Personal information

No personal information available

Activities

Education and qualifications (1)

University of Oxford: Oxford, Oxfordshire, GB

2015 to 2020 | DPhil (Computer Science)
Education
Source: Self-asserted source
Eman Alashwali

Works (12)

Detection and Impact of Debit/Credit Card Fraud: Victims' Experiences

2024-09-30 | Conference paper
Contributors: Eman Alashwali; Ragashree Mysuru Chandrashekar; Mandy Lanyon; Lorrie Faith Cranor
Source: check_circle
Crossref

Saudi parents’ privacy concerns about their children’s smart device applications

International Journal of Child-Computer Interaction
2022-09 | Journal article
Contributors: Eman Alashwali; Fatimah Alashwali
Source: check_circle
Crossref

Saudi parents’ privacy concerns about their children’s smart device applications

International Journal of Child-Computer Interaction
2022-04 | Journal article
Source: Self-asserted source
Eman Alashwali

Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective

Computers & Security
2020 | Journal article
Source: Self-asserted source
Eman Alashwali

Does “www.” Mean Better Transport Layer Security?

Availability, Reliability and Security
2019 | Conference paper
Source: Self-asserted source
Eman Alashwali

Towards Forward Secure Internet Traffic

Security and Privacy in Communication Networks
2019 | Conference paper
Source: Self-asserted source
Eman Alashwali

DSTC: DNS-based Strict TLS Configurations

Conference on Risks and Security of Internet and Systems
2018 | Conference paper
Source: Self-asserted source
Eman Alashwali

On the Feasibility of Fine−Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name

Security and Privacy in Communication Networks
2018 | Conference paper
Source: Self-asserted source
Eman Alashwali

What’s in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS

Security and Privacy in Communication Networks
2018 | Conference paper
Source: Self-asserted source
Eman Alashwali

Design and Evaluation of Competition-based Hacking Exercises

Global Engineering Education Conference
2015 | Conference paper
Source: Self-asserted source
Eman Alashwali

Incorporating Hacking Projects in Computer and Information Security Education: an Empirical Study

Int. J. Electronic Security and Digital Forensics
2014 | Journal article
Source: Self-asserted source
Eman Alashwali

Cryptographic Vulnerabilities in Real-Life Web Servers

International Conf. on Communications and Information Technology
2013 | Conference paper
Source: Self-asserted source
Eman Alashwali