Get my own profile
Public access
View all2 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Naman GovilGeorgia Institute of TechnologyVerified email at research.iiit.ac.in
Chuadhry Mujeeb AhmedNewcastle UniversityVerified email at newcastle.ac.uk
Daniele AntonioliEURECOMVerified email at eurecom.fr
Ee-Chien ChangNational University of SingaporeVerified email at comp.nus.edu.sg
Urbi ChatterjeeAssistant Professor, CSE, IIT Kanpur and Alumni, SEAL, IIT KharagpurVerified email at cse.iitk.ac.in
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Rizwan QadeerLuxembourg Institute of Science & Technology - LISTVerified email at list.lu
Michail (Mihalis) ManiatakosAssociate Professor, New York University Abu DhabiVerified email at nyu.edu
Dr. Sajal SarkarInformation Security Department, POWERGRIDVerified email at powergrid.in
Ahmed Al-DurraAssociate Provost for Research & Professor, Khalifa University of Science & TechnologyVerified email at ku.ac.ae
Hadjer BenkraoudaPh.D. Student, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Dimitrios TychalasIntel CorporationVerified email at intel.com
Bhyravarapu SriramAssistant Professor of Computer Science, Vignan's University