Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Martin JohnsProfessor of Computer Science, TU BraunschweigVerified email at tu-braunschweig.de
- Tom BarberResearcher, SAP Security ResearchVerified email at sap.com
- Konrad RieckTechnische Universität BerlinVerified email at tu-berlin.de
- Erwin QuiringInternational Computer Science Institute (ICSI), BerkeleyVerified email at rub.de
- Daniel ArpTechnische Universität BerlinVerified email at tu-berlin.de
- Jörg SchäferFrankfurt University of Applied SciencesVerified email at fb2.fra-uas.de
- Marius MuschTU BraunschweigVerified email at tu-braunschweig.de
- Ben StockCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Alexandra DirksenTU Braunschweig - IAS | CensoredPlanetVerified email at tu-braunschweig.de
- Simon KochTU BraunschweigVerified email at tu-braunschweig.de