Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
Alwen TiuSchool of Computing, The Australian National UniversityVerified email at anu.edu.au
Gabriel CiobanuRomanian Academy, IasiVerified email at iit.academiaromana-is.ro
Vladimiro SassoneUniversity of SouthamptonVerified email at ecs.soton.ac.uk
Bogdan AmanInstitute of Computer Science, Romanian Academy AND Faculty of Computer Science, UAIC, Iasi, RomaniaVerified email at iit.academiaromana-is.ro
Matteo AcclavioUniversity of Southern DenmarkVerified email at imada.sdu.dk
Lutz StraßburgerInriaVerified email at lix.polytechnique.fr
Ki Yung AhnAssistant Professor of Computer Engineering at Hannam University, Daejeon, KoreaVerified email at hnu.kr
Mariangiola Dezani-CiancagliniEmeritus Professor of Computer Science, Torino UniversityVerified email at di.unito.it
Rob van GlabbeekUNSWVerified email at cs.stanford.edu
Peter HöfnerAustralian National University (ANU)Verified email at hoefner-online.de
Shang-Wei LinAssistant Professor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Ilaria CastellaniResearcher in Theoretical Computer Science, INRIA, FranceVerified email at inria.fr
Nicholas GibbinsLecturer in Computer Science, University of SouthamptonVerified email at ecs.soton.ac.uk
cristian vaideanuAssistant Professor, University "Al. I. Cuza " of Iasi Verified email at uaic.ro