Zakwan Jaroucheh
Zakwan Jaroucheh

Dr Zakwan Jaroucheh

Lecturer

Biography

Dr Zakwan Jaroucheh is a Lecturer in the School of Computing Engineering and the Built Environment at Edinburgh Napier University (ENU). He holds a BSc degree (1998) in Systems Engineering from the Higher Institute for Applied Sciences and Technology - Damascus, and a MSc degree (2008) in Business Information Systems from ESIGELEC (The École supérieure d'ingénieurs en génie électrique) - France. He was awarded a PhD degree (2012) in Context-aware pervasive computing by ENU. In his current role as a Lecturer at ENU, Dr Zakwan is involved in lecturing on subjects including Secure Software Development at both undergraduate and postgraduate levels. Prior to joining ENU in 2018, Dr Zakwan spent around seven years in the industry working with Dell SecureWorks as a principle security engineer.

His research interests lie at the intersection of computer science, finance and law, specifically in the areas of blockchain technology, web3 protocols, crypto assets and tokenization. In his current work, he is focused on exploring the potential of blockchain technology to revolutionise the way we exchange value and conduct financial transactions. he is particularly interested in the development and adoption of web3 protocols, which enable decentralised applications and peer-to-peer transactions on the internet, and the use of crypto assets and tokenisation as a means of representing and exchanging value.

His previous research has focused on the use of blockchain technology and smart contracts in the tokenisation process, decentralised authentication and authorisation, secure sharing of digital assets, financial services, combating fake news, decentralised cryptographic secrets management, and in the potential for blockchain-based securities. He has also published papers on the potential for crypto assets and blockchain-based governance systems.

Overall, his research is driven by the belief that blockchain technology, tokenisation and crypto assets have the potential to fundamentally transform the way we exchange value and conduct financial transactions. He is committed to continuing my research in this exciting and rapidly-evolving field and to conducting high-quality research that advances our understanding of these technologies and their potential to shape the future of finance and beyond.

He is also a software engineer with a passion for 'solving problems', 'generating new ideas', 'breaking things' and 'doing things better'. He enjoys setting high standards, constantly learning new things, and sharing that knowledge with others. He is effective communicator and motivator who identifies and leverages assets in teammates to reach organisational goals. He is relentless optimist who believes there is no failure, only feedback. He is passionate to be a part of the community and giving back to the community.

He has published numerous quality scholarly articles. His most recent research achievements have been published in several highly-cited IEEE Computer Society, Personal and Ubiquitous Computing journal and International Journal of Advanced Computer Science and Applications, as well as premier international conferences. He can be reached at z.jaroucheh@napier.ac.uk.

Date


27 results

Crypto Assets Custody: Taxonomy, Components, and Open Challenges

Conference Proceeding
Jaroucheh, Z., & Ghaleb, B. (2023)
Crypto Assets Custody: Taxonomy, Components, and Open Challenges. . https://doi.org/10.1109/icbc56567.2023.10174959
Custody plays a fundamental role for organizations and individuals seeking to access crypto assets (e.g., cryptocurrencies) and decentralized finance (DeFi) applications. Cust...

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform

Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022)
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively...

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

Conference Proceeding
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2022)
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. In IEEE SINCONF: 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699366
Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can...

Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates

Conference Proceeding
Abubakar, M., McCarron, P., Jaroucheh, Z., Al Dubai, A., & Buchanan, B. (2022)
Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/SIN54109.2021.9699221
The COVID-19 pandemic has recently emerged as a worldwide health emergency that necessitates coordinated international measures. To contain the virus's spread, governments and...

Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles

Conference Proceeding
Cutajar, O., Moradpoor, N., & Jaroucheh, Z. (2021)
Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/SIN54109.2021.9699326
In a perfect world, coordination and cooperation across distributed autonomous systems would be a trivial task. However, incomplete information, malicious actors and real-worl...

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems

Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. (2021)
Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. In 2021 5th Cyber Security in Networking Conference (CSNet). https://doi.org/10.1109/csnet52717.2021.9614646
The Session Initiation Protocol (SIP) is the principal signalling protocol in Voice over IP (VoIP) systems, responsible for initialising, terminating, and maintaining sessions...

A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data

Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. J. (2021)
A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data. In 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS). https://doi.org/10.1109/coins51742.2021.9524172
Recent years have seen an increase in medical big data, which can be attributed to a paradigm shift experienced in medical data sharing induced by the growth of medical techno...

Blockchain-based identity and authentication scheme for MQTT protocol

Conference Proceeding
Abdelrazig Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Liu, X. (2021)
Blockchain-based identity and authentication scheme for MQTT protocol. In ICBCT '21: 2021 The 3rd International Conference on Blockchain Technology (73-81). https://doi.org/10.1145/3460537.3460549
The publish and subscribe messaging model has proven itself as a dominant messaging paradigm for IoT systems. An example of such is the commonly used Message Queuing Telemetry...

Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution

Conference Proceeding
Jaroucheh, Z., & Álvarez, I. A. (2021)
Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution. In 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). https://doi.org/10.1109/icbc51069.2021.9461144
Secrets such as passwords, encryption keys, and certificates are used to assist in protecting access to resources such as computing devices, customer data and other informatio...

Programming Languages: A Usage-based Statistical Analysis and Visualization

Conference Proceeding
Orlowska, A., Chrysoulas, C., Jaroucheh, Z., & Liu, X. (2021)
Programming Languages: A Usage-based Statistical Analysis and Visualization. In ICISS 2021: 2021 The 4th International Conference on Information Science and Systems (143-148). https://doi.org/10.1145/3459955.3460614
Understanding the popularity, and its trend, of programming languages can be important to anticipate which languages are best studied for future use, which are widely supporte...

Current Post Grad projects

Previous Post Grad projects