Get my own profile
Public access
View all27 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Daniel NeiderTU Dortmund University and Center for Trustworthy Data Science and SecurityVerified email at tu-dortmund.de
Alexander WeinertResearch Group Lead Distributed Systems, German Aerospace CenterVerified email at dlr.de
Karoliina LehtinenCNRS, Aix-Marseille Université, LISVerified email at lis-lab.fr
Arne MeierPrivatdozent, Institute of Theoretical Computer Science, Leibniz Universität HannoverVerified email at thi.uni-hannover.de
Kim G. LarsenDirector, Professor Aalborg UniversityVerified email at cs.aau.dk
Ismaël JeckerInstitute of Science and Technology, AustriaVerified email at ist.ac.at
Shibashis GuhaReader, Tata Institute of Fundamental Research MumbaiVerified email at tifr.res.in
Satya Prakash NayakPhD in Computer Science, Max Planck Institute for Software SystemsVerified email at mpi-sws.org
Nathanaël FijalkowCNRS, LaBRI, BordeauxVerified email at labri.fr
Patrick TotzkeUniversity of LiverpoolVerified email at liverpool.ac.uk
Jonni VirtemaLecturer, University of Sheffield, UKVerified email at sheffield.ac.uk
Peter FaymonvilleITK EngineeringVerified email at faymonville.de
Wolfgang ThomasProf of Computer Science, RWTH Aachen UniversityVerified email at cs.rwth-aachen.de
Florian HornChargé de Recherches, IRIF, CNRS & Université Paris CitéVerified email at irif.fr
Corto MascleLaBRIVerified email at labri.fr
Leander TentrupSaarland University, Saarland Informatics CampusVerified email at cs.uni-saarland.de
Sarah WinterIRIFVerified email at irif.fr
Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusVerified email at cispa.saarland
Wladimir FridmanRWTH Aachen UniversityVerified email at automata.rwth-aachen.de
Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de