Get my own profile
Public access
View all11 articles
6 articles
available
not available
Based on funding mandates
Co-authors
- Amr YoussefConcordia UniversityVerified email at ciise.concordia.ca
- Guang GongProfessor, Dept. ECE, University of WaterlooVerified email at uwaterloo.ca
- Raghvendra RohitLead Cryptographer, Technology Innovation Institute, Abu DhabiVerified email at tii.ae
- Kalikinkar MandalAssistant Professor at University of New Brunswick, FrederictonVerified email at uwaterloo.ca
- Gangqiang YangUniversity of WaterlooVerified email at uwaterloo.ca
- Mouna NakkarConcordia UniversityVerified email at ciise.concordia.ca
- Aaron GulliverDepartment of Electrical and Computer Engineering, University of VictoriaVerified email at ece.uvic.ca
- Ahmed AbdelkhalekConcordia University, Montreal, CanadaVerified email at encs.concordia.ca
- Muhammad ElSheikhPhD student, Concordia University, CanadaVerified email at nis.sci.eg
- Nusa ZidaricLeiden UniversityVerified email at liacs.leidenuniv.nl
- Onur DumanKristiania University CollegeVerified email at Kristiania.no
- Hisham S. GalalAssiut UniversityVerified email at aun.edu.eg
- Martijn HendriksEindhoven University of TechnologyVerified email at tue.nl
- Mridul NandiIndian Statistical InstituteVerified email at isical.ac.in
- Ashwin JhaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Follow
Riham AlTawy
Associate Professor, Dept. ECE, University of Victoria
Verified email at uvic.ca - Homepage