Get my own profile
Public access
View all23 articles
0 articles*
available
not available
Based on funding mandates
Co-authors
Ehsan ToreiniSamsung Research and Development Institute, UKVerified email at samsung.com
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
Teresa AlmeidaITI/LARSyS and Instituto Superior Técnico, University of LisbonVerified email at tecnico.ulisboa.pt
Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Scott HarperNewcastle UniversityVerified email at ncl.ac.ukKovila PL CoopamootooKing's College LondonVerified email at kcl.ac.uk
Maher AlharbyAssociate Professor at Taibah UniversityVerified email at taibahu.edu.sa
Amjad AldweeshAssociate Professor at Shaqra UniversityVerified email at su.edu.sa
Ahad HaratiFerdowsi University of MashhadVerified email at um.ac.ir
Patrick McCorryCrypto enthusiastVerified email at arbitrum.foundation
Kazem ShekoftehPost-Doc Research fellow at Heidelberg UniversityVerified email at ziti.uni-heidelberg.de
Matthew Clifford LeachNewcastle UniversityVerified email at newcastle.ac.uk
Roberto MetereLecturer (Assistant Professor), University of YorkVerified email at york.ac.uk
Sami AlajramiPhD researcher, Newcastle UniversityVerified email at ncl.ac.uk
Christian WeinertRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Rishad ShafikProfessor of Microelectronic Systems, Newcastle University, UKVerified email at newcastle.ac.uk
John C. MaceLecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk
Follow
Maryam Mehrnezhad
Reader, Information Security Department, Royal Holloway University of London, UK
Verified email at rhul.ac.uk - Homepage