Get my own profile
Public access
View all29 articles
1 article
available
not available
Based on funding mandates
Co-authors
Madhusudan ParthasarathyProfessor of Computer Science, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Pranav GargAmazonVerified email at amazon.com
Ufuk TopcuThe University of Texas at AustinVerified email at utexas.edu
Martin ZimmermannAalborg UniversityVerified email at cs.aau.dk
Zhe XuAssistant Professor, Arizona State UniversityVerified email at asu.edu
Martin LeuckerProfessor of Computer Science, University of LübeckVerified email at isp.uni-luebeck.de
Benedikt BolligCNRS, LMF, ENS Paris-Saclay, Université Paris-SaclayVerified email at lsv.ens-cachan.fr
Paulo TabuadaVijay K. Dhir Professor of Engineering, UCLAVerified email at ee.ucla.edu
Alexander WeinertResearch Group Lead Distributed Systems, German Aerospace CenterVerified email at dlr.de
Dan RothProfessor of Computer Science, University of PennsylvaniaVerified email at seas.upenn.edu
Tzanis AnevlavisUCLAVerified email at ucla.edu
Alain FinkelLSV ENS Paris SaclayVerified email at lsv.fr
Joost-Pieter KatoenDistinguished Professor of Computer Science, RWTH Aachen University and University of TwenteVerified email at cs.rwth-aachen.de
Roman RabinovichTechnische Universität BerlinVerified email at tu-berlin.de
Rupak MajumdarMPI for Software SystemsVerified email at mpi-sws.org
Deepak D'SouzaDepartment of CSA, Indian Institute of ScienceVerified email at iisc.ac.in
Emmanuel MüllerProfessor of Computer Science, Technical University of DortmundVerified email at cs.tu-dortmund.de
Frits W. VaandragerProfessor of Computer Science, Radboud UniversityVerified email at cs.ru.nl
Maximilian SchwengerCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Nils JansenAssociate Professor, Radboud University NijmegenVerified email at science.ru.nl
Follow

Daniel Neider
TU Dortmund University and Center for Trustworthy Data Science and Security
Verified email at tu-dortmund.de