Get my own profile
Public access
View all6 articles
1 article
available
not available
Based on funding mandates
Co-authors
Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusVerified email at cispa.saarland
Roderick BloemGraz University of TechnologyVerified email at iaik.tugraz.at
Sasha RubinUniversity of SydneyVerified email at sydney.edu.au
Josef WidderInformal SystemsVerified email at informal.systems
Helmut VeithProfessor of Computer Science, Vienna University of Technology / TU WienVerified email at forsyte.tuwien.ac.at
Igor KonnovIndependent Security and Formal Methods ResearcherVerified email at konnov.phd
Emmanuel FiliotFNRS - Université Libre de BruxellesVerified email at ulb.ac.be
Léo ExibardAssistant professor at LIGM, Université Gustave EiffelVerified email at univ-eiffel.fr
Orna KupfermanProfessor of Computer Science, The Hebrew UniversityVerified email at cs.huji.ac.il
Sven ScheweProfessor of Computer Science, University of LiverpoolVerified email at liverpool.ac.uk