Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Aniket KatePurdue UniversityVerified email at purdue.edu
Sri AravindaKrishnan ThyagarajanPhD Student at Friedrich Alexander Universität Erlangen-NürnbergVerified email at cs.fau.de
Dominique SchröderFull Professor, Computer Science, Friedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
Kartik NayakDuke UniversityVerified email at cs.duke.edu
Nibesh ShresthaRochester Institute of TechnologyVerified email at rit.edu
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Giulio MalavoltaMax Planck Institute for Security and PrivacyVerified email at csp.mpg.de
Bernardo MagriThe University of Manchester, UKVerified email at manchester.ac.uk
Daniel TschudiConcordiumVerified email at concordium.com
Tiantian GongPurdue UniversityVerified email at purdue.edu
Michael ReiterJames B. Duke Distinguished Professor, Duke UniversityVerified email at duke.edu
Akhil BandarupalliPh.D. student in Computer Science, Purdue UniversityVerified email at purdue.edu
Saurabh BagchiElectrical and Computer Engineering, Computer Science; Director Army A2I2 & CRISP; Purdue UniversityVerified email at purdue.edu
Avishay YanaiBar-Ilan UniversityVerified email at biu.ac.il
Ittai AbrahamVMwareVerified email at cs.huji.ac.il
Benny applebaumElectrical Engineering School, Tel-Aviv UniversityVerified email at post.tau.ac.il
Benny PinkasBar Ilan UniversityVerified email at biu.ac.il