Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Martin JohnsProfessor of Computer Science, TU BraunschweigVerified email at tu-braunschweig.de
Tom BarberResearcher, SAP Security ResearchVerified email at sap.com
Konrad RieckTechnische Universität BerlinVerified email at tu-berlin.de
Souphiane BensalimSAP SEVerified email at sap.com
Erwin QuiringInternational Computer Science Institute (ICSI), BerkeleyVerified email at rub.de
Daniel ArpTechnische Universität BerlinVerified email at tu-berlin.de
Jörg SchäferFrankfurt University of Applied SciencesVerified email at fb2.fra-uas.de
Alexandra DirksenTU Braunschweig - IAS | CensoredPlanetVerified email at tu-braunschweig.de
Ben StockCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Marius MuschTU BraunschweigVerified email at tu-braunschweig.de