Get my own profile
Public access
View all40 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Ufuk TopcuThe University of Texas at AustinVerified email at utexas.edu
- Roderick BloemGraz University of TechnologyVerified email at iaik.tugraz.at
- Bettina KönighoferAssistant Professor, Graz University of Technology, AustriaVerified email at iaik.tugraz.at
- Hadas Kress-GazitCornell UniversityVerified email at cornell.edu
- Robert KönighoferGraz University of TechnologyVerified email at iaik.tugraz.at
- Hans-Jörg PeterSiemens EDAVerified email at siemens.com
- Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Scott NiekumAssociate Professor, University of Massachusetts AmherstVerified email at cs.umass.edu
- Mohammed AlshiekhResearcher at University of Texas at AustinVerified email at utexas.edu
- Stéphane LafortuneProfessor of Electrical Engineering and Computer Science, University of Michigan, USAVerified email at umich.edu
- Vasumathi RamanVerified email at cds.caltech.edu
- Stavros TripakisAssociate Professor, Northeastern UniversityVerified email at northeastern.edu
- Moshe Y. VardiRice UniversityVerified email at cs.rice.edu
- Michael GerkeSchloss Dagstuhl - Leibniz-Zentrum für InformatikVerified email at dagstuhl.de
- Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusVerified email at cispa.saarland
- Kai Weng Wong (Catherine Wong)Cornell UniversityVerified email at cornell.edu
- Robert MattmüllerUniversity of Freiburg, GermanyVerified email at robert-mattmueller.de
- Min WenGoogleVerified email at google.com
- Leander TentrupSaarland University, Saarland Informatics CampusVerified email at cs.uni-saarland.de
- Adam WalkerNICTA/UNSWVerified email at nicta.com.au