Get my own profile
Public access
View all7 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Ehsan ToreiniDepartment of Computer Science, Durham UniversityVerified email at durham.ac.uk
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
Aad van MoorselProfessor of Computer Science, Newcastle University, UKVerified email at ncl.ac.uk
Ahad HaratiFerdowsi University of MashhadVerified email at um.ac.ir
Kazem ShekoftehPhD from Ferdowsi University of Mashhad, Post-Doc Research Fellow at Heidelberg universityVerified email at ziti.uni-heidelberg.de
Maher AlharbyAssistant Professor at Taibah UniversityVerified email at taibahu.edu.sa
Amjad AldweeshAssistant Professor at Shaqra UniversityVerified email at su.edu.sa
Roberto MetereLecturer (Assistant Professor), University of YorkVerified email at york.ac.uk
Teresa AlmeidaITI/LARSyS, IST - U. Lisbon / Umeå UniversityVerified email at umu.se
Kovila PL CoopamootooKing's College LondonVerified email at kcl.ac.uk
Mahshid Mehr NezhadUniversity of WarwickVerified email at warwick.ac.uk
Sami AlajramiPhD researcher, Newcastle UniversityVerified email at ncl.ac.uk
Rishad ShafikReader in Electronic Systems, Newcastle University, UKVerified email at newcastle.ac.uk
Matthew Clifford LeachNewcastle UniversityVerified email at newcastle.ac.uk
Patrick McCorryCrypto enthusiast
John C. MaceLecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk
Follow
Maryam Mehrnezhad
Senior Lecturer, School of Computing, Newcastle University, UK
Verified email at newcastle.ac.uk - Homepage