Get my own profile
Public access
View all21 articles
1 article
available
not available
Based on funding mandates
Co-authors
Christian RossowCISPA – Helmholtz Center for Information SecurityVerified email at cispa.de
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Luca CompagnaSAP Security ResearchVerified email at sap.com
Alessandro ArmandoUniversity of GenovaVerified email at unige.it
Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyVerified email at fbk.euSoheil KhodayariSecurity Researcher, CrowdStrikeVerified email at crowdstrike.com
Martin JohnsProfessor of Computer Science, TU BraunschweigVerified email at tu-braunschweig.de
Florian TramèrAssistant Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Ben StockCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Davide BalzarottiProfessor, EurecomVerified email at eurecom.fr
Jorge CuellarUni Passau, Univ de los Andes (Bogota)Verified email at gw.uni-passau.deDan BonehProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
Serena Elisa PontaSAP Security ResearchVerified email at sap.com
Edward ChouStanford UniversityVerified email at stanford.eduSimon KochUniversity of InnsbruckVerified email at uibk.ac.at
Neeraj SuriDistinguished Chair Professor, Lancaster UniversityVerified email at lancaster.ac.uk
Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
Sven BugielCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Zhiqiang LinDistinguished Professor of Engineering, The Ohio State UniversityVerified email at cse.ohio-state.edu
Qingchuan ZhaoCity University of Hong KongVerified email at cityu.edu.hk