Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Stefano TessaroUniversity of WashingtonVerified email at cs.washington.edu
- Sikhar PatranabisIBM Research IndiaVerified email at ibm.com
- Rajat SadhukhanIndian Institute of Technology Roorkee, IndiaVerified email at iitkgp.ac.in
- Debdeep MukhopadhyayProfessor, Dept of Computer Science and Engineering, IIT Kharagpur, IndiaVerified email at cse.iitkgp.ac.in
- Ilan KomargodskiHebrew UniversityVerified email at cs.huji.ac.il
- NILanjan DattaInstitute for Advancing Intelligence, TCG CRESTVerified email at tcgcrest.org
- Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
- Cody FreitagPostdoc, Northeastern University and Boston UniversityVerified email at northeastern.edu
- Joseph JaegerAssistant Professor, Georgia Institute of TechnologyVerified email at gatech.edu
- Vishal SaraswatBosch Global Software Technologies, Bangalore, IndiaVerified email at umn.edu
- Thomas De CnuddeVerified email at fabriccryptography.com
- Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu
- Mingxun ZhouCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Riddhi GhosalUCLAVerified email at cs.ucla.edu
- Baitian LiUndergraduate, Tsinghua UniversityVerified email at mails.tsinghua.edu.cn