Get my own profile
Public access
View all66 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Dominik WojtczakDepartment of Computer Science, University of LiverpoolVerified email at liverpool.ac.uk
Ernst Moritz HahnUniversity of TwenteVerified email at utwente.nl
Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Ashutosh TrivediUniversity of Colorado at BoulderVerified email at colorado.edu
Fabio SomenziProfessor, University of Colorado BoulderVerified email at colorado.edu
Mateo PerezUniversity of Colorado BoulderVerified email at colorado.edu
John FearnleyUniversity of LiverpoolVerified email at liverpool.ac.uk
Doron A. PeledProfessor Of Computer Science, Bar Ilan UniversityVerified email at cs.biu.ac.il
Andrea TurriniInstitute of Software, Chinese Academy of SciencesVerified email at ios.ac.cn
Markus N RabeGoogleVerified email at google.com
Xiaowei HuangProfessor of Computer Science, University of LiverpoolVerified email at liverpool.ac.uk
Russell MartinUniversity of LiverpoolVerified email at liverpool.ac.uk
Michael FisherProfessor of Computer Science, University of ManchesterVerified email at manchester.ac.uk
Ioannis LamprouNational and Kapodistrian University of AthensVerified email at di.uoa.gr
Lijun ZhangFull Professor, State Key Laboratory of Computer Science, Institute of Software ChineseVerified email at ios.ac.cn
Paul GainerExscientiaVerified email at exscientia.co.uk
Philip D. GraySchool of Computing Science, University of GlasgowVerified email at glasgow.ac.uk
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
Rehana YasminDoctoral Research Student, University of Birmingham, UKVerified email at cs.bham.ac.uk
Eike RitterSenior Lecturer in Computer Science, University of Birmingham, UKVerified email at cs.bham.ac.uk
Follow
Sven Schewe
Professor of Computer Science, University of Liverpool
Verified email at liverpool.ac.uk - Homepage