Get my own profile
Public access
View all30 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Yasemin AcarPaderborn University & The George Washington UniversityVerified email at sec.uni-hannover.de
Christian StranskyKKH Kaufmännische KrankenkasseVerified email at sec.uni-hannover.de
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Dominik WermkeNC State UniversityVerified email at ncsu.edu
Nicolas HuamanLeibniz University HannoverVerified email at sec.uni-hannover.de
Michelle L. MazurekAssociate Professor, University of MarylandVerified email at umd.edu
Henning PerlFraunhofer FKIE, BonnVerified email at fkie.fraunhofer.de
Sabrina AmftCISPA Helmholtz Center for Information SecurityVerified email at sec.uni-hannover.de
Doowon KimUniversity of Tennessee, KnoxvilleVerified email at utk.edu
Sven BugielCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Jan H. KlemmerCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Bernd FreislebenProfessor of Computer Science, University of Marburg, GermanyVerified email at informatik.uni-marburg.de
Florian SchaubUniversity of MichiganVerified email at umich.edu
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Felix FischerChair of Cyber Trust, Technical University of MunichVerified email at tum.de
Simson GarfinkelBasisTech, LLCVerified email at acm.org
Fabian YamaguchiWhirly Labs (Pty) Ltd, Qwiet.AI, Stellenbosch UniversityVerified email at codeminers.org
Konrad RieckTechnische Universität BerlinVerified email at tu-berlin.de
Alexander KrauseCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Elissa M. RedmilesClare Luce Boothe Assistant Professor, Georgetown UniversityVerified email at georgetown.edu