Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
Eike RitterSenior Lecturer in Computer Science, University of Birmingham, UKVerified email at cs.bham.ac.uk
Loretta Ilaria ManciniUniversity of BirminghamVerified email at cs.bham.ac.uk
Steve KremerInriaVerified email at inria.fr
Tom ChothiaUniversity of BirminghamVerified email at cs.bham.ac.uk
Sergiu Bursucpostdoctoral researcher, University of LuxembourgVerified email at uni.lu
Vincent ChevalInria Paris, FranceVerified email at inria.fr
Véronique CortierCNRS, LORIAVerified email at loria.fr
Marie DuflotLORIA - Université de Lorraine & INRIAVerified email at inria.fr
Michael FisherProfessor of Computer Science, University of ManchesterVerified email at manchester.ac.uk
Philip D. GraySchool of Computing Science, University of GlasgowVerified email at glasgow.ac.uk
Sven ScheweProfessor of Computer Science, University of LiverpoolVerified email at liverpool.ac.uk
Alice MillerProfessor, University of GlasgowVerified email at glasgow.ac.uk
Rehana YasminDoctoral Research Student, University of Birmingham, UKVerified email at cs.bham.ac.uk
Muffy CalderProfessor of Computing Science, University of GlasgowVerified email at glasgow.ac.uk
Jia LiuResearcher at Fetch.AIVerified email at fetch.ai
Frédéric GavaLACL, University of Paris-EastVerified email at univ-paris-est.fr
Frédéric LoulergueUniversité d'Orléans, FranceVerified email at univ-orleans.fr
Louise DennisDepartment of Computer Science, University of ManchesterVerified email at manchester.ac.uk
Ben SmythFounder-CEO, x26.ioVerified email at bensmyth.com