Get my own profile
Co-authors
- Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
- Lucas Vincenzo DaviUniversity of Duisburg-EssenVerified email at uni-due.de
- Alexandra DmitrienkoWürzburg UniversityVerified email at uni-wuerzburg.de
- Sebastian GajekProfessor of Information Security and Cryptography, Flensburg University of Applied SciencesVerified email at hs-flensburg.de
- Stephen CheckowayAssociate Professor at Oberlin CollegeVerified email at oberlin.edu
- Hovav ShachamProfessor of Computer Science, The University of Texas at AustinVerified email at cs.utexas.edu
- Luigi CatuognoDipartimento di Informatica, Università degli Studi di Salerno, ITALYVerified email at dia.unisa.it
- Thomas SchneiderProfessor of Computer Science, TU DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
- Christian WachsmannIntel CorporationVerified email at intel.com
- Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
- Thomas HupperichEuropean Research Center for Information Systems, University Münster, GermanyVerified email at ercis.de
- Armin CremersProfessor of Computer Science, University of BonnVerified email at iai.uni-bonn.de
- Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Teemu RytilahtiRuhr University BochumVerified email at rub.de
- Davide MaiorcaAssistant Professor of Computer Engineering at University of Cagliari, ItalyVerified email at unica.it
- Kari KostiainenSenior Scientist at ETH ZurichVerified email at inf.ethz.ch
- Sven BugielCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Angelo LiguoriUniversità degli Studi Roma TreVerified email at uniroma3.it
- Claire VishikIntelVerified email at intel.com
- Felix GröbertGoogleVerified email at groebert.org