Get my own profile
Public access
View all2 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Naman GovilGeorgia Institute of TechnologyVerified email at research.iiit.ac.in
- Chuadhry Mujeeb AhmedNewcastle UniversityVerified email at newcastle.ac.uk
- Daniele AntonioliEURECOMVerified email at eurecom.fr
- Ee-Chien ChangNational University of SingaporeVerified email at comp.nus.edu.sg
- Urbi ChatterjeeAssistant Professor, CSE, IIT Kanpur and Alumni, SEAL, IIT KharagpurVerified email at cse.iitk.ac.in
- Michail (Mihalis) ManiatakosAssociate Professor, New York University Abu DhabiVerified email at nyu.edu
- Bhyravarapu SriramThe Institute of Mathematical Sciences ChennaiVerified email at imsc.res.in
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
- Rizwan QadeerLuxembourg Institute of Science & Technology - LISTVerified email at list.lu
- Ahmed Al-DurraAssociate Provost for Research & Professor, Khalifa University of Science & TechnologyVerified email at ku.ac.ae
- Dr. Sajal SarkarInformation Security Department, POWERGRIDVerified email at powergrid.in
- Hadjer BenkraoudaPh.D. Student, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Dimitrios TychalasIntel CorporationVerified email at intel.com