Get my own profile
Public access
View all14 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
- Emmanuel StapfSANCTUARY Systems GmbHVerified email at sanctuary.dev
- Tommaso FrassettoBlueRock Security Inc.Verified email at bedrocksystems.com
- Ferdinand BrasserSANCTUARY Systems GmbHVerified email at sanctuary.dev
- Ghada DessoukyTU Darmstadt | GoogleVerified email at trust.tu-darmstadt.de
- Christian WeinertRoyal Holloway, University of LondonVerified email at rhul.ac.uk
- Thomas SchneiderProfessor of Computer Science, TU DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
- Korbinian RiedhammerTechnische Hochschule NürnbergVerified email at ieee.org
- Sebastian FaustTU DarmstadtVerified email at cs.tu-darmstadt.de
- Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Lisa EckeyVerified email at crisp-da.de
- Poulami DasLeast AuthorityVerified email at leastauthority.com
- Kristina HostákováETH ZürichVerified email at inf.ethz.ch
- Christopher LiebchenTechnische Universität DarmstadtVerified email at google.com
- Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl