Get my own profile
Public access
View all42 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Ufuk TopcuThe University of Texas at AustinVerified email at utexas.edu
Roderick BloemGraz University of TechnologyVerified email at iaik.tugraz.at
Bettina KönighoferAssistant Professor, Graz University of Technology, AustriaVerified email at iaik.tugraz.at
Hadas Kress-GazitCornell UniversityVerified email at cornell.edu
Robert KönighoferGraz University of TechnologyVerified email at iaik.tugraz.at
Hans-Jörg PeterSiemens EDAVerified email at siemens.com
Scott NiekumAssociate Professor, University of Massachusetts AmherstVerified email at cs.umass.edu
Mohammed AlshiekhResearcher at University of Texas at AustinVerified email at utexas.edu
Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Stéphane LafortuneProfessor of Electrical Engineering and Computer Science, University of Michigan, USAVerified email at umich.edu
Vasumathi RamanVerified email at cds.caltech.edu
Stavros TripakisAssociate Professor, Northeastern UniversityVerified email at northeastern.edu
Moshe Y. VardiRice UniversityVerified email at cs.rice.edu
Michael GerkeSchloss Dagstuhl - Leibniz-Zentrum für InformatikVerified email at dagstuhl.de
Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusVerified email at cispa.saarland
Kai Weng Wong (Catherine Wong)Cornell UniversityVerified email at cornell.edu
Robert MattmüllerUniversity of Freiburg, GermanyVerified email at robert-mattmueller.de
Min WenGoogleVerified email at google.com
Leander TentrupSaarland University, Saarland Informatics CampusVerified email at cs.uni-saarland.de
Adam WalkerNICTA/UNSWVerified email at nicta.com.au