Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
Alwen TiuSchool of Computing, The Australian National UniversityVerified email at anu.edu.au
Gabriel CiobanuRomanian Academy, IasiVerified email at iit.academiaromana-is.ro
Vladimiro SassoneUniversity of SouthamptonVerified email at ecs.soton.ac.uk
Lutz StraßburgerInriaVerified email at lix.polytechnique.fr
Bogdan AmanInstitute of Computer Science, Romanian Academy AND Faculty of Computer Science, UAIC, Iasi, RomaniaVerified email at iit.academiaromana-is.ro
Ki Yung AhnAssistant Professor of Computer Engineering at Hannam University, Daejeon, KoreaVerified email at hnu.kr
Mariangiola Dezani-CiancagliniEmeritus Professor of Computer Science, Torino UniversityVerified email at di.unito.it
Andrzej MizeraPost-doc, University of LuxembourgVerified email at uni.lu
Christian JohansenProfessor at NTNU - Norwegian University of Science and TechnologyVerified email at ntnu.no
Rob van GlabbeekUNSWVerified email at cs.stanford.edu
Peter HöfnerAustralian National University (ANU)Verified email at hoefner-online.de
Ilaria CastellaniResearcher in Computer Science, INRIA, FranceVerified email at inria.fr
Paola GianniniUniversita' Piemonte OrientaleVerified email at uniupo.it
Nicholas GibbinsLecturer in Computer Science, University of SouthamptonVerified email at ecs.soton.ac.uk
cristian vaideanuAssistant Professor, University "Al. I. Cuza " of Iasi Verified email at uaic.ro
Clément AubertAugusta University, GA, USAVerified email at math.cnrs.fr
Bart BuelensFlemish Institute for Technological Research (VITO)Verified email at vito.be
Christian EspositoUniversity of SalernoVerified email at unisa.it
Rolando Trujillo RasúaRamon i Cajal ResearcherVerified email at urv.cat