Get my own profile
Public access
View all20 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Ehsan ToreiniDepartment of Computer Science, University of SurreyVerified email at surrey.ac.uk
- Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
- Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
- Teresa AlmeidaUmeå University and ITI/LARSySVerified email at umu.se
- Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
- Kovila PL CoopamootooKing's College LondonVerified email at kcl.ac.uk
- Scott HarperNewcastle UniversityVerified email at ncl.ac.uk
- Ahad HaratiFerdowsi University of MashhadVerified email at um.ac.ir
- Maher AlharbyAssistant Professor at Taibah UniversityVerified email at taibahu.edu.sa
- Amjad AldweeshAssociate Professor at Shaqra UniversityVerified email at su.edu.sa
- Kazem ShekoftehPhD from Ferdowsi University of MashhadVerified email at ziti.uni-heidelberg.de
- Patrick McCorryCrypto enthusiastVerified email at arbitrum.foundation
- Matthew Clifford LeachNewcastle UniversityVerified email at newcastle.ac.uk
- Roberto MetereLecturer (Assistant Professor), University of YorkVerified email at york.ac.uk
- Sami AlajramiPhD researcher, Newcastle UniversityVerified email at ncl.ac.uk
- Rishad ShafikProfessor of Microelectronic Systems, Newcastle University, UKVerified email at newcastle.ac.uk
- John C. MaceLecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk
Follow
Maryam Mehrnezhad
Reader, Information Security Department, Royal Holloway University of London, UK
Verified email at rhul.ac.uk - Homepage