Get my own profile
Public access
View all17 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Ehsan ToreiniDepartment of Computer Science, University of SurreyVerified email at surrey.ac.uk
- Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
- Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
- Teresa AlmeidaUmeå University and ITI/LARSySVerified email at umu.se
- Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
- Ahad HaratiFerdowsi University of MashhadVerified email at um.ac.ir
- Kovila PL CoopamootooKing's College LondonVerified email at kcl.ac.uk
- Scott HarperNewcastle UniversityVerified email at ncl.ac.uk
- Maher AlharbyAssistant Professor at Taibah UniversityVerified email at taibahu.edu.sa
- Amjad AldweeshAssistant Professor at Shaqra UniversityVerified email at su.edu.sa
- Kazem ShekoftehPhD from Ferdowsi University of MashhadVerified email at mail.um.ac.ir
- Roberto MetereLecturer (Assistant Professor), University of YorkVerified email at york.ac.uk
- Matthew Clifford LeachNewcastle UniversityVerified email at newcastle.ac.uk
- Sami AlajramiPhD researcher, Newcastle UniversityVerified email at ncl.ac.uk
- Mahshid Mehr NezhadResearch Fellow at WMG, University of WarwickVerified email at warwick.ac.uk
- Rishad ShafikReader in Electronic Systems, Newcastle University, UKVerified email at newcastle.ac.uk
- Patrick McCorryCrypto enthusiast
- John C. MaceLecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk