Get my own profile
Public access
View all27 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Steve KremerInriaVerified email at inria.fr
- Bruno BlanchetSenior researcher, INRIA, ParisVerified email at inria.fr
- Stéphanie DelauneUniv Rennes, CNRS, IRISAVerified email at irisa.fr
- Véronique CortierCNRS, LORIAVerified email at loria.fr
- Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
- Hubert Comon-LundhComputer Science professor, ENS CachanVerified email at lsv.ens-cachan.fr
- Jiangshan Yu (于江山)Associate Professor, University of SydneyVerified email at sydney.edu.au
- Myrto ArapinisSchool of Informatics, University of EdinburghVerified email at inf.ed.ac.uk
- Stefan CiobacaAlexandru Ioan Cuza UniversityVerified email at info.uaic.ro
- Rohit ChadhaUniversity of MissouriVerified email at missouri.edu
- Charlie JacommeUniversité de Lorraine, LORIA, Inria Nancy Grand-EstVerified email at inria.fr
- Kushal BabelPhD Student, Cornell UniversityVerified email at cornell.edu
- Karthikeyan BhargavanINRIAVerified email at inria.fr
- Christopher A. WoodRIT, UCI, Cloudflare, AppleVerified email at heapingbits.net
- Lucca HirschiTenured Inria Researcher @ LoriaVerified email at inria.fr
- Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
- Alexander DaxPhD Student, Saarland University, CISPA Helmholtz Center for Information SecurityVerified email at stud.uni-saarland.de
- Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de