Get my own profile
Public access
View all6 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusVerified email at cispa.saarland
- Roderick BloemGraz University of TechnologyVerified email at iaik.tugraz.at
- Sasha RubinUniversity of SydneyVerified email at sydney.edu.au
- Josef WidderInformal SystemsVerified email at informal.systems
- Helmut VeithProfessor of Computer Science, Vienna University of Technology / TU WienVerified email at forsyte.tuwien.ac.at
- Igor KonnovIndependent Security and Formal Methods ResearcherVerified email at konnov.phd
- Emmanuel FiliotFNRS - Université Libre de BruxellesVerified email at ulb.ac.be
- Léo ExibardAssistant professor at LIGM, Université Gustave EiffelVerified email at univ-eiffel.fr
- Orna KupfermanProfessor of Computer Science, The Hebrew UniversityVerified email at cs.huji.ac.il
- Sven ScheweProfessor of Computer Science, University of LiverpoolVerified email at liverpool.ac.uk