<?xml version="1.0"?>
<dblpperson name="Michael Kasper" pid="06/9" n="28">
<person key="homepages/06/9" mdate="2009-06-08">
<author pid="06/9">Michael Kasper</author>
</person>
<r><inproceedings key="conf/checkmate/BartakeJJRKB25" mdate="2026-02-01">
<author pid="402/5807">Nikhil Bartake</author>
<author pid="402/5961">See Toh Zi Jie</author>
<author orcid="0009-0008-6665-0643" pid="402/5136">Carmen Wong Jiawen</author>
<author pid="424/2453">Declan Fong Yi Ren</author>
<author pid="06/9">Michael Kasper</author>
<author pid="124/8510">Vivek Balachandran</author>
<title>ObfusQate: Unveiling the First Quantum Program Obfuscation Framework.</title>
<pages>10-19</pages>
<year>2025</year>
<booktitle>Checkmate@CCS</booktitle>
<ee>https://doi.org/10.1145/3733817.3762700</ee>
<crossref>conf/checkmate/2025</crossref>
<url>db/conf/checkmate/checkmate2025.html#BartakeJJRKB25</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2503-23785" mdate="2026-01-20">
<author pid="402/5807">Nikhil Bartake</author>
<author pid="402/5961">See Toh Zi Jie</author>
<author pid="402/5136">Carmen Wong Jiawen</author>
<author pid="06/9">Michael Kasper</author>
<author pid="124/8510">Vivek Balachandran</author>
<title>ObfusQate: Unveiling the First Quantum Program Obfuscation Framework.</title>
<year>2025</year>
<month>March</month>
<volume>abs/2503.23785</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2503.23785</ee>
<url>db/journals/corr/corr2503.html#abs-2503-23785</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><inproceedings key="conf/date/Kumar0CKKN20" mdate="2021-10-14">
<author orcid="0000-0001-8363-2852" pid="39/3973">Vinay B. Y. Kumar</author>
<author pid="83/7953-1">Naina Gupta 0001</author>
<author pid="99/4535">Anupam Chattopadhyay</author>
<author pid="06/9">Michael Kasper</author>
<author orcid="0000-0001-7776-7574" pid="34/4605">Christoph Krau&#223;</author>
<author pid="62/7604">Ruben Niederhagen</author>
<title>Post-Quantum Secure Boot.</title>
<pages>1582-1585</pages>
<year>2020</year>
<booktitle>DATE</booktitle>
<ee>https://doi.org/10.23919/DATE48585.2020.9116252</ee>
<crossref>conf/date/2020</crossref>
<url>db/conf/date/date2020.html#Kumar0CKKN20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ijcnn/ChattopadhyayCG19" mdate="2024-03-20">
<author pid="249/8316">Nandish Chattopadhyay</author>
<author pid="99/4535">Anupam Chattopadhyay</author>
<author orcid="0000-0002-4197-582X" pid="41/8030">Sourav Sen Gupta 0001</author>
<author pid="06/9">Michael Kasper</author>
<title>Curse of Dimensionality in Adversarial Examples.</title>
<pages>1-8</pages>
<year>2019</year>
<booktitle>IJCNN</booktitle>
<ee>https://doi.org/10.1109/IJCNN.2019.8851795</ee>
<crossref>conf/ijcnn/2019</crossref>
<url>db/conf/ijcnn/ijcnn2019.html#ChattopadhyayCG19</url>
</inproceedings>
</r>
<r><article key="journals/dud/WeberRKKSK18" mdate="2018-05-25">
<author pid="15/1879">Arnd Weber</author>
<author pid="09/1548">Steffen Reith</author>
<author pid="06/9">Michael Kasper</author>
<author pid="11/6019">Dirk Kuhlmann</author>
<author pid="98/117">Jean-Pierre Seifert</author>
<author pid="34/4605">Christoph Krau&#223;</author>
