Get my own profile
Public access
View all19 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Stéphanie DelauneUniv Rennes, CNRS, IRISAVerified email at irisa.fr
Steve KremerInriaVerified email at inria.fr
Bruno BlanchetSenior researcher, INRIA ParisVerified email at inria.fr
Véronique CortierCNRS, LORIAVerified email at loria.fr
Hubert Comon-LundhComputer Science professor, ENS CachanVerified email at lsv.ens-cachan.fr
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
Jiangshan Yu (于江山)ARC DECRA Fellow and Senior Lecturer, Monash UniversityVerified email at monash.edu
Myrto ArapinisSchool of Informatics, University of EdinburghVerified email at inf.ed.ac.uk
Stefan CiobacaAlexandru Ioan Cuza UniversityVerified email at info.uaic.ro
Rohit ChadhaUniversity of MissouriVerified email at missouri.edu
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk