Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Aniket KatePurdue University / Supra ResearchVerified email at purdue.edu
Kartik NayakDuke UniversityVerified email at cs.duke.edu
Nibesh ShresthaSupra LabsVerified email at supraoracles.com
Dominique SchröderFull Professor, Computer Science, Friedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
Zhongtang LuoResearch Assistant, Purdue UniversityVerified email at purdue.edu
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
Bernardo MagriThe University of ManchesterVerified email at manchester.ac.uk
Daniel TschudiConcordiumVerified email at concordium.com
Tiantian GongPurdue UniversityVerified email at purdue.edu
Akhil BandarupalliPh.D. student in Computer Science, Purdue UniversityVerified email at purdue.edu
Saurabh BagchiElectrical and Computer Engineering, Computer Science; Director Army A2I2 & CRISP; Purdue UniversityVerified email at purdue.edu
Avishay YanaiVMware ResearchVerified email at biu.ac.il
Ittai AbrahamIntelVerified email at cs.huji.ac.il
Benny applebaumElectrical Engineering School, Tel-Aviv UniversityVerified email at post.tau.ac.il
Benny PinkasBar Ilan UniversityVerified email at biu.ac.il
Alin TomescuAptos LabsVerified email at alum.mit.edu
Michael ReiterJames B. Duke Distinguished Professor, Duke UniversityVerified email at duke.edu
Manish NagarajPurdue UniversityVerified email at purdue.edu
Sri AravindaKrishnan ThyagarajanPostDoc at NTT Research