Get my own profile
Public access
View all60 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Bettina KönighoferAssistant Professor, Graz University of Technology, AustriaVerified email at iaik.tugraz.at
- Robert KönighoferGraz University of TechnologyVerified email at iaik.tugraz.at
- Barbara JobstmannScientist at EPFLVerified email at epfl.ch
- Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusVerified email at cispa.saarland
- Fabio SomenziProfessor, University of Colorado BoulderVerified email at colorado.edu
- Ayrat KhalimovTU ClausthalVerified email at tu-clausthal.de
- Helmut VeithProfessor of Computer Science, Vienna University of Technology / TU WienVerified email at forsyte.tuwien.ac.at
- Thomas HenzingerIST AustriaVerified email at ist.ac.at
- Ruediger EhlersClausthal University of TechnologyVerified email at tu-clausthal.de
- Andreas GriesmayerImperial College LondonVerified email at arm.com
- Ufuk TopcuThe University of Texas at AustinVerified email at utexas.edu
- Goerschwin FeyHamburg University of TechnologyVerified email at tuhh.de
- Marco RoveriUniversity of Trento - Department of Information Engineering and Computer ScienceVerified email at unitn.it
- Krishnendu ChatterjeeProfessor, IST AustriaVerified email at ist.ac.at
- Ingo PillExternal Lecturer Graz University of TechnologyVerified email at ist.tugraz.at
- Josef WidderInformal SystemsVerified email at informal.systems
- Martin TapplerTU WienVerified email at tuwien.ac.at
- Rolf DrechslerProfessor at University of Bremen, Director DFKI Bremen, GermanyVerified email at uni-bremen.de
- Martina SeidlUniv.-Prof., JKU LinzVerified email at jku.at
- Sasha RubinUniversity of SydneyVerified email at sydney.edu.au