Get my own profile
Public access
View all6 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Gerhard W DueckProfessor of Computer Science, University of New BrunswickVerified email at unb.ca
Mitchell A ThorntonSouthern Methodist University, Darwin Deason Institute for Cyber SecurityVerified email at ieee.org
Jon MuzioProfessor of Computer Science, University of VictoriaVerified email at cs.uvic.ca
Rolf DrechslerProfessor at University of Bremen, Director DFKI Bremen, GermanyVerified email at uni-bremen.de
Dmitri MaslovGoogleVerified email at google.com
Robert WilleTechnical University of Munich and SCCH GmbHVerified email at tum.de
Mathias SoekenMicrosoftVerified email at epfl.ch
Elena DubrovaRoyal Institute of Technology (KTH), Stockholm, SwedenVerified email at kth.se
Robert D McLeodUniversity of ManitobaVerified email at umanitoba.ca
Micaela SerraProfessor of Computer Science, University of VictoriaVerified email at uvic.ca
Svetlana YanushkevichProfessor, University of CalgaryVerified email at ucalgary.ca
Shigeru YamashitaRitsumeikan UniversityVerified email at cs.ritsumei.ac.jp
Shin-ichi MinatoKyoto UniversityVerified email at i.kyoto-u.ac.jp
Daniel GrosseFull Professor at Johannes Kepler University LinzVerified email at jku.at
martin lukacHiroshima City UniversityVerified email at s.hiroshima-cu.ac.jp
Follow![David Michael Miller](https://usercontent.cljtscd.com/citations?view_op=view_photo&user=7431nC8AAAAJ&citpid=6)
David Michael Miller
Professor Emeritus of Computer Science, University of Victoria
Verified email at uvic.ca