Get my own profile
Public access
View all19 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Derek DreyerMax Planck Institute for Software Systems (MPI-SWS), Saarland Informatics CampusVerified email at mpi-sws.org
- Robbert KrebbersAssociate Professor, Radboud University NijmegenVerified email at cs.ru.nl
- Jacques-Henri JourdanCNRS, Laboratoire Méthodes FormellesVerified email at cnrs.fr
- Lars BirkedalDept. of Computer Science, Aarhus UniversityVerified email at cs.au.dk
- Joseph TassarottiAssistant Professor, New York UniversityVerified email at nyu.edu
- Aleš BizjakFormerly postdoctoral researcher, Aarhus University, currently software architect at ConcordiumVerified email at alesb.com
- Hai DangBlueRock Security IncVerified email at mpi-sws.org
- David SwaseyBlueRock SecurityVerified email at mpi-sws.org
- Jeehoon KangKAIST School of ComputingVerified email at kaist.ac.kr
- Filip SieczkowskiHeriot-Watt UniversityVerified email at hw.ac.uk
- Aaron TuronMPI-SWSVerified email at mpi-sws.org
- Kasper SvendsenDepartment of Computer Science, Aarhus UniversityVerified email at itu.dk
- Amin TimanyAarhus UniversityVerified email at cs.au.dk
- Nickolai ZeldovichMITVerified email at csail.mit.edu
- Frans KaashoekMassuchesetts Institute of Technology (MIT)Verified email at mit.edu
- Michael SammlerMPI-SWSVerified email at mpi-sws.org
- Simon SpiesMPI-SWSVerified email at mpi-sws.org
- Arthur CharguéraudInriaVerified email at inria.fr
- John RegehrProfessor, School of Computing, University of UtahVerified email at cs.utah.edu
- Zhengyang Liud-MatrixVerified email at d-matrix.ai