Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
- Eike RitterSenior Lecturer in Computer Science, University of Birmingham, UKVerified email at cs.bham.ac.uk
- Loretta Ilaria ManciniUniversity of BirminghamVerified email at cs.bham.ac.uk
- Steve KremerInriaVerified email at inria.fr
- Tom ChothiaUniversity of BirminghamVerified email at cs.bham.ac.uk
- Vincent ChevalUniversity of Oxford, United KingdomVerified email at cs.ox.ac.uk
- Véronique CortierCNRS, LORIAVerified email at loria.fr
- Marie DuflotLORIA - Université de Lorraine & INRIAVerified email at inria.fr
- Michael FisherProfessor of Computer Science, University of ManchesterVerified email at manchester.ac.uk
- Philip D. GraySchool of Computing Science, University of GlasgowVerified email at glasgow.ac.uk
- Sven ScheweProfessor of Computer Science, University of LiverpoolVerified email at liverpool.ac.uk
- Alice MillerProfessor, University of GlasgowVerified email at glasgow.ac.uk
- Rehana YasminResearch Scientist, King Abdullah University of Science & Technology (KAUST)Verified email at kaust.edu.sa
- Muffy CalderProfessor of Computing Science, University of GlasgowVerified email at glasgow.ac.uk
- Jia LiuResearcher at Enya LabsVerified email at enya.ai
- Frédéric GavaLACL, University of Paris-EastVerified email at univ-paris-est.fr
- Frédéric LoulergueUniversité d'Orléans, FranceVerified email at univ-orleans.fr
- Louise DennisDepartment of Computer Science, University of ManchesterVerified email at manchester.ac.uk
- Ben SmythFounder-CEO, x26.ioVerified email at bensmyth.com