Get my own profile
Public access
View all31 articles
1 article
available
not available
Based on funding mandates
Co-authors
Roderick BloemGraz University of TechnologyVerified email at iaik.tugraz.at
Ayrat KhalimovTU ClausthalVerified email at tu-clausthal.de
Sasha RubinUniversity of SydneyVerified email at sydney.edu.au
Helmut VeithProfessor of Computer Science, Vienna University of Technology / TU WienVerified email at forsyte.tuwien.ac.at
Josef WidderInformal SystemsVerified email at informal.systems
Viorica Sofronie-StokkermansProfessor, University of KoblenzVerified email at uni-koblenz.de
Leander TentrupSaarland University, Saarland Informatics CampusVerified email at cs.uni-saarland.de
Guillermo A. PérezAssociate Professor, University of AntwerpVerified email at uantwerp.be
Mouhammad SakrPostdoctoral Researcher, CritiX, Luxembourg UniversityVerified email at uni.lu
Robert KönighoferGraz University of TechnologyVerified email at iaik.tugraz.at
Ocan SankurCNRS, Université de RennesVerified email at irisa.fr
Igor KonnovIndependent Security and Formal Methods ResearcherVerified email at konnov.phd
Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Jean-François RaskinUniversité Libre de Bruxelles, U.L.B.Verified email at ulb.ac.be
Adam WalkerNICTA/UNSWVerified email at nicta.com.au
Roopsha SamantaAssistant Professor, Purdue UniversityVerified email at purdue.edu
Romain BrenguierUniversity of OxfordVerified email at cs.ox.ac.uk
Milind KulkarniAssociate Professor of Electrical and Computer Engineering, Purdue UniversityVerified email at purdue.edu
Viktor KunèakEPFLVerified email at epfl.ch
Martina SeidlUniv.-Prof., JKU LinzVerified email at jku.at