Get my own profile
Public access
View all42 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Juraj SomorovskyPaderborn UniversityVerified email at upb.deChristian MainkaUniversity of WuppertalVerified email at uni-wuppertal.de
Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
Sven SchägeEindhoven University of TechnologyVerified email at tue.nlMarcus NiemietzNiederrhein University of Applied SciencesVerified email at mniemietz.de
Nils GruschkaProfessor, University of Oslo, NorwayVerified email at ifi.uio.no
Albrecht BeutelspacherProfessor für Mathematik, Justus-Liebig-Universität GießenVerified email at math.uni-giessen.deMark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
Christopher MeyerReserach Assistant, Horst Görtz Institute for IT-Security, Ruhr-University BochumVerified email at rub.de
Mario HeiderichPhD, Ruhr-University BochumVerified email at rub.de
Paul RöslerFAU Erlangen-NürnbergVerified email at fau.de
Thorsten HolzMax Planck Institute for Security and Privacy (MPI-SP)Verified email at mpi-sp.org
Martin GrotheSenior Cyber Security Architect @ EYVerified email at rub.de
Tilman FroschHorst Görtz Institute for IT Security, Ruhr-Universität BochumVerified email at rub.deDouglas StebilaUniversity of WaterlooVerified email at uwaterloo.ca
Ashar JavedHyundai AutoEver Europe GmbHVerified email at hyundai-autoever.eu
Benjamin DowlingKing's College LondonVerified email at kcl.ac.uk
Olivier PereiraUCLouvainVerified email at uclouvain.be
Erik TewsUniversity of TwenteVerified email at utwente.nl
Jonas MagaziniusPhD of Computer Science, Chalmers UniversityVerified email at assured.se
Follow
Jörg Schwenk
Professor für Netz- und Datensicherheit, Ruhr-Universität Bochum
Verified email at rub.de