Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Goutam PaulAssociate Professor, Cryptology & Security Research Unit (CSRU), Indian Statistical InstituteVerified email at ieee.org
- Dhiman SahaIndian Institute of Technology BhilaiVerified email at iitbhilai.ac.in
- Amit JanaSRF, Indian Statistical Institute, KolkataVerified email at isical.ac.in
- Subhadeep BanikAmbizione Fellow, LASEC, EPFL SwitzerlandVerified email at epfl.ch
- Takanori IsobeUniversity of HyogoVerified email at ai.u-hyogo.ac.jp
- Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
- Willi MeierFHNWVerified email at fhnw.ch
- Fukang LiuTokyo Institute of TechnologyVerified email at m.titech.ac.jp
- Dr Avishek AdhikariProfessor, Department of Mathematics, Presidency UniversityVerified email at presiuniv.ac.in
- Ling SongJinan University, Guangzhou, ChinaVerified email at jnu.edu.cn
- Santanu SarkarProfessor, IIT MadrasVerified email at iitm.ac.in
- Libo WangUniversity of Hyogo, JapanVerified email at mails.ucas.edu.cn