Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Sam ScottCornell TechVerified email at cornell.edu
- Thyla van der MerweRoyal Holloway, University of LondonVerified email at live.rhul.ac.uk
- Jonathan HoylandRoyal HollowayVerified email at live.rhul.ac.uk
- Jyotirmoy V. DeshmukhAssociate Professor, University of Southern CaliforniaVerified email at usc.edu
- Rupak MajumdarMPI for Software SystemsVerified email at mpi-sws.org
- Xiaoqing JinApple Inc.Verified email at cs.ucr.edu
- Vinayak S. PrabhuColorado State UniversityVerified email at colostate.edu
- Zvonko IljazovićDepartment of Mathematics, Faculty of Science, University of ZagrebVerified email at math.pmf.unizg.hr
- David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Vedran ČačićDepartment of Mathematics, Faculty of Science, University of ZagrebVerified email at math.pmf.unizg.hr
- Petar ParadžikUniversity of Zagreb Faculty of Electrical Engineering and ComputingVerified email at fer.unizg.hr
- Ante DerekAssociate Professor, University of Zagreb Faculty of Electrical Engineering and ComputingVerified email at fer.unizg.hr
Follow
Marko Horvat
Department of Mathematics, Faculty of Science, University of Zagreb
Verified email at math.pmf.unizg.hr