Get my own profile
Public access
View all14 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Ehsan ToreiniDepartment of Computer Science, University of SurreyVerified email at surrey.ac.uk
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
Teresa AlmeidaUmeå University and ITI/LARSySVerified email at umu.se
Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Ahad HaratiFerdowsi University of MashhadVerified email at um.ac.ir
Scott HarperNewcastle UniversityVerified email at ncl.ac.uk
Kovila PL CoopamootooKing's College LondonVerified email at kcl.ac.uk
Maher AlharbyAssistant Professor at Taibah UniversityVerified email at taibahu.edu.sa
Amjad AldweeshAssistant Professor at Shaqra UniversityVerified email at su.edu.sa
Kazem ShekoftehPhD from Ferdowsi University of MashhadVerified email at mail.um.ac.ir
Matthew Clifford LeachNewcastle UniversityVerified email at newcastle.ac.uk
Roberto MetereLecturer (Assistant Professor), University of YorkVerified email at york.ac.uk
Sami AlajramiPhD researcher, Newcastle UniversityVerified email at ncl.ac.uk
Mahshid Mehr NezhadResearch Fellow at WMG, University of WarwickVerified email at warwick.ac.uk
Rishad ShafikReader in Electronic Systems, Newcastle University, UKVerified email at newcastle.ac.uk
Patrick McCorryCrypto enthusiast
John C. MaceLecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk