Get my own profile
Public access
View all24 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Patrick McCorryCrypto enthusiastVerified email at arbitrum.foundation
Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
Ehsan ToreiniSamsung Research and Development Institute, UKVerified email at samsung.com
Maryam MehrnezhadReader, Information Security Department, Royal Holloway University of London, UKVerified email at rhul.ac.uk
Vassilios G. VassilakisAssociate Professor in Cyber Security, University of YorkVerified email at cl.cam.ac.uk
Delaram KahrobaeiProfessor of Mathematics & Computer ScienceVerified email at nyu.edu
Philokypros P. IoulianouVerified email at york.ac.uk
SAMIRAN BAGUniversity of WarwickVerified email at warwick.ac.ukHelen PetrieProfessor Emerita of Human Computer InteractionVerified email at york.ac.uk
Roberto MetereLecturer (Assistant Professor), University of YorkVerified email at york.ac.uk
Brian RandellEmeritus Professor of Computing Science, Newcastle UniversityVerified email at ncl.ac.uk
Malte MöserChainalysisVerified email at maltemoeser.de
Mario StreflerKarlsruhe Institute of TechnologyVerified email at kit.eduDavid PointchevalChief Scientific Officer at CosmianVerified email at ens.fr
Ludovic PerretEPITA/LREVerified email at epita.frShaoquan JiangUniversity of WindsorVerified email at uwindsor.ca
M. Jason HinekInstructor, School of Computer of Science, Carleton UniversityVerified email at scs.carleton.caDr Poonam YadavAssociate Professor at Uni of York / Visiting Researcher at University of CambridgeVerified email at york.ac.uk
Syed Taha AliNational University of Science and TechnologyVerified email at seecs.edu.pk