Get my own profile
Public access
View all16 articles
11 articles
available
not available
Based on funding mandates
Co-authors
- Danilo GligoroskiProfessor of Information Security and Cryptology, NTNUVerified email at item.ntnu.no
- Kevin SkadronHarry Douglas Forsyth Professor of Computer Science, University of VirginiaVerified email at virginia.edu
- Hristina MihajloskaSs. Cyril and Methodius University, Faculty of Computer Science and EngineeringVerified email at finki.ukim.mk
- Martin MargalaProfessor and Director, School of Computing and Informatics, University of Louisiana at LafayetteVerified email at louisiana.edu
- Xinfei GuoShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Mircea R. StanVirginia Microelectronics Consortium (VMEC) Professor, University of VirginiaVerified email at virginia.edu
- Simona SamardjiskaDigital Security Group, Radboud University, The NetherlandsVerified email at cs.ru.nl
- S. F. MjølsnesProfessor at NTNUVerified email at item.ntnu.no
- Jack WaddenComputer Science, University of MichiganVerified email at umich.edu
- Amit Kulkarni, Ph.D.Postdoctoral Research Associate at ETH, ZurichVerified email at inf.ethz.ch
- sohan purohitVerified email at intel.com
- Gabriel RobinsUniversity of VirginiaVerified email at cs.virginia.edu
- Georgios K. PitsilisPhD in Computer ScienceVerified email at ntnu.no
- Ke WangAcumino