Get my own profile
Public access
View all32 articles
1 article
available
not available
Based on funding mandates
Co-authors
Roderick BloemGraz University of TechnologyVerified email at iaik.tugraz.at
Ayrat KhalimovTU ClausthalVerified email at tu-clausthal.de
Sasha RubinUniversity of SydneyVerified email at sydney.edu.au
Helmut VeithProfessor of Computer Science, Vienna University of Technology / TU WienVerified email at forsyte.tuwien.ac.at
Josef WidderInformal SystemsVerified email at informal.systems
Viorica Sofronie-StokkermansProfessor, University of KoblenzVerified email at uni-koblenz.de
Leander TentrupSaarland University, Saarland Informatics CampusVerified email at cs.uni-saarland.de
Guillermo A. PérezAssociate Professor, University of AntwerpVerified email at uantwerp.be
Mouhammad SakrPostdoctoral Researcher, CritiX, Luxembourg UniversityVerified email at uni.lu
Ocan SankurCNRS, Université de RennesVerified email at cnrs.fr
Robert KönighoferGraz University of TechnologyVerified email at iaik.tugraz.at
Igor KonnovIndependent Security and Formal Methods ResearcherVerified email at konnov.phd
Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Jean-François RaskinUniversité Libre de Bruxelles, U.L.B.Verified email at ulb.ac.be
Roopsha SamantaAssistant Professor, Purdue UniversityVerified email at purdue.edu
Adam WalkerNICTA/UNSWVerified email at nicta.com.au
Milind KulkarniAssociate Professor of Electrical and Computer Engineering, Purdue UniversityVerified email at purdue.edu
Romain BrenguierUniversity of OxfordVerified email at cs.ox.ac.uk
Christopher WagnerPurdue UniversityVerified email at purdue.edu
Viktor KunčakEPFLVerified email at epfl.ch