Get my own profile
Public access
View all47 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Xiaokui ShuIBM ResearchVerified email at ibm.com
Ke Tianpalo alto networkVerified email at vt.edu
Barbara G. RyderEmerita Professor of Computer Science, J Byron Maupin Emerita Professor of Engineering, VirginiaVerified email at vt.edu
Long ChengSchool of Computing, Clemson UniversityVerified email at clemson.edu
Roberto TamassiaPlastech Professor of Computer Science, Brown UniversityVerified email at cs.brown.edu
Sazzadur RahamanAssistant Professor of Computer Science at The University of ArizonaVerified email at cs.arizona.edu
Karim Elish, Ph.D., SMIEEE, SMACMAssociate Professor of Computer Science, Florida Polytechnic UniversityVerified email at floridapoly.edu
Deian StefanUC San DiegoVerified email at eng.ucsd.edu
Kui XuGoogleVerified email at vt.edu
Sharmin AfroseOak Ridge National LaboratoryVerified email at ornl.gov
Gang WangAssociate Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Na MengVirginia TechVerified email at cs.vt.edu
Naren RamakrishnanThomas L. Phillips Professor, Virginia TechVerified email at cs.vt.edu
Salman AhmedResearch Scientist, IBM ResearchVerified email at vt.edu
Huijun XiongSamsung Research AmericaVerified email at cs.vt.edu
Hao ZhangAmazon, Virginia TechVerified email at amazon.com
Bill HornePrincipal Product Manager, AWS CryptographyVerified email at amazon.com
Stuart HaberStuart Haber Crypto, LLCVerified email at acm.org
Gang TanProfessor of computer science and engineering, Penn State UniversityVerified email at cse.psu.edu
Miles FrantzVirginia TechVerified email at vt.edu