Dr Razi Arshad
Faculties, deparments and locations
- Faculty of Engineering, Computing and the Environment
- Department of Networks and Digital Media
- School of Computer Science and Mathematics
- Penrhyn Road
Lecturer in Cyber Security
- Email:
- r.arshad@kingston.ac.uk
About
I am lecturer in Cyber Security in the Department of Networks and Digital Media, School of Computer Science and Mathematics. I obtained PhD in Mathematical Cryptography (with a focus on symmetric key cryptography) from Otto-von-Guericke University, Magdeburg, Germany. I obtained Masters in Information Security from Sichuan University, Chengdu, China.
Before joining Kingston University London, I was working as a Research Fellow in Security and Privacy research group at the University of Surrey, Guildford, UK. I worked on the Characterisation and Quantification of User Privacy in compliance with international regulatory standards.
I also worked as a Cybersecurity consultant for several tech companies, including Xprime Inc., CodeX Inc., SNSKIES Pvt. Ltd., and Graxo Consulting Pvt. Ltd. I am a certified ISO/IEC 17025 Lead Assessor and an ISO/IEC 27001 ISMS Lead Auditor.
My research interests lie at the intersection of security and privacy, with a strong emphasis on applied cryptography. The aim of my research is to address critical security issues and develop robust cryptographic solutions that can be widely adopted to protect sensitive information and ensure user privacy.
Qualifications
- PhD in Mathematical Cryptography (Otto-von-Guericke University, Magdeburg, Germany)
- MS in Information Security (Sichuan University, Chengdu, China)
- BS in Computer Science (International Islamic University, Islamabad, Pakistan)
- BS in Applied Mathematics (Quaid-I-Azam University, Islamabad, Pakistan)
Domains
Courses taught
Specialisms
- Applied Cryptography
- Security and Privacy
- Privacy Enhancing Technologies
- Authentication Schemes
- Post Quantum Cryptography
Scholarly affiliations
- Senior Member of IEEE
Professional and scholarly affiliations
- ISO/IEC 27001 Lead Auditor
- ISO/IEC 17025 Lead Assessor
Publications
zk-DASTARK : a quantum-resistant, data authentication and zero-knowledge proof scheme for protecting data feed to smart contracts
Chaudhry, Usama Habib, Arshad, Razi, Khalid, Ayesha, Ray, Indranil Ghosh and Hussain, Mehdi, 2025, Computers and Electrical Engineering (123), B, pp 110089
Characterisation and quantification of user privacy : key challenges, regulations, and future directions
Arshad, Razi and Asghar, Muhammad Rizwan, 2024
A novel framework for the construction of cryptographically secure S-boxes
Arshad, Razi, Jalil, Mudassir, Hussain, Muzamal and Tounsi, Abdelouahed, 2024, Computers and Concrete (34), 1, pp 79-91
A secure and efficient multi-step multi-index image encryption scheme using hybrid combination of substitution, permutation and hyperchaotic structure
Arshad, Razi, Jalil, Mudassar, Iqbal, Waheed and Chaudhry, Usama Habib, 2024, Arabian Journal for Science and Engineering
Smart-wearable sensors and CNN-BiGRU model : a powerful combination for human activity recognition
Imran, Hamza Ali, Riaz, Qaiser, Hussain, Mehdi, Tahir, Hasan and Arshad, Razi, 2024, IEEE Sensors Journal (24), 2, pp 1963-1974
Comment to “a projective general linear group-based algorithm for the construction of substitution box for block ciphers”
Arshad, Razi and Jalil, Mudassar, 2024, Neural Computing and Applications (36), 3, pp 1495-1505
Comment on Nizam Chew, L.C.; Ismail, E.S. S-box construction based on linear fractional transformation and permutation function. Symmetry 2020, 12, 826
Arshad, Razi and Jalil, Mudassar, 2023, Symmetry (15), 5, pp 1005
Machines perceive emotions : identifying affective states from human gait using on-body smart devices
Imran, Hamza Ali, Riaz, Qaiser, Zeeshan, Muhammad, Hussain, Mehdi and Arshad, Razi, 2023, Applied Sciences (13), 8, pp 4728
Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
Arshad, Razi and Ikram, N., 2013, Multimedia Tools and Applications (66), 2, pp 165-178
Data leakage in business and fintech
Chaudhry, Usama Habib, Arshad, Razi, Abbas, Naveed Naeem and Zeerak, Adeel Ahmed (2022). In: Saeed, Saqib, (eds.), Zaman, Noor, (eds.), Almuhaideb, Abdullah M., (eds.), Kumar, Neeraj, (eds.) and Bin Zikria, Yousaf, (eds.), Handbook of research on cybersecurity issues and challenges for business and fintech applications. Pennsylvania, U.S.: IGI Global, pp 192-207
Digital transformations in business and fintech
Zeerak, Adeel Ahmed, Arshad, Razi, Abbas, Naveed Naeem and Chaudhry, Usama Habib (2022). In: Saeed, Saqib, (eds.), Almuhaideb, Abdullah M., (eds.), Kumar, Neeraj, (eds.), Zaman, Noor, (eds.) and Bin Zikria, Yousaf, (eds.), Handbook of research on cybersecurity issues and challenges for business and fintech applications. Pennsylvania, U.S.: IGI Global, pp 1-20
Quantum and post-quantum cybersecurity challenges and finance organizations readiness
Arshad, Razi and Riaz, Qaiser (2022). In: Saeed, Saqib, (eds.), Almuhaideb, Abdullah M., (eds.), Kumar, Neeraj, (eds.), Zaman, Noor, (eds.) and Yousaf, Bin Zikria Indexed In: SCOPUS, (eds.), Handbook of research on cybersecurity issues and challenges for business and fintech applications. Pennsylvania, U.S.: IGI Global, pp 314-337
A novel mutual authentication scheme for session initiation protocol based on elliptic curve cryptography
Arshad, R. and Ikram, N.(2011). In: 13th International Conference on Advanced Communication Technology (ICACT2011), 13-16 Feb 2011 :Gangwon, Korea
Cryptanalysis and improvement on remote user mutual authentication scheme with smart cards
Arshad, R. and Ikram, N.(2009). In: 11th International Conference on Advanced Communication Technology, 15-18 Feb 2009 :Gangwon, Korea