Get my own profile
Public access
View all34 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Prof. Dr. Andreas SchaadUniversity of Applied Sciences OffenburgVerified email at hs-offenburg.de
- Florian HahnUniversity of TwenteVerified email at utwente.nl
- Nils LukasMBZUAIVerified email at mbzuai.ac.ae
- Martin HärterichResearch Expert, SAP Security ResearchVerified email at sap.com
- Anselme TuenoSAP Security ResearchVerified email at sap.com
- Simon OyaThe University of British ColumbiaVerified email at ece.ubc.ca
- Benny FuhryIntelVerified email at intel.com
- Erik-Oliver BlassSenior Research Scientist, Airbus Senior Expert for Applied CryptographyVerified email at airbus.com
- Daniel BernauSAP Security ResearchVerified email at sap.com
- Mikhail AtallahDistinguished Professor of Computer ScienceVerified email at cs.purdue.edu
- Leonardo Weiss Ferreira ChavesSAP Research (ex)Verified email at teco.edu
- Richard PibernikProfessor of Logistics, University of WürzburgVerified email at uni-wuerzburg.de
- Jonas BöhlerSAP Security ResearchVerified email at sap.com
- Debmalya BiswasWipro Data Analytics & AIVerified email at Wipro.com
- Thomas HumphriesUniversity of WaterlooVerified email at uwaterloo.ca
- Xinda LiUniversity of WaterlooVerified email at uwaterloo.ca
- Rasoul A MahdaviUniversity of WaterlooVerified email at uwaterloo.ca
- Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
- Benjamin WeggenmannResearcher, SAP Security ResearchVerified email at sap.com
- Masoumeh ShafieinejadResearcher at Vector InstituteVerified email at uwaterloo.ca