Crea il mio profilo
Accesso pubblico
Visualizza tutto43 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Igor KonnovIndependent Security and Formal Methods ResearcherEmail verificata su konnov.phd
- Helmut VeithProfessor of Computer Science, Vienna University of Technology / TU WienEmail verificata su forsyte.tuwien.ac.at
- Marijana LazićPostdoc, TU MünchenEmail verificata su in.tum.de
- Roderick BloemGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Ayrat KhalimovTU ClausthalEmail verificata su tu-clausthal.de
- Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusEmail verificata su cispa.saarland
- Martin BielyGoogleEmail verificata su google.com
- Jennifer Lundelius WelchProfessor, Department of Computer Science and Engineering, Texas A&M UniversityEmail verificata su cse.tamu.edu
- Matthias FüggerCNRS & LMF, ENS Paris-Saclay & InriaEmail verificata su lsv.fr
- Florian ZulegerAssociate Professor, TU WienEmail verificata su forsyte.tuwien.ac.at
- Damien ZuffereyResearch Group Leader, Max Planck Institute for Software SystemsEmail verificata su mpi-sws.org
- Andre SchiperProfessor, School of Communication and Computer Science, EPFLEmail verificata su epfl.ch
- Thomas HenzingerIST AustriaEmail verificata su ist.ac.at
- Emmanuelle AnceaumeResearcher at CNRS - UMR 6074Email verificata su irisa.fr
- Srikanth SastryGoogle IncEmail verificata su csail.mit.edu