Get my own profile
Public access
View all16 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Thorsten StrufeProfessor of Privacy and Security, Karlsruhe Institute of Technology; Adjunct Professor TU DresdenVerified email at kit.edu
- Pedro Moreno-SanchezAssistant Research Professor, IMDEA Software InstituteVerified email at imdea.org
- Lydia Y. ChenUniversity of Neuchatel/ TU DelftVerified email at ieee.org
- Jiyue HuangDelft University of TechnologyVerified email at tudelft.nl
- Arthur GervaisProfessor of Information Security (UCL), Affiliate Faculty (UC Berkeley RDI)Verified email at gervais.cc
- Patrick McCorryCrypto enthusiastVerified email at arbitrum.foundation
- Lewis GudgeonImperial College LondonVerified email at imperial.ac.uk
- Hani SalahTU DarmstadtVerified email at cs.tu-darmstadt.de
- Zilong ZhaoNational University of SingaporeVerified email at nus.edu.sg
- Oğuzhan ErsoyResearch Lead, GensynVerified email at gensyn.ai
- Aniket KatePurdue University / Supra ResearchVerified email at purdue.edu
- Chi HongDelft University of TechnologyVerified email at tudelft.nl
- Chris BiemannProfessor for Language Technology, University of HamburgVerified email at informatik.uni-hamburg.de
- Karsten WeiheTechnische Universität DarmstadtVerified email at tu-darmstadt.de
- Neeraj SuriDistinguished Chair Professor, Lancaster UniversityVerified email at lancaster.ac.uk
- Giang T. NguyenAssistant Professor | CeTI – Cluster of Excellence | ceti.oneVerified email at tu-dresden.de
- Mathias FischerUniversität HamburgVerified email at ieee.org
- Zekeriya ErkinAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
- rania TALBILIRIS, INSA-LyonVerified email at insa-lyon.fr
- Cristina Nita-RotaruProfessor, Khoury College of Computer Science, Northeastern UniversityVerified email at northeastern.edu