Get my own profile
Public access
View all19 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Ehsan ToreiniDepartment of Computer Science, University of SurreyVerified email at surrey.ac.uk
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
Teresa AlmeidaUmeå University and ITI/LARSySVerified email at umu.se
Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Kovila PL CoopamootooKing's College LondonVerified email at kcl.ac.uk
Scott HarperNewcastle UniversityVerified email at ncl.ac.uk
Ahad HaratiFerdowsi University of MashhadVerified email at um.ac.ir
Maher AlharbyAssistant Professor at Taibah UniversityVerified email at taibahu.edu.sa
Amjad AldweeshAssistant Professor at Shaqra UniversityVerified email at su.edu.sa
Kazem ShekoftehPhD from Ferdowsi University of MashhadVerified email at ziti.uni-heidelberg.de
Matthew Clifford LeachNewcastle UniversityVerified email at newcastle.ac.uk
Roberto MetereLecturer (Assistant Professor), University of YorkVerified email at york.ac.uk
Sami AlajramiPhD researcher, Newcastle UniversityVerified email at ncl.ac.uk
Rishad ShafikProfessor of Microelectronic Systems, Newcastle University, UKVerified email at newcastle.ac.uk
Patrick McCorryCrypto enthusiast
John C. MaceLecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk
Follow![Maryam Mehrnezhad](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=LPqJnMMAAAAJ&citpid=10)
Maryam Mehrnezhad
Associate Professor, Information Security Department, Royal Holloway University of London, UK
Verified email at rhul.ac.uk - Homepage