<title>Souver&#228;nit&#228;t und die IT-Wertsch&#246;pfungskette.</title>
<pages>291-293</pages>
<year>2018</year>
<volume>42</volume>
<journal>Datenschutz und Datensicherheit</journal>
<number>5</number>
<ee>https://doi.org/10.1007/s11623-018-0943-z</ee>
<url>db/journals/dud/dud42.html#WeberRKKSK18</url>
</article>
</r>
<r><inproceedings key="conf/qrs/WeberRKKSK18" mdate="2021-10-14">
<author pid="15/1879">Arnd Weber</author>
<author pid="09/1548">Steffen Reith</author>
<author pid="11/6019">Dirk Kuhlmann</author>
<author pid="06/9">Michael Kasper</author>
<author pid="98/117">Jean-Pierre Seifert</author>
<author orcid="0000-0001-7776-7574" pid="34/4605">Christoph Krau&#223;</author>
<title>Open Source Value Chains for Addressing Security Issues Efficiently.</title>
<pages>599-606</pages>
<year>2018</year>
<booktitle>QRS Companion</booktitle>
<ee>https://doi.org/10.1109/QRS-C.2018.00105</ee>
<crossref>conf/qrs/2018c</crossref>
<url>db/conf/qrs/qrs2018c.html#WeberRKKSK18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icra/NobreKH17" mdate="2018-02-06">
<author pid="203/4879">Fernando Nobre</author>
<author pid="06/9">Michael Kasper</author>
<author pid="170/8568">Christoffer R. Heckman</author>
<title>Drift-correcting self-calibration for visual-inertial SLAM.</title>
<pages>6525-6532</pages>
<year>2017</year>
<booktitle>ICRA</booktitle>
<ee>https://doi.org/10.1109/ICRA.2017.7989771</ee>
<crossref>conf/icra/2017</crossref>
<url>db/conf/icra/icra2017.html#NobreKH17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/date/WaidnerK16" mdate="2021-08-09">
<author pid="90/308">Michael Waidner</author>
<author pid="06/9">Michael Kasper</author>
<title>Security in industrie 4.0 - challenges and solutions for the fourth industrial revolution.</title>
<pages>1303-1308</pages>
<year>2016</year>
<booktitle>DATE</booktitle>
<ee>https://ieeexplore.ieee.org/document/7459511/</ee>
<crossref>conf/date/2016</crossref>
<url>db/conf/date/date2016.html#WaidnerK16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iros/FalquezKS16" mdate="2017-05-22">
<author pid="161/8133">Juan M. Falquez</author>
<author pid="06/9">Michael Kasper</author>
<author pid="11/6079">Gabe Sibley</author>
<title>Inertial aided dense &#38; semi-dense methods for robust direct visual odometry.</title>
<pages>3601-3607</pages>
<year>2016</year>
<booktitle>IROS</booktitle>
<ee>https://doi.org/10.1109/IROS.2016.7759530</ee>
<crossref>conf/iros/2016</crossref>
<url>db/conf/iros/iros2016.html#FalquezKS16</url>
</inproceedings>
</r>
<r><article key="journals/jce/ClavierDDEGGHKLLNOSSSSVWW14" mdate="2024-10-06">
<author pid="75/5410">Christophe Clavier</author>
<author pid="52/4689">Jean-Luc Danger</author>
<author pid="02/6991">Guillaume Duc</author>
<author pid="17/8030">M. Abdelaziz Elaabid</author>
<author pid="98/7591">Beno&#238;t G&#233;rard</author>
<author pid="86/2396">Sylvain Guilley</author>
<author pid="68/10491">Annelie Heuser</author>
<author pid="06/9">Michael Kasper</author>
<author pid="37/4190-1">Yang Li 0001</author>
<author pid="52/2113">Victor Lomn&#233;</author>
<author pid="15/8190">Daisuke Nakatsu</author>
<author pid="73/5993">Kazuo Ohta</author>
<author pid="04/4429">Kazuo Sakiyama</author>
<author pid="46/6459">Laurent Sauvage</author>
<author orcid="0000-0002-3073-0106" pid="11/621">Werner Schindler</author>
<author orcid="0000-0001-7970-3945" pid="66/7913">Marc St&#246;ttinger</author>
<author pid="02/3809">Nicolas Veyrat-Charvillon</author>
<author pid="130/1408">Matthieu Walle</author>
<author pid="136/4549">Antoine Wurcker</author>
<title>Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest.</title>
<pages>259-274</pages>
<year>2014</year>
<volume>4</volume>
<journal>J. Cryptogr. Eng.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s13389-014-0075-9</ee>
<url>db/journals/jce/jce4.html#ClavierDDEGGHKLLNOSSSSVWW14</url>
</article>
</r>
<r><inproceedings key="conf/aspdac/KramerKS14" mdate="2017-05-26">
<author pid="39/8933">Juliane Kr&#228;mer</author>
<author pid="06/9">Michael Kasper</author>
<author pid="98/117">Jean-Pierre Seifert</author>
<title>The role of photons in cryptanalysis.</title>
<pages>780-787</pages>
<year>2014</year>
<booktitle>ASP-DAC</booktitle>
<ee>https://doi.org/10.1109/ASPDAC.2014.6742985</ee>
<crossref>conf/aspdac/2014</crossref>
<url>db/conf/aspdac/aspdac2014.html#KramerKS14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tepra/KasperCY14" mdate="2017-05-25">
<author pid="06/9">Michael Kasper</author>
<author pid="77/4665">Nikolaus Correll</author>
<author pid="05/6465">Tom Yeh</author>
<title>Abstracting perception and manipulation in end-user robot programming using Sikuli.</title>
<pages>1-6</pages>
<year>2014</year>
<booktitle>TePRA</booktitle>
<ee>https://doi.org/10.1109/TePRA.2014.6869156</ee>
<crossref>conf/tepra/2014</crossref>
<url>db/conf/tepra/tepra2014.html#KasperCY14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fps/BrandtK13" mdate="2017-05-24">
<author pid="17/11435">Christian Brandt</author>
<author pid="06/9">Michael Kasper</author>
<title>Don't Push It: Breaking iButton Security.</title>
<pages>369-387</pages>
<year>2013</year>
<booktitle>FPS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-05302-8_23</ee>
<crossref>conf/fps/2013</crossref>
<url>db/conf/fps/fps2013.html#BrandtK13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/indocrypt/SantisKMSSS13" mdate="2025-07-04">
<author pid="00/7653">Fabrizio De Santis</author>
<author pid="06/9">Michael Kasper</author>
<author orcid="0000-0001-9650-8041" pid="91/4831">Stefan Mangard</author>
<author pid="89/4621">Georg Sigl</author>
<author pid="61/5648">Oliver Stein</author>
<author orcid="0000-0001-7970-3945" pid="66/7913">Marc St&#246;ttinger</author>
<title>On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective.</title>
<pages>215-226</pages>
<year>2013</year>
<booktitle>INDOCRYPT</booktitle>
<ee>https://doi.org/10.1007/978-3-319-03515-4_14</ee>
<crossref>conf/indocrypt/2013</crossref>
<url>db/conf/indocrypt/indocrypt2013.html#SantisKMSSS13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cosade/ZohnerKS12" mdate="2024-10-06">
<author pid="73/11043">Michael Zohner</author>
<author pid="06/9">Michael Kasper</author>
<author orcid="0000-0001-7970-3945" pid="66/7913">Marc St&#246;ttinger</author>
<title>Butterfly-Attack on Skein's Modular Addition.</title>
<pages>215-230</pages>
<year>2012</year>
<booktitle>COSADE</booktitle>
<ee>https://doi.org/10.1007/978-3-642-29912-4_16</ee>
<crossref>conf/cosade/2012</crossref>
<url>db/conf/cosade/cosade2012.html#ZohnerKS12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ctrsa/HeuserKSS12" mdate="2025-12-07">
<author pid="68/10491">Annelie Heuser</author>
<author pid="06/9">Michael Kasper</author>
<author orcid="0000-0002-3073-0106" pid="11/621">Werner Schindler</author>
<author orcid="0000-0001-7970-3945" pid="66/7913">Marc St&#246;ttinger</author>
<title>A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models.</title>
<pages>365-382</pages>
<year>2012</year>
<booktitle>CT-RSA</booktitle>
<ee>https://doi.org/10.1007/978-3-642-27954-6_23</ee>
<crossref>conf/ctrsa/2012</crossref>
<url>db/conf/ctrsa/ctrsa2012.html#HeuserKSS12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/date/ZohnerKSH12" mdate="2024-10-06">
<author pid="73/11043">Michael Zohner</author>
<author pid="06/9">Michael Kasper</author>
<author orcid="0000-0001-7970-3945" pid="66/7913">Marc St&#246;ttinger</author>
<author pid="h/SorinAHuss">Sorin A. Huss</author>
<title>Side channel analysis of the SHA-3 finalists.</title>
<pages>1012-1017</pages>
<year>2012</year>
<booktitle>DATE</booktitle>
<ee>https://doi.org/10.1109/DATE.2012.6176644</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DATE.2012.6176644</ee>
<ee>http://dl.acm.org/citation.cfm?id=2492960</ee>
<crossref>conf/date/2012</crossref>
<url>db/conf/date/date2012.html#ZohnerKSH12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsd/HeuserKSS11" mdate="2025-12-07">
<author pid="68/10491">Annelie Heuser</author>
<author pid="06/9">Michael Kasper</author>
<author orcid="0000-0002-3073-0106" pid="11/621">Werner Schindler</author>
<author orcid="0000-0001-7970-3945" pid="66/7913">Marc St&#246;ttinger</author>
<title>How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis.</title>
<pages>674-681</pages>
<year>2011</year>
<booktitle>DSD</booktitle>
<ee>https://doi.org/10.1109/DSD.2011.91</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DSD.2011.91</ee>
<crossref>conf/dsd/2011</crossref>
<url>db/conf/dsd/dsd2011.html#HeuserKSS11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/DurholzFKO11" mdate="2017-05-21">
<author pid="88/10257">Ulrich D&#252;rholz</author>
<author pid="72/5460">Marc Fischlin</author>
<author pid="06/9">Michael Kasper</author>
<author pid="59/8243">Cristina Onete</author>
<title>A Formal Approach to Distance-Bounding RFID Protocols.</title>
<pages>47-62</pages>
<year>2011</year>
<booktitle>ISC</booktitle>
<ee>https://doi.org/10.1007/978-3-642-24861-0_4</ee>
<crossref>conf/isw/2011</crossref>
<url>db/conf/isw/isc2011.html#DurholzFKO11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/reconfig/FellerMKH11" mdate="2023-03-23">
<author pid="16/10124-2">Thomas Feller 0002</author>
<author pid="75/9860">Sunil Malipatlolla</author>
<author pid="06/9">Michael Kasper</author>
<author pid="h/SorinAHuss">Sorin A. Huss</author>
