Get my own profile
Public access
View all25 articles
1 article
available
not available
Based on funding mandates
Co-authors
Steve KremerInriaVerified email at inria.fr
Eike RitterSenior Lecturer in Computer Science, University of Birmingham, UKVerified email at cs.bham.ac.uk
Stéphanie DelauneUniv Rennes, CNRS, IRISAVerified email at irisa.fr
Pierre Yves SchobbensProfessor of Computer Science, University of Namur (FUNDP)Verified email at unamur.be
Myrto ArapinisSchool of Informatics, University of EdinburghVerified email at inf.ed.ac.uk
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Ben SmythFounder-CEO, x26.ioVerified email at bensmyth.com
Michael HuthProfessor of Computer Science, Computing, Imperial College LondonVerified email at imperial.ac.uk
Dimitar P. GuelevAssociate Professor of Logic, Bulgarian Academy of SciencesVerified email at math.bas.bg
Jiangshan Yu (于江山)Associate Professor, University of SydneyVerified email at sydney.edu.au
Alessio R LomuscioImperial College LondonVerified email at imperial.ac.uk
Loretta Ilaria ManciniUniversity of BirminghamVerified email at cs.bham.ac.uk
Vincent ChevalUniversity of Oxford, United KingdomVerified email at cs.ox.ac.uk
Gurchetan GrewalSecurity Architect at Jaguar Land RoverVerified email at jaguarlandrover.com
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Tom ChothiaUniversity of BirminghamVerified email at cs.bham.ac.uk
Michael FisherProfessor of Computer Science, University of ManchesterVerified email at manchester.ac.uk
Jia LiuResearcher at Enya LabsVerified email at enya.ai
Hajnal AndrekaRenyi Institute of Mathematics, Hungarian Academy of Sciences Verified email at renyi.mta.hu
Franck Cassezmovement LabsVerified email at movementlabs.xyz
Follow![Mark D. Ryan](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=zVGVpX4AAAAJ&citpid=3)
Mark D. Ryan
Professor of Computer Security, University of Birmingham
Verified email at bham.ac.uk - Homepage