Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Christina PöpperNew York University Abu DhabiEmail verificata su nyu.edu
- Jens B. SchmittProfessor of Computer Science, University of KaiserslauternEmail verificata su cs.uni-kl.de
- Vincent LendersCyber-Defence Campus, armasuisseEmail verificata su lenders.ch
- Matthias SchäferUniversity of KaiserslauternEmail verificata su cs.uni-kl.de
- David RupprechtRuhr-University BochumEmail verificata su rub.de
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Katharina KohlsRuhr University BochumEmail verificata su rub.de
- Thorsten HolzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Christof PaarMax Planck Institute for Security and Privacy, BochumEmail verificata su rub.de
- Paul StaatMax Planck Institute for Security and PrivacyEmail verificata su csp.mpg.de
- Ivan MartinovicProfessor of Computer Science, University of Oxford, UKEmail verificata su cs.ox.ac.uk
- Nian XueNew York UniversityEmail verificata su nyu.edu
- Liang NiuNew York UniversityEmail verificata su nyu.edu