Get my own profile
Public access
View all31 articles
1 article
available
not available
Based on funding mandates
Co-authors
Thomas EisenbarthUniversity of LübeckVerified email at uni-luebeck.de
Gorka IrazoquiWorcester Polytechnic