Get my own profile
Public access
View all44 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Steve KremerInriaVerified email at inria.fr
Véronique CortierCNRS, LORIAVerified email at loria.fr
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
Hubert Comon-LundhComputer Science professor, ENS CachanVerified email at lsv.ens-cachan.frVincent ChevalUniversity of Oxford, United KingdomVerified email at cs.ox.ac.uk
Graham SteelINRIAVerified email at cryptosense.com
Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
Myrto ArapinisSchool of Informatics, University of EdinburghVerified email at inf.ed.ac.uk
Mathilde ArnaudCEA, FranceVerified email at cea.frBen SmythFounder-CEO, x26.ioVerified email at bensmyth.com
Sergiu BursucBeneficial AI FoundationVerified email at beneficialaifoundation.org
Ștefan CiobâcăAlexandru Ioan Cuza UniversityVerified email at info.uaic.ro
Rohit ChadhaUniversity of MissouriVerified email at missouri.edu
Céline ChevalierAssistant Professor of Computer Science, Université Paris 2Verified email at ens.fr
Olivier PereiraUCLouvainVerified email at uclouvain.be