Crea il mio profilo
Accesso pubblico
Visualizza tutto43 articoli
0 articoli*
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesEmail verificata su infineon.com
- Maria EichlsederGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Martin SchläfferInfineon TechnologiesEmail verificata su infineon.com
- Bart MenninkDigital Security Group, Radboud University, NijmegenEmail verificata su cs.ru.nl
- Christian RechbergerGraz University of TechnologyEmail verificata su tugraz.at
- Stefan MangardGraz University of TechnologyEmail verificata su tugraz.at
- Robert PrimasIntel LabsEmail verificata su intel.com
- Tim BeyneCOSIC, KU LeuvenEmail verificata su kuleuven.be
- Thomas UnterluggauerResearch Scientist, Intel CorporationEmail verificata su intel.com
- Hannes GrossGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Andreas HülsingAssociate Professor, Eindhoven University of TechnologyEmail verificata su tue.nl
- Lorenzo GrassiPostDoc at Ruhr University Bochum - Casa (Germany)Email verificata su ruhr-uni-bochum.de
- Stefan KölblGoogleEmail verificata su mailbox.org
- Markus SchofneggerHorizen LabsEmail verificata su alumni.tugraz.at
- Eik ListChair of Media Security, Bauhaus-Universität WeimarEmail verificata su uni-weimar.de
- Yu Long ChenCOSIC-ESAT, KU LeuvenEmail verificata su kuleuven.be
- Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkEmail verificata su polycephaly.org
- Bas WesterbaanResearch Engineer, CloudflareEmail verificata su cloudflare.com
- Gregor LeanderRuhr University BochumEmail verificata su rub.de
- Joan DaemenProfessor, Radboud UniversityEmail verificata su noekeon.org