Get my own profile
Public access
View all25 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Reiner HähnleProfessor of Computer Science, Technical University of DarmstadtVerified email at cs.tu-darmstadt.de
Mattias UlbrichResearcher, Karlsruhe Institute of TechnologyVerified email at kit.edu
Wolfgang AhrendtProfessor of Computer Science, Chalmers University of TechnologyVerified email at chalmers.se
Richard BubelDepartment of Computer Science, TU DarmstadtVerified email at cs.tu-darmstadt.de
Steffen SchlagerUniversity of Applies Sciences OffenburgVerified email at hs-offenburg.de
Vladimir KlebanovSAP SE (previously at Karlsruhe Institute of Technology)Verified email at sap.com
Martin GieseProf., Dept. of Informatics, University of OsloVerified email at ifi.uio.no
Thomas BaarHTW BerlinVerified email at acm.org
Michael KirstenKarlsruhe Institute of Technology (KIT)Verified email at kit.edu
Alexander WeiglKarlsruhe Institution of TechnologyVerified email at kit.edu
Wojciech MostowskiHalmstad UniversityVerified email at hh.se
Birgit Vogel-HeuserProfessor, Lehrstuhl für Automatisierung und Informationssysteme, Technische Universität MünchenVerified email at tum.de
Mihai HerdaSAP SEVerified email at sap.com
Andreas RothSAP SEVerified email at sap.com
Christoph BaumannSenior Researcher, Ericsson Security Research SwedenVerified email at ericsson.com
Jonas SchifflPhD Student, Karlsruhe Institute of TechnologyVerified email at kit.edu
Suhyun ChaTU MunichVerified email at tum.de
Philipp RuemmerProfessor in Computer Science, University of RegensburgVerified email at ur.de
Carsten SchürmannComputer Science, IT University of CopenhagenVerified email at itu.dk
Christoph GladischResearch Engineer, Bosch GmbHVerified email at ira.uka.de
Follow
Bernhard Beckert
Professor of Informatics, Karlsruhe Institute of Technology
Verified email at kit.edu - Homepage