Get my own profile
Public access
View all21 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
- Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
- Patrick McCorryCrypto enthusiastVerified email at arbitrum.foundation
- Ehsan ToreiniDepartment of Computer Science, University of SurreyVerified email at surrey.ac.uk
- Maryam MehrnezhadReader, Information Security Department, Royal Holloway University of London, UKVerified email at rhul.ac.uk
- Vassilios G. VassilakisAssociate Professor in Cyber Security, University of YorkVerified email at cl.cam.ac.uk
- Christopher BattarbeeSorbonne UniversityVerified email at york.ac.uk
- Philokypros P. IoulianouVerified email at york.ac.uk
- SAMIRAN BAGUniversity of WarwickVerified email at warwick.ac.uk
- Brian RandellEmeritus Professor of Computing Science, Newcastle UniversityVerified email at ncl.ac.uk
- Roberto MetereLecturer (Assistant Professor), University of YorkVerified email at york.ac.uk
- Malte MöserChainalysisVerified email at maltemoeser.de
- Mario StreflerKarlsruhe Institute of TechnologyVerified email at kit.edu
- David PointchevalSenior CNRS Researcher in Computer Science, Ecole Normale Superieure/PSL University, InriaVerified email at ens.fr
- Helen PetrieProfessor Emerita of Human Computer InteractionVerified email at york.ac.uk
- Shaoquan JiangUniversity of WindsorVerified email at uwindsor.ca
- M. Jason HinekInstructor, School of Computer of Science, Carleton UniversityVerified email at scs.carleton.ca
- Dr. Poonam YadavA/ Professor & Senior Lecturer at Uni of York / Visiting Researcher at University of CambridgeVerified email at york.ac.uk
- Ludovic PerretSorbonne University/LIP6Verified email at lip6.fr
- Changyu DongGuangzhou UniversityVerified email at gzhu.edu.cn