Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Christian TiefenauUniversity of BonnVerified email at cs.uni-bonn.de
Matthew SmithProfessor of Computer Science, Universität BonnVerified email at cs.uni-bonn.de
Emanuel von ZezschwitzStaff UX Researcher @ Google ChromeVerified email at google.com
Katharina KrombholzFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Yasemin AcarPaderborn University & The George Washington UniversityVerified email at sec.uni-hannover.de
Dominik WermkeNC State UniversityVerified email at ncsu.edu
Markus WillingSecurity AnalystVerified email at uni-muenster.de
Christian DresenVerified email at fh-muenster.de
Sebastian SchinzelMünster University of Applied Sciences, Fraunhofer SIT, AtheneVerified email at fh-muenster.de
Delphine ReinhardtFull professor, Computer Security and Privacy, Georg-August-Universität Göttingen, GermanyVerified email at cs.uni-goettingen.de
Mohamed KhamisReader (Associate Professor), School of Computing Science, University of GlasgowVerified email at glasgow.ac.uk