Get my own profile
Public access
View all32 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Roderick BloemGraz University of TechnologyVerified email at iaik.tugraz.at
- Ayrat KhalimovTU ClausthalVerified email at tu-clausthal.de
- Sasha RubinUniversity of SydneyVerified email at sydney.edu.au
- Helmut VeithProfessor of Computer Science, Vienna University of Technology / TU WienVerified email at forsyte.tuwien.ac.at
- Josef WidderInformal SystemsVerified email at informal.systems
- Viorica Sofronie-StokkermansProfessor, University of KoblenzVerified email at uni-koblenz.de
- Leander TentrupSaarland University, Saarland Informatics CampusVerified email at cs.uni-saarland.de
- Guillermo A. PérezAssociate Professor, University of AntwerpVerified email at uantwerp.be
- Mouhammad SakrPostdoctoral Researcher, CritiX, Luxembourg UniversityVerified email at uni.lu
- Ocan SankurCNRS, Université de RennesVerified email at cnrs.fr
- Robert KönighoferGraz University of TechnologyVerified email at iaik.tugraz.at
- Igor KonnovIndependent Security and Formal Methods ResearcherVerified email at konnov.phd
- Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Jean-François RaskinUniversité Libre de Bruxelles, U.L.B.Verified email at ulb.ac.be
- Roopsha SamantaAssistant Professor, Purdue UniversityVerified email at purdue.edu
- Adam WalkerNICTA/UNSWVerified email at nicta.com.au
- Milind KulkarniAssociate Professor of Electrical and Computer Engineering, Purdue UniversityVerified email at purdue.edu
- Romain BrenguierUniversity of OxfordVerified email at cs.ox.ac.uk
- Christopher WagnerPurdue UniversityVerified email at purdue.edu
- Viktor KunèakEPFLVerified email at epfl.ch