Get my own profile
Public access
View all21 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Daniel NeiderTU Dortmund University and Center for Trustworthy Data Science and SecurityVerified email at tu-dortmund.de
Alexander WeinertResearch Group Lead Distributed Systems, German Aerospace CenterVerified email at dlr.de
Karoliina LehtinenCNRS, Aix-Marseille Université, LISVerified email at lis-lab.fr
Nathanaël FijalkowCNRS, LaBRI, Bordeaux, and University of WarsawVerified email at labri.fr
Peter FaymonvilleITK EngineeringVerified email at faymonville.de
Patrick TotzkeUniversity of LiverpoolVerified email at liverpool.ac.uk
Satya Prakash NayakPhD in Computer Science, Max Planck Institute for Software SystemsVerified email at mpi-sws.org
Wolfgang ThomasProf of Computer Science, RWTH Aachen UniversityVerified email at cs.rwth-aachen.de
Florian HornChargé de Recherches, IRIF, CNRS & Université Paris Diderot - Paris 7Verified email at irif.fr
Leander TentrupSaarland University, Saarland Informatics CampusVerified email at cs.uni-saarland.de
Ismaël JeckerInstitute of Science and Technology, AustriaVerified email at ist.ac.at
Arne MeierPrivatdozent, Institute of Theoretical Computer Science, Leibniz Universität HannoverVerified email at thi.uni-hannover.de
Roman RabinovichTechnische Universität BerlinVerified email at tu-berlin.de
Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusVerified email at cispa.saarland
Wladimir FridmanRWTH Aachen UniversityVerified email at automata.rwth-aachen.de
Corto MascleLaBRIVerified email at labri.fr
Louwe B. KuijerUniversity of LiverpoolVerified email at liv.ac.uk
Sarah WinterIRIFVerified email at irif.fr
Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Jonni VirtemaLecturer, University of Sheffield, UKVerified email at sheffield.ac.uk