Crea il mio profilo
Accesso pubblico
Visualizza tutto13 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Stefan MangardGraz University of TechnologyEmail verificata su tugraz.at
- Daniel GrussGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Clémentine MauriceUniv Lille, CNRS, InriaEmail verificata su inria.fr
- Moritz LippEmail verificata su mlq.me
- Daniel SlamanigProfessor @ Universität der Bundeswehr MünchenEmail verificata su unibw.de
- Hannes GrossGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Veelasha MoonsamyProfessor at Ruhr University Bochum, GermanyEmail verificata su veelasha.org
- Thomas UnterluggauerResearch Scientist, Intel CorporationEmail verificata su intel.com
- Michael SchwarzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Andreas ZanklSecurity Researcher, Fraunhofer AISECEmail verificata su aisec.fraunhofer.de
- Jasmin GrosingerAssociate Professor, Graz University of TechnologyEmail verificata su tugraz.at
- David SchrammelGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Marko HölblAssociate Professor of Computer Science, University of MariborEmail verificata su um.si
- David DerlerDFINITYEmail verificata su dfinity.org
- Olivier BlazyEcole PolytechniqueEmail verificata su polytechnique.edu
- Jörn-Marc SchmidtInstitute for Applied Information Processing and Communications, Graz University of TechnologyEmail verificata su iaik.tugraz.at