Get my own profile
Public access
View all22 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Daniel NeiderTU Dortmund University and Center for Trustworthy Data Science and SecurityVerified email at tu-dortmund.de
Alexander WeinertResearch Group Lead Distributed Systems, German Aerospace CenterVerified email at dlr.de
Karoliina LehtinenCNRS, Aix-Marseille Université, LISVerified email at lis-lab.fr
Ismaël JeckerInstitute of Science and Technology, AustriaVerified email at ist.ac.at
Shibashis GuhaReader, Tata Institute of Fundamental Research MumbaiVerified email at tifr.res.in
Nathanaël FijalkowCNRS, LaBRI, Bordeaux, and University of WarsawVerified email at labri.fr
Satya Prakash NayakPhD in Computer Science, Max Planck Institute for Software SystemsVerified email at mpi-sws.org
Peter FaymonvilleITK EngineeringVerified email at faymonville.de
Arne MeierPrivatdozent, Institute of Theoretical Computer Science, Leibniz Universität HannoverVerified email at thi.uni-hannover.de
Wolfgang ThomasProf of Computer Science, RWTH Aachen UniversityVerified email at cs.rwth-aachen.de
Florian HornChargé de Recherches, IRIF, CNRS & Université Paris Diderot - Paris 7Verified email at irif.fr
Leander TentrupSaarland University, Saarland Informatics CampusVerified email at cs.uni-saarland.de
Kim G. LarsenDirector, Professor Aalborg UniversityVerified email at cs.aau.dk
Sarah WinterIRIFVerified email at irif.fr
Corto MascleLaBRIVerified email at labri.fr
Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusVerified email at cispa.saarland
Wladimir FridmanRWTH Aachen UniversityVerified email at automata.rwth-aachen.de
Patrick TotzkeUniversity of LiverpoolVerified email at liverpool.ac.uk
Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Roman RabinovichTechnische Universität BerlinVerified email at tu-berlin.de