Get my own profile
Public access
View all62 articles
1 article
available
not available
Based on funding mandates
Co-authors
Bettina KönighoferAssistant Professor, Graz University of Technology, AustriaVerified email at iaik.tugraz.at
Robert KönighoferGraz University of TechnologyVerified email at iaik.tugraz.at
Barbara JobstmannScientist at EPFLVerified email at epfl.ch
Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusVerified email at cispa.saarland
Fabio SomenziProfessor, University of Colorado BoulderVerified email at colorado.eduHelmut VeithProfessor of Computer Science, Vienna University of Technology / TU WienVerified email at forsyte.tuwien.ac.at
Ayrat KhalimovTU ClausthalVerified email at tu-clausthal.de
Ruediger EhlersClausthal University of TechnologyVerified email at tu-clausthal.de
Thomas HenzingerIST AustriaVerified email at ist.ac.at
Andreas GriesmayerImperial College LondonVerified email at arm.comUfuk TopcuThe University of Texas at AustinVerified email at utexas.edu
Krishnendu ChatterjeeProfessor, IST AustriaVerified email at ist.ac.at
Marco RoveriUniversity of Trento - Department of Information Engineering and Computer ScienceVerified email at unitn.it
Goerschwin FeyHamburg University of TechnologyVerified email at tuhh.deJosef WidderInformal SystemsVerified email at informal.systems
Ingo PillExternal Lecturer Graz University of TechnologyVerified email at ist.tugraz.at
Martina SeidlUniv.-Prof., JKU LinzVerified email at jku.atMartin TapplerTU WienVerified email at tuwien.ac.at
Vedad HadžićIntel LabsVerified email at intel.com
Sasha RubinUniversity of SydneyVerified email at sydney.edu.au