<title>dcTPM: A Generic Architecture for Dynamic Context Management.</title>
<pages>211-216</pages>
<year>2011</year>
<booktitle>ReConFig</booktitle>
<ee>https://doi.org/10.1109/ReConFig.2011.23</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ReConFig.2011.23</ee>
<crossref>conf/reconfig/2011</crossref>
<url>db/conf/reconfig/reconfig2011.html#FellerMKH11</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/DurholzFKO11" mdate="2024-10-06">
<author pid="88/10257">Ulrich D&#252;rholz</author>
<author pid="72/5460">Marc Fischlin</author>
<author pid="06/9">Michael Kasper</author>
<author orcid="0009-0009-4638-0639" pid="59/8243">Cristina Onete</author>
<title>A Formal Approach to Distance-Bounding RFID Protocols.</title>
<pages>321</pages>
<year>2011</year>
<volume>2011</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2011/321</ee>
<url>db/journals/iacr/iacr2011.html#DurholzFKO11</url>
</article>
</r>
<r><inproceedings key="conf/fpt/KasperSS10" mdate="2025-12-07">
<author pid="06/9">Michael Kasper</author>
<author orcid="0000-0002-3073-0106" pid="11/621">Werner Schindler</author>
<author orcid="0000-0001-7970-3945" pid="66/7913">Marc St&#246;ttinger</author>
<title>A stochastic method for security evaluation of cryptographic FPGA implementations.</title>
<pages>146-153</pages>
<year>2010</year>
<booktitle>FPT</booktitle>
<ee>https://doi.org/10.1109/FPT.2010.5681772</ee>
<crossref>conf/fpt/2010</crossref>
<url>db/conf/fpt/fpt2010.html#KasperSS10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wcnc/SchmidtKK08" mdate="2017-05-24">
<author pid="69/4749">Andreas U. Schmidt</author>
<author pid="33/6392">Nicolai Kuntze</author>
<author pid="06/9">Michael Kasper</author>
<title>On the Deployment of Mobile Trusted Modules.</title>
<pages>3169-3174</pages>
<year>2008</year>
<booktitle>WCNC</booktitle>
<ee>https://doi.org/10.1109/WCNC.2008.553</ee>
<crossref>conf/wcnc/2008</crossref>
<url>db/conf/wcnc/wcnc2008.html#SchmidtKK08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/informatiktage/Kasper07" mdate="2007-09-19">
<author pid="06/9">Michael Kasper</author>
<title>Virtualisation of a SIM-Card using trusted computing.</title>
<pages>171-178</pages>
<year>2007</year>
<crossref>conf/informatiktage/2007</crossref>
<booktitle>Informatiktage</booktitle>
<url>db/conf/informatiktage/informatiktage2007.html#Kasper07</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-0712-2113" mdate="2018-08-13">
<author pid="69/4749">Andreas U. Schmidt</author>
<author pid="33/6392">Nicolai Kuntze</author>
<author pid="06/9">Michael Kasper</author>
<title>On the deployment of Mobile Trusted Modules</title>
<ee type="oa">http://arxiv.org/abs/0712.2113</ee>
<year>2007</year>
<journal>CoRR</journal>
<volume>abs/0712.2113</volume>
<url>db/journals/corr/corr0712.html#abs-0712-2113</url>
</article>
</r>
<r><article key="journals/ras/KasperFSP01" mdate="2020-02-24">
<author pid="06/9">Michael Kasper</author>
<author pid="23/6677">Gernot Fricke</author>
<author pid="02/4379">Katja Steuernagel</author>
<author pid="71/4812">Ewald von Puttkamer</author>
<title>A behavior-based mobile robot architecture for Learning from Demonstration.</title>
