Get my own profile
Public access
View all34 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mikkel AbrahamsenAssociate Professor of Computer Science, University of CopenhagenVerified email at di.ku.dk
Linda KleistUniversität HamburgVerified email at uni-hamburg.de
Édouard BonnetENS Lyon, LIP, FranceVerified email at ens-lyon.fr
Paweł RzążewskiWarsaw University of Technology, Faculty of Mathematics and Information ScienceVerified email at mini.pw.edu.pl
Anna AdamaszekPostdoc, University of CopenhagenVerified email at di.ku.dk
Jeff EricksonProfessor of Computer Science, University of Illinois Urbana-ChampaignVerified email at illinois.edu
michael Gene dobbinsBinghamton UniversityVerified email at binghamton.eduDániel MarxCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Ivor van der HoogIT University of CopenhagenVerified email at itu.dk
Stefan FelsnerProfessor für Diskrete Mathematik, TU BerlinVerified email at math.tu-berlin.de
Simon WeberEx-ETH ZurichVerified email at inf.ethz.ch
Andrei AsinowskiUniversity of Klagenfurt, AustriaVerified email at aau.atJean CardinalUniversité libre de Bruxelles (ULB)Verified email at ulb.be
Anna LubiwProfessor, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Debajyoti MondalAssociate Professor of Computer Science, University of Saskatchewan, CanadaVerified email at cs.usask.ca
Jordi VermeulenUtrecht UniversityVerified email at uu.nl
Michael HoffmannETH ZürichVerified email at inf.ethz.chDaniel BertschingerSenior Business ConsultantVerified email at eraneos.com
Paul JungeblutKarlsruhe Institute of TechnologyVerified email at kit.edu
Yoshio OkamotoUniversity of Electro-CommunicationsVerified email at uec.ac.jp