Get my own profile
Public access
View all23 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Daniel NeiderTU Dortmund University and Center for Trustworthy Data Science and SecurityVerified email at tu-dortmund.de
Alexander WeinertResearch Group Lead Distributed Systems, German Aerospace CenterVerified email at dlr.de
Karoliina LehtinenCNRS, Aix-Marseille Université, LISVerified email at lis-lab.fr
Nathanaël FijalkowCNRS, LaBRI, Bordeaux, and University of WarsawVerified email at labri.fr
Peter FaymonvilleZF GroupVerified email at faymonville.de
Wolfgang ThomasProf of Computer Science, RWTH Aachen UniversityVerified email at cs.rwth-aachen.de
Florian HornChargé de Recherches, IRIF, CNRS & Université Paris Diderot - Paris 7Verified email at irif.fr
Leander TentrupSaarland University, Saarland Informatics CampusVerified email at cs.uni-saarland.de
Patrick TotzkeUniversity of LiverpoolVerified email at liverpool.ac.uk
Roman RabinovichTechnische Universität BerlinVerified email at tu-berlin.de
Arne MeierPrivatdozent, Institute of Theoretical Computer Science, Leibniz Universität HannoverVerified email at thi.uni-hannover.de
Wladimir FridmanRWTH Aachen UniversityVerified email at automata.rwth-aachen.de
Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusVerified email at cispa.saarland
Ismaël JeckerInstitute of Science and Technology, AustriaVerified email at ist.ac.at
Corto MascleLaBRIVerified email at labri.fr
Satya Prakash NayakPhD in Computer Science, Max Planck Institute for Software SystemsVerified email at mpi-sws.org
John FearnleyUniversity of LiverpoolVerified email at liverpool.ac.uk
Louwe B. KuijerUniversity of LiverpoolVerified email at liv.ac.uk
Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Jonni VirtemaLecturer, University of Sheffield, UKVerified email at sheffield.ac.uk