Get my own profile
Public access
View all22 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Steve KremerInriaVerified email at inria.fr
Bruno BlanchetSenior researcher, INRIA ParisVerified email at inria.fr
Stéphanie DelauneUniv Rennes, CNRS, IRISAVerified email at irisa.fr
Véronique CortierCNRS, LORIAVerified email at loria.fr
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
Hubert Comon-LundhComputer Science professor, ENS CachanVerified email at lsv.ens-cachan.fr
Jiangshan Yu (于江山)ARC DECRA Fellow and Senior Lecturer, Monash UniversityVerified email at monash.edu
Myrto ArapinisSchool of Informatics, University of EdinburghVerified email at inf.ed.ac.uk
Stefan CiobacaAlexandru Ioan Cuza UniversityVerified email at info.uaic.ro
Rohit ChadhaUniversity of MissouriVerified email at missouri.edu
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk