Get my own profile
Public access
View all40 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Steve KremerInriaVerified email at inria.fr
- Véronique CortierCNRS, LORIAVerified email at loria.fr
- Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
- Hubert Comon-LundhComputer Science professor, ENS CachanVerified email at lsv.ens-cachan.fr
- Vincent ChevalUniversity of Oxford, United KingdomVerified email at cs.ox.ac.uk
- Graham SteelINRIAVerified email at cryptosense.com
- Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
- Myrto ArapinisSchool of Informatics, University of EdinburghVerified email at inf.ed.ac.uk
- Mathilde ArnaudCEA, FranceVerified email at cea.fr
- Ben SmythFounder-CEO, x26.ioVerified email at bensmyth.com
- Stefan CiobacaAlexandru Ioan Cuza UniversityVerified email at info.uaic.ro
- Rohit ChadhaUniversity of MissouriVerified email at missouri.edu
- Céline ChevalierAssistant Professor of Computer Science, Université Paris 2Verified email at ens.fr
- Olivier PereiraUCLouvainVerified email at uclouvain.be