Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Erkay SavasSabanci UniversityVerified email at sabanciuniv.edu
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
Onur AciicmezSamsung Research AmericaVerified email at samsung.com
Nazar Abbas SaqibImam Abdulrahman Bin Faisal University, 2835 King Faisal Road, Dammam 34212Verified email at iau.edu.sa
Tolga AcarMicrosoftVerified email at microsoft.com
Francisco Rodríguez-HenríquezComputer Science CINVESTAV-IPN: Cryptography Research Centre of the Technology Innovation CentreVerified email at cs.cinvestav.mx
Burt Kaliski Jr.VerisignVerified email at alum.mit.edu
Jean-Pierre SeifertProfessor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
Ray C.C. CheungAssociate Provost (Digital Learning), Professor of Computer Engineering, City University of HongVerified email at cityu.edu.hk
Tugrul YanikResearch ScientistVerified email at lifetime.oregonstate.edu
Murat AydosHacettepe ÜniversitesiVerified email at hacettepe.edu.tr
Lo'ai TawalbehProf. of Computing and Cyber SecurityVerified email at tamusa.edu
Serdar S. ErdemGebze technical University, Kocaeli, TurkeyVerified email at gtu.edu.tr
Guanrong ChenCity University of Hong KongVerified email at cityu.edu.hk
Albert LeviSabancı ÜniversitesiVerified email at sabanciuniv.edu
Efstratios GallopoulosComputer Engineering and Informatics Department (CEID), University of Patras, GreeceVerified email at ceid.upatras.gr
Gokay SaldamliSan Jose State UniversityVerified email at sjsu.edu
Donglong ChenAssociate Professor, BNU-HKBU United International College (UIC)Verified email at uic.edu.cn
Zeynep Ödemiş Özgerİzmir Katip Çelebi UniversityVerified email at ikc.edu.tr