Get my own profile
Public access
View all38 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Prof. Dr. Andreas SchaadUniversity of Applied Sciences OffenburgVerified email at hs-offenburg.de
Florian HahnUniversity of TwenteVerified email at utwente.nl
Nils LukasMBZUAIVerified email at mbzuai.ac.ae
Martin HärterichResearch Expert, SAP Security ResearchVerified email at sap.com
Anselme TuenoSAP Security ResearchVerified email at sap.com
Simon OyaThe University of British ColumbiaVerified email at ece.ubc.ca
Benny FuhryIntelVerified email at intel.com
Erik-Oliver BlassSenior Research Scientist, Airbus Senior Expert for Applied CryptographyVerified email at airbus.com
Daniel BernauSAP Security ResearchVerified email at sap.com
Mikhail AtallahDistinguished Professor of Computer ScienceVerified email at cs.purdue.edu
Leonardo Weiss Ferreira ChavesSAP Research (ex)Verified email at teco.edu
Jonas BöhlerSAP Security ResearchVerified email at sap.com
Thomas HumphriesUniversity of WaterlooVerified email at uwaterloo.ca
Rasoul A MahdaviUniversity of WaterlooVerified email at uwaterloo.ca
Richard PibernikProfessor of Logistics, University of WürzburgVerified email at uni-wuerzburg.de
Debmalya BiswasWipro Data Analytics & AIVerified email at Wipro.com
Xinda LiUniversity of WaterlooVerified email at uwaterloo.ca
Benjamin WeggenmannResearcher, SAP Security ResearchVerified email at sap.com
Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
Masoumeh ShafieinejadResearcher at Vector InstituteVerified email at uwaterloo.ca