Get my own profile
Public access
View all22 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ehsan ToreiniDepartment of Computer Science, University of SurreyVerified email at surrey.ac.uk
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
Teresa AlmeidaInstituto Superior Técnico, University of Lisbon and ITI/LARSySVerified email at tecnico.ulisboa.pt
Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Kovila PL CoopamootooKing's College LondonVerified email at kcl.ac.uk
Scott HarperNewcastle UniversityVerified email at ncl.ac.uk
Ahad HaratiFerdowsi University of MashhadVerified email at um.ac.ir
Maher AlharbyAssociate Professor at Taibah UniversityVerified email at taibahu.edu.sa
Amjad AldweeshAssociate Professor at Shaqra UniversityVerified email at su.edu.sa
Kazem ShekoftehPhD from Ferdowsi University of MashhadVerified email at ziti.uni-heidelberg.de
Patrick McCorryCrypto enthusiastVerified email at arbitrum.foundation
Matthew Clifford LeachNewcastle UniversityVerified email at newcastle.ac.uk
Roberto MetereLecturer (Assistant Professor), University of YorkVerified email at york.ac.uk
Sami AlajramiPhD researcher, Newcastle UniversityVerified email at ncl.ac.uk
Rishad ShafikProfessor of Microelectronic Systems, Newcastle University, UKVerified email at newcastle.ac.uk
Christian WeinertRoyal Holloway, University of LondonVerified email at rhul.ac.uk
John C. MaceLecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk
Follow
Maryam Mehrnezhad
Reader, Information Security Department, Royal Holloway University of London, UK
Verified email at rhul.ac.uk - Homepage