Get my own profile
Public access
View all28 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Steve KremerInriaVerified email at inria.fr
Bruno BlanchetSenior researcher, INRIA, ParisVerified email at inria.fr
Stéphanie DelauneUniv Rennes, CNRS, IRISAVerified email at irisa.fr
Véronique CortierCNRS, LORIAVerified email at loria.fr
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
Hubert Comon-LundhComputer Science professor, ENS CachanVerified email at lsv.ens-cachan.fr
Jiangshan Yu (于江山)Associate Professor, University of SydneyVerified email at sydney.edu.au
Myrto ArapinisSchool of Informatics, University of EdinburghVerified email at inf.ed.ac.uk
Stefan CiobacaAlexandru Ioan Cuza UniversityVerified email at info.uaic.ro
Rohit ChadhaUniversity of MissouriVerified email at missouri.edu
Charlie JacommeUniversité de Lorraine, LORIA, Inria Nancy Grand-EstVerified email at inria.fr
Karthikeyan BhargavanINRIAVerified email at inria.fr
Christopher A. WoodRIT, UCI, Cloudflare, AppleVerified email at heapingbits.net
Kushal BabelPhD Student, Cornell UniversityVerified email at cornell.edu
Lucca HirschiTenured Inria Researcher @ LoriaVerified email at inria.fr
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
Alexander DaxPhD Student, Saarland University, CISPA Helmholtz Center for Information SecurityVerified email at stud.uni-saarland.de
Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de