Get my own profile
Public access
View all19 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Derek DreyerMax Planck Institute for Software Systems (MPI-SWS), Saarland Informatics CampusVerified email at mpi-sws.org
Robbert KrebbersAssociate Professor, Radboud University NijmegenVerified email at cs.ru.nl
Jacques-Henri JourdanCNRS, Laboratoire Méthodes FormellesVerified email at cnrs.fr
Lars BirkedalDept. of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Joseph TassarottiAssistant Professor, New York UniversityVerified email at nyu.edu
Aleš BizjakFormerly postdoctoral researcher, Aarhus University, currently software architect at ConcordiumVerified email at alesb.com
Hai DangBlueRock Security IncVerified email at mpi-sws.org
David SwaseyBlueRock SecurityVerified email at mpi-sws.org
Jeehoon KangKAIST School of ComputingVerified email at kaist.ac.kr
Filip SieczkowskiHeriot-Watt UniversityVerified email at hw.ac.uk
Aaron TuronMPI-SWSVerified email at mpi-sws.org
Kasper SvendsenDepartment of Computer Science, Aarhus UniversityVerified email at itu.dk
Amin TimanyAarhus UniversityVerified email at cs.au.dk
Nickolai ZeldovichMITVerified email at csail.mit.edu
Frans KaashoekMassuchesetts Institute of Technology (MIT)Verified email at mit.edu
Michael SammlerMPI-SWSVerified email at mpi-sws.org
Simon SpiesMPI-SWSVerified email at mpi-sws.org
Arthur CharguéraudInriaVerified email at inria.fr
John RegehrProfessor, School of Computing, University of UtahVerified email at cs.utah.edu
Zhengyang Liud-MatrixVerified email at d-matrix.ai