Get my own profile
Public access
View all17 articles
1 article
available
not available
Based on funding mandates
Co-authors
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Mario WernerGraz University of TechnologyVerified email at iaik.tugraz.at
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Fangfei LiuIntel CorporationVerified email at intel.com
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Christoph DobraunigIntel CorporationVerified email at intel.com
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Robert PrimasGraz University of TechnologyVerified email at iaik.tugraz.at
Erich WengerInfineon TechnologiesVerified email at infineon.com
Robert SchillingGraz University of TechnologyVerified email at iaik.tugraz.at
Lukas GinerGraz University of TechnologyVerified email at iaik.tugraz.at
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Raphael SpreitzerSGSVerified email at sgs.com
Daniel SlamanigProfessor @ Universität der Bundeswehr MünchenVerified email at unibw.de
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Josep TorrellasProfessor of Computer Science, University of Illinois Urbana-ChampaignVerified email at illinois.edu
Christopher W. FletcherAssistant Professor, University of Illinois Urbana-ChampaignVerified email at illinois.edu
Frank K. GürkaynakSenior Scientist, ETH ZurichVerified email at ee.ethz.ch
Luca BeniniETH Zürich, Università di BolognaVerified email at unibo.it
Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
Follow