Get my own profile
Public access
View all6 articles
1 article
available
not available
Based on funding mandates
Co-authors
Alexander De LucaGoogleVerified email at google.com
Heinrich HussmannProfessor of Computer Science, Ludwig-Maximilians-Universität MünchenVerified email at ifi.lmu.de
Florian AltProfessor of Usable Security at the Bundeswehr University MunichVerified email at unibw.de
Mohamed KhamisReader (Associate Professor), School of Computing Science, University of GlasgowVerified email at glasgow.ac.uk
Alina HangUniversity of MunichVerified email at ifi.lmu.de
Max-Emanuel MaurerResearch Fellow, University of MunichVerified email at ifi.lmu.de
Katharina KrombholzFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Daniel BuschekUniversity of BayreuthVerified email at uni-bayreuth.de
Marian HarbachGoogle, MunichVerified email at google.com
Andreas BullingProfessor of Computer Science, University of StuttgartVerified email at vis.uni-stuttgart.de
Christian TiefenauUniversity of BonnVerified email at cs.uni-bonn.de
Mariam HassibBundeswehr University in MunichVerified email at unibw.de
Ceenu GeorgeVisiting Professor, University of AugsburgVerified email at ifi.lmu.de
Marcello Paolo ScipioniUniversity of Lugano (USI)Verified email at usi.ch
Marc LangheinrichProfessor, Faculty of Informatics, Università della Svizzera italiana (USI)Verified email at usi.ch
Elisa RubegniAssistant Professor, Lancaster University, UKVerified email at rubegni.it
Paul DunphyOneSpanVerified email at onespan.com
Bernhard SlawikPhD Student, HCI Group at the University of Munich (LMU)Verified email at ifi.lmu.de
Andreas ButzProfessor of Computer Science, University of Munich (LMU)Verified email at ifi.lmu.de
Simon StusakUniversity of Munich (LMU)Verified email at ifi.lmu.de