Get my own profile
Public access
View all24 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
- Stefan MangardGraz University of TechnologyVerified email at tugraz.at
- Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Moritz LippVerified email at mlq.me
- Olivier HeenTechnicolorVerified email at technicolor.com
- Christoph NeumannBroadpeakVerified email at broadpeak.tv
- Aurélien FrancillonProfessor, EURECOMVerified email at eurecom.fr
- Raphael SpreitzerSGSVerified email at sgs.com
- Martina LindorferAssociate Professor at TU WienVerified email at tuwien.ac.at
- Peter PesslInfineon TechnologiesVerified email at infineon.com
- Kaveh RazaviAssistant Professor at ETH ZurichVerified email at ethz.ch
- Cristiano GiuffridaAssociate Professor, Vrije Universiteit AmsterdamVerified email at cs.vu.nl
- Yanick FratantonioSenior Research Scientist, GoogleVerified email at fratantonio.me
- Giovanni VignaUC Santa Barbara and VMwareVerified email at cs.ucsb.edu
- Herbert BosProfessor of Computer Science, Vrije Universiteit AmsterdamVerified email at cs.vu.nl
- Anders FoghPrincipal Security Researcher, GDATA Advanced AnalyticsVerified email at gdata-adan.de
- Victor van der VeenQualcomm Product SecurityVerified email at qualcomm.com
- Thomas RokickiVerified email at irisa.fr
- Yossi OrenAssociate Professor at Ben-Gurion UniversityVerified email at bgu.ac.il
- Pierre LaperdrixCNRS / Univ. Lille / InriaVerified email at inria.fr