Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Stefano TessaroUniversity of WashingtonVerified email at cs.washington.edu
Sikhar PatranabisIBM Research IndiaVerified email at ibm.com
Rajat SadhukhanIndian Institute of Technology Roorkee, IndiaVerified email at iitkgp.ac.in
Debdeep MukhopadhyayProfessor, Dept of Computer Science and Engineering, IIT Kharagpur, IndiaVerified email at cse.iitkgp.ac.in
Ilan KomargodskiHebrew UniversityVerified email at cs.huji.ac.il
NILanjan DattaInstitute for Advancing Intelligence, TCG CRESTVerified email at tcgcrest.org
Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
Joseph JaegerAssistant Professor, Georgia Institute of TechnologyVerified email at gatech.edu
Cody FreitagPostdoc, Northeastern University and Boston UniversityVerified email at northeastern.edu
Vishal SaraswatBosch Global Software Technologies, Bangalore, IndiaVerified email at umn.edu
Thomas De CnuddeVerified email at fabriccryptography.com
Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu
Mingxun ZhouCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Riddhi GhosalUCLAVerified email at cs.ucla.edu
Baitian LiUndergraduate, Tsinghua UniversityVerified email at mails.tsinghua.edu.cn