Get my own profile
Public access
View all30 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Prof. Dr. Andreas SchaadUniversity of Applied Sciences OffenburgVerified email at hs-offenburg.de
Florian HahnUniversity of TwenteVerified email at utwente.nl
Anselme TuenoSAP Security ResearchVerified email at sap.com
Benny FuhryCamelot ITLabVerified email at camelot-itlab.com
Leonardo Weiss Ferreira ChavesSAP Research (ex)Verified email at teco.edu
Mikhail AtallahDistinguished Professor of Computer ScienceVerified email at cs.purdue.edu
Debmalya BiswasWipro iDEAS - Apps & DataVerified email at Wipro.com
Richard PibernikProfessor of Logistics, University of WürzburgVerified email at uni-wuerzburg.de
Nils LukasUniversity of WaterlooVerified email at uwaterloo.ca
Daniel BernauSAP Security ResearchVerified email at sap.com
Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
Erik-Oliver BlassSenior Research Scientist, Airbus Expert for Applied CryptographyVerified email at airbus.com
Ernesto DamianiSenior Director of Robotics and Intelligent Systems Institute, Khalifa UniversityVerified email at ku.ac.ae
Christian F. HempelmannTexas A&M University-CommerceVerified email at tamuc.edu
Simon OyaUniversity of WaterlooVerified email at uwaterloo.ca
Victor RaskinDistinguished Professor, Purdue UniversityVerified email at purdue.edu
Sonia FahmyProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Jonas BöhlerSAP Security ResearchVerified email at sap.com
Octavian CatrinaUniversity Politehnica of BucharestVerified email at elcom.pub.ro
Hoon Wei LimSingtelVerified email at singtel.com