Get my own profile
Public access
View all11 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Amr YoussefConcordia UniversityVerified email at ciise.concordia.ca
Guang GongProfessor, Dept. ECE, University of WaterlooVerified email at uwaterloo.ca
Raghvendra RohitLead Cryptographer, Technology Innovation Institute, Abu DhabiVerified email at tii.ae
Kalikinkar MandalAssistant Professor at University of New Brunswick, FrederictonVerified email at uwaterloo.ca
Gangqiang YangUniversity of WaterlooVerified email at uwaterloo.ca
Mouna NakkarConcordia UniversityVerified email at ciise.concordia.ca
Aaron GulliverDepartment of Electrical and Computer Engineering, University of VictoriaVerified email at ece.uvic.ca
Ahmed AbdelkhalekConcordia University, Montreal, CanadaVerified email at encs.concordia.ca
Muhammad ElSheikhPhD student, Concordia University, CanadaVerified email at nis.sci.eg
Nusa ZidaricLeiden UniversityVerified email at liacs.leidenuniv.nl
Onur DumanKristiania University CollegeVerified email at Kristiania.no
Hisham S. GalalAssiut UniversityVerified email at aun.edu.eg
Martijn HendriksEindhoven University of TechnologyVerified email at tue.nl
Mridul NandiIndian Statistical InstituteVerified email at isical.ac.in
Ashwin JhaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Follow![Riham AlTawy](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=-dFPMBcAAAAJ&citpid=3)
Riham AlTawy
Associate Professor, Dept. ECE, University of Victoria
Verified email at uvic.ca - Homepage