Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
Eike RitterSenior Lecturer in Computer Science, University of Birmingham, UKVerified email at cs.bham.ac.uk
Loretta Ilaria ManciniUniversity of BirminghamVerified email at cs.bham.ac.uk
Steve KremerInriaVerified email at inria.fr
Tom ChothiaUniversity of BirminghamVerified email at cs.bham.ac.uk
Vincent ChevalUniversity of Oxford, United KingdomVerified email at cs.ox.ac.uk
Véronique CortierCNRS, LORIAVerified email at loria.fr
Marie DuflotLORIA - Université de Lorraine & INRIAVerified email at inria.fr
Michael FisherProfessor of Computer Science, University of ManchesterVerified email at manchester.ac.uk
Philip D. GraySchool of Computing Science, University of GlasgowVerified email at glasgow.ac.uk
Sven ScheweProfessor of Computer Science, University of LiverpoolVerified email at liverpool.ac.uk
Alice MillerProfessor, University of GlasgowVerified email at glasgow.ac.uk
Rehana YasminResearch Scientist, King Abdullah University of Science & Technology (KAUST)Verified email at kaust.edu.sa
Muffy CalderProfessor of Computing Science, University of GlasgowVerified email at glasgow.ac.uk
Jia LiuResearcher at Enya LabsVerified email at enya.ai
Frédéric GavaLACL, University of Paris-EastVerified email at univ-paris-est.fr
Frédéric LoulergueUniversité d'Orléans, FranceVerified email at univ-orleans.fr
Louise DennisDepartment of Computer Science, University of ManchesterVerified email at manchester.ac.uk
Ben SmythFounder-CEO, x26.ioVerified email at bensmyth.com