstituteEmail verificata su uwaterloo.ca