Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
- Alwen TiuSchool of Computing, The Australian National UniversityVerified email at anu.edu.au
- Gabriel CiobanuRomanian Academy, IasiVerified email at iit.academiaromana-is.ro
- Vladimiro SassoneUniversity of SouthamptonVerified email at ecs.soton.ac.uk
- Matteo AcclavioUniversity of SussexVerified email at sussex.ac.uk
- Lutz StraßburgerInriaVerified email at lix.polytechnique.fr
- Bogdan AmanInstitute of Computer Science, Romanian Academy AND Faculty of Computer Science, UAIC, Iasi, RomaniaVerified email at iit.academiaromana-is.ro
- Ki Yung AhnAssistant Professor of Computer Engineering at Hannam University, Daejeon, KoreaVerified email at hnu.kr
- Mariangiola Dezani-CiancagliniEmeritus Professor of Computer Science, Torino UniversityVerified email at di.unito.it
- Rob van GlabbeekUNSWVerified email at cs.stanford.edu
- Peter HöfnerAustralian National University (ANU)Verified email at hoefner-online.de
- Ilaria CastellaniResearcher in Theoretical Computer Science, INRIA, FranceVerified email at inria.fr
- Shang-Wei LinAssistant Professor, Nanyang Technological UniversityVerified email at ntu.edu.sg
- Nicholas GibbinsLecturer in Computer Science, University of SouthamptonVerified email at ecs.soton.ac.uk
- cristian vaideanuAssistant Professor, University "Al. I. Cuza " of Iasi Verified email at uaic.ro