<pages>153-164</pages>
<year>2001</year>
<volume>34</volume>
<journal>Robotics Auton. Syst.</journal>
<number>2-3</number>
<ee>https://doi.org/10.1016/S0921-8890(00)00119-6</ee>
<url>db/journals/ras/ras34.html#KasperFSP01</url>
</article>
</r>
<r><inproceedings key="conf/ams/PetersKEP00" mdate="2017-05-23">
<author pid="69/594">Frank Peters</author>
<author pid="06/9">Michael Kasper</author>
<author pid="85/4253">Mirko E&#223;ling</author>
<author pid="71/4812">Ewald von Puttkamer</author>
<title>Fl&#228;chendeckendes Explorieren und Navigieren in a priori unbekannter Umgebung mit low-cost Robotern.</title>
<pages>157-164</pages>
<year>2000</year>
<crossref>conf/ams/2000</crossref>
<booktitle>AMS</booktitle>
<url>db/conf/ams/ams2000.html#PetersKEP00</url>
<ee>https://doi.org/10.1007/978-3-642-59576-9_19</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/ams/KasperMP98" mdate="2017-05-23">
<author pid="06/9">Michael Kasper</author>
<author pid="58/1717">Dirk M&#252;ller</author>
<author pid="71/4812">Ewald von Puttkamer</author>
<title>Ein verhaltensorientierter Ansatz zum fl&#228;chendeckenden Fahren in a priori unbekannter Umgebung.</title>
<pages>180-187</pages>
<year>1998</year>
<crossref>conf/ams/1998</crossref>
<booktitle>AMS</booktitle>
<url>db/conf/ams/ams1998.html#KasperMP98</url>
<ee>https://doi.org/10.1007/978-3-642-60043-2_22</ee>
</inproceedings>
</r>
<coauthors n="62" nc="6">
<co c="3"><na f="b/Balachandran:Vivek" pid="124/8510">Vivek Balachandran</na></co>
<co c="3"><na f="b/Bartake:Nikhil" pid="402/5807">Nikhil Bartake</na></co>
<co c="-1"><na f="b/Brandt:Christian" pid="17/11435">Christian Brandt</na></co>
<co c="0"><na f="c/Chattopadhyay:Anupam" pid="99/4535">Anupam Chattopadhyay</na></co>
<co c="0"><na f="c/Chattopadhyay:Nandish" pid="249/8316">Nandish Chattopadhyay</na></co>
<co c="0"><na f="c/Clavier:Christophe" pid="75/5410">Christophe Clavier</na></co>
<co c="1"><na f="c/Correll:Nikolaus" pid="77/4665">Nikolaus Correll</na></co>
<co c="0"><na f="d/Danger:Jean=Luc" pid="52/4689">Jean-Luc Danger</na></co>
<co c="0"><na f="d/Duc:Guillaume" pid="02/6991">Guillaume Duc</na></co>
<co c="4"><na f="d/D=uuml=rholz:Ulrich" pid="88/10257">Ulrich D&#252;rholz</na></co>
<co c="0"><na f="e/Elaabid:M=_Abdelaziz" pid="17/8030">M. Abdelaziz Elaabid</na></co>
<co c="2"><na f="e/E=szlig=ling:Mirko" pid="85/4253">Mirko E&#223;ling</na></co>
<co c="1"><na f="f/Falquez:Juan_M=" pid="161/8133">Juan M. Falquez</na></co>
<co c="0"><na f="f/Feller_0002:Thomas" pid="16/10124-2">Thomas Feller 0002</na></co>
<co c="4"><na f="f/Fischlin:Marc" pid="72/5460">Marc Fischlin</na></co>
<co c="2"><na f="f/Fricke:Gernot" pid="23/6677">Gernot Fricke</na></co>
<co c="0"><na f="g/G=eacute=rard:Beno=icirc=t" pid="98/7591">Beno&#238;t G&#233;rard</na></co>
<co c="0"><na f="g/Guilley:Sylvain" pid="86/2396">Sylvain Guilley</na></co>
<co c="0"><na f="g/Gupta_0001:Naina" pid="83/7953-1">Naina Gupta 0001</na></co>
<co c="0"><na f="g/Gupta_0001:Sourav_Sen" pid="41/8030">Sourav Sen Gupta 0001</na></co>
<co c="1"><na f="h/Heckman:Christoffer_R=" pid="170/8568">Christoffer R. Heckman</na></co>
<co c="0"><na f="h/Heuser:Annelie" pid="68/10491">Annelie Heuser</na></co>
<co c="0"><na f="h/Huss:Sorin_A=" pid="h/SorinAHuss">Sorin A. Huss</na></co>
<co c="3"><na f="j/Jiawen:Carmen_Wong" pid="402/5136">Carmen Wong Jiawen</na></co>
<co c="3"><na f="j/Jie:See_Toh_Zi" pid="402/5961">See Toh Zi Jie</na></co>
<co c="0"><na f="k/Kr=auml=mer:Juliane" pid="39/8933">Juliane Kr&#228;mer</na></co>
<co c="0"><na f="k/Krau=szlig=:Christoph" pid="34/4605">Christoph Krau&#223;</na></co>
<co c="0"><na f="k/Kuhlmann:Dirk" pid="11/6019">Dirk Kuhlmann</na></co>
<co c="0"><na f="k/Kumar:Vinay_B=_Y=" pid="39/3973">Vinay B. Y. Kumar</na></co>
<co c="5"><na f="k/Kuntze:Nicolai" pid="33/6392">Nicolai Kuntze</na></co>
<co c="0"><na f="l/Li_0001:Yang" pid="37/4190-1">Yang Li 0001</na></co>
<co c="0"><na f="l/Lomn=eacute=:Victor" pid="52/2113">Victor Lomn&#233;</na></co>
<co c="0"><na f="m/Malipatlolla:Sunil" pid="75/9860">Sunil Malipatlolla</na></co>
<co c="0"><na f="m/Mangard:Stefan" pid="91/4831">Stefan Mangard</na></co>
<co c="2"><na f="m/M=uuml=ller:Dirk" pid="58/1717">Dirk M&#252;ller</na></co>
<co c="0"><na f="n/Nakatsu:Daisuke" pid="15/8190">Daisuke Nakatsu</na></co>
<co c="0"><na f="n/Niederhagen:Ruben" pid="62/7604">Ruben Niederhagen</na></co>
<co c="1"><na f="n/Nobre:Fernando" pid="203/4879">Fernando Nobre</na></co>
<co c="0"><na f="o/Ohta:Kazuo" pid="73/5993">Kazuo Ohta</na></co>
<co c="4"><na f="o/Onete:Cristina" pid="59/8243">Cristina Onete</na></co>
<co c="2"><na f="p/Peters:Frank" pid="69/594">Frank Peters</na></co>
<co c="2"><na f="p/Puttkamer:Ewald_von" pid="71/4812">Ewald von Puttkamer</na></co>
<co c="0"><na f="r/Reith:Steffen" pid="09/1548">Steffen Reith</na></co>
<co c="3"><na f="r/Ren:Declan_Fong_Yi" pid="424/2453">Declan Fong Yi Ren</na></co>
<co c="0"><na f="s/Sakiyama:Kazuo" pid="04/4429">Kazuo Sakiyama</na></co>
<co c="0"><na f="s/Santis:Fabrizio_De" pid="00/7653">Fabrizio De Santis</na></co>
<co c="0"><na f="s/Sauvage:Laurent" pid="46/6459">Laurent Sauvage</na></co>
<co c="0"><na f="s/Schindler:Werner" pid="11/621">Werner Schindler</na></co>
<co c="5"><na f="s/Schmidt:Andreas_U=" pid="69/4749">Andreas U. Schmidt</na></co>
<co c="0"><na f="s/Seifert:Jean=Pierre" pid="98/117">Jean-Pierre Seifert</na></co>
<co c="1"><na f="s/Sibley:Gabe" pid="11/6079">Gabe Sibley</na></co>
<co c="0"><na f="s/Sigl:Georg" pid="89/4621">Georg Sigl</na></co>
<co c="0"><na f="s/Stein:Oliver" pid="61/5648">Oliver Stein</na></co>
<co c="2"><na f="s/Steuernagel:Katja" pid="02/4379">Katja Steuernagel</na></co>
<co c="0"><na f="s/St=ouml=ttinger:Marc" pid="66/7913">Marc St&#246;ttinger</na></co>
<co c="0"><na f="v/Veyrat=Charvillon:Nicolas" pid="02/3809">Nicolas Veyrat-Charvillon</na></co>
<co c="0"><na f="w/Waidner:Michael" pid="90/308">Michael Waidner</na></co>
<co c="0"><na f="w/Walle:Matthieu" pid="130/1408">Matthieu Walle</na></co>
<co c="0"><na f="w/Weber:Arnd" pid="15/1879">Arnd Weber</na></co>
<co c="0"><na f="w/Wurcker:Antoine" pid="136/4549">Antoine Wurcker</na></co>
<co c="1"><na f="y/Yeh:Tom" pid="05/6465">Tom Yeh</na></co>
<co c="0"><na f="z/Zohner:Michael" pid="73/11043">Michael Zohner</na></co>
</coauthors>
</dblpperson>

