Crea il mio profilo
Accesso pubblico
Visualizza tutto19 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ehsan ToreiniDepartment of Computer Science, University of SurreyEmail verificata su surrey.ac.uk
- Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickEmail verificata su warwick.ac.uk
- Siamak F. ShahandashtiUniversity of York, UKEmail verificata su york.ac.uk
- Teresa AlmeidaUmeå University and ITI/LARSySEmail verificata su umu.se
- Aad van MoorselProfessor of Computer Science, University of Birmingham, UKEmail verificata su bham.ac.uk
- Ahad HaratiFerdowsi University of MashhadEmail verificata su um.ac.ir
- Scott HarperNewcastle UniversityEmail verificata su ncl.ac.uk
- Kovila PL CoopamootooKing's College LondonEmail verificata su kcl.ac.uk
- Maher AlharbyAssistant Professor at Taibah UniversityEmail verificata su taibahu.edu.sa
- Amjad AldweeshAssistant Professor at Shaqra UniversityEmail verificata su su.edu.sa
- Kazem ShekoftehPhD from Ferdowsi University of MashhadEmail verificata su ziti.uni-heidelberg.de
- Matthew Clifford LeachNewcastle UniversityEmail verificata su newcastle.ac.uk
- Roberto MetereLecturer (Assistant Professor), University of YorkEmail verificata su york.ac.uk
- Sami AlajramiPhD researcher, Newcastle UniversityEmail verificata su ncl.ac.uk
- Rishad ShafikProfessor in Microelectronic Systems, Newcastle University, UKEmail verificata su newcastle.ac.uk
- Patrick McCorryCrypto enthusiast
- John C. MaceLecturer in Security, Newcastle UniversityEmail verificata su ncl.ac.uk