Get my own profile
Co-authors
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Lucas Vincenzo DaviUniversity of Duisburg-EssenVerified email at uni-due.de
Alexandra DmitrienkoWürzburg UniversityVerified email at uni-wuerzburg.de
Sebastian GajekProfessor of Information Security and Cryptography, Flensburg University of Applied SciencesVerified email at hs-flensburg.de
Stephen CheckowayAssociate Professor at Oberlin CollegeVerified email at oberlin.edu
Hovav ShachamProfessor of Computer Science, The University of Texas at AustinVerified email at cs.utexas.edu
Luigi CatuognoDipartimento di Informatica, Università degli Studi di Salerno, ITALYVerified email at dia.unisa.it
Thomas SchneiderProfessor of Computer Science, TU DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
Christian WachsmannIntel CorporationVerified email at intel.com
Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
Thomas HupperichEuropean Research Center for Information Systems, University Münster, GermanyVerified email at ercis.de
Armin CremersProfessor of Computer Science, University of BonnVerified email at iai.uni-bonn.de
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Teemu RytilahtiRuhr University BochumVerified email at rub.de
Davide MaiorcaAssociate Professor of Computer Engineering at University of Cagliari, ItalyVerified email at unica.it
Kari KostiainenSenior Scientist at ETH ZurichVerified email at inf.ethz.ch
Sven BugielCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Angelo LiguoriUniversità degli Studi Roma TreVerified email at uniroma3.it
Claire VishikIntelVerified email at intel.com
Felix GröbertGoogleVerified email at groebert.org