Get my own profile
Public access
View all6 articles
1 article
available
not available
Based on funding mandates
Co-authors
Michael RolandJohannes Kepler University Linz, Institute of Networks and SecurityVerified email at ins.jku.at
Rainhard Dieter FindlingFormer Researcher in the Ambient Intelligence Group, Aalto UniversityVerified email at aalto.fi
Muhammad MuaazResearcherVerified email at uia.no
Hans GellersenProfessor of Interactive Systems, Lancaster University and Aarhus UniversityVerified email at cs.au.dk
Alois FerschaProfessor of Computer Science, JKUVerified email at jku.at
Daniel HintzeGoogleVerified email at hintze-it.de
Bogdan GrozaPolitehnica University of TimisoaraVerified email at aut.upt.ro
Philipp HoferJohannes Kepler University, Institute of Networks and SecurityVerified email at ins.jku.atEckhard KochProfessor & Dekan für Informatik, Fachhochschule der WirtschaftVerified email at fhdw.de
Andreas AichhornResearch and Development / Company Sprecher AutomationVerified email at sprecher-automation.comAdriana BerdichPolitehnica University of TimisoaraVerified email at aut.upt.ro
Michael AffenzellerUniversity of Applied Sciences Upper AustriaVerified email at fh-ooe.at
Mike HazasProfessor, Uppsala UniversityVerified email at it.uu.se
Iulia IonGoogleVerified email at google.com
Clemens HolzmannUniversity of Applied Sciences Upper AustriaVerified email at fh-hagenberg.at
Stephan SiggAalto UniversityVerified email at aalto.fi
Bernhard EtzlingerResearcher, Johannes Kepler University LinzVerified email at jku.at
Ming Ki ChongVerified email at comp.lancs.ac.uk
Manuel RiggerNational University of SingaporeVerified email at comp.nus.edu.sg
Jürgen Fuß (Ecker)Professor of Applied Mathematics and CryptographyVerified email at fh-hagenberg.at