Get my own profile
Public access
View all15 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Emmanuel StapfSANCTUARY Systems GmbHVerified email at sanctuary.dev
Tommaso FrassettoBlueRock Security Inc.Verified email at bedrocksystems.com
Ferdinand BrasserSANCTUARY Systems GmbHVerified email at sanctuary.dev
Ghada DessoukyTU Darmstadt | GoogleVerified email at trust.tu-darmstadt.de
Christian WeinertRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Thomas SchneiderProfessor of Computer Science, TU DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
Korbinian RiedhammerTechnische Hochschule NürnbergVerified email at ieee.org
Sebastian FaustTU DarmstadtVerified email at cs.tu-darmstadt.de
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Lisa EckeyVerified email at crisp-da.de
Poulami DasLeast AuthorityVerified email at leastauthority.com
Kristina HostákováETH ZürichVerified email at inf.ethz.ch
Christopher LiebchenTechnische Universität DarmstadtVerified email at google.com
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl