Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
Saad IslamWorcester Polytechnic InstituteVerified email at wpi.edu
Berk GulmezogluIowa State UniversityVerified email at iastate.edu
Ziming ZhangAssistant Professor, Worcester Polytechnic Institute (WPI)Verified email at wpi.edu
Yarkin DorozAssistant Teaching ProfessorVerified email at wpi.edu
Thomas EisenbarthUniversity of LübeckVerified email at uni-luebeck.de
Andreas ZanklSecurity Researcher, Fraunhofer AISECVerified email at aisec.fraunhofer.de
Koksal MusWorcester Polytechnic InstituteVerified email at wpi.edu
Kristi RahmanStudentVerified email at wpi.edu
Andrew AdilettaGraduate Hardware Security Researcher, WPIVerified email at wpi.edu
Syed Mahbub HafizStaff Security Research Engineer (Cryptography) at LG Electronics USA, Inc.Verified email at lge.com
Keewoo LeeUC BerkeleyVerified email at berkeley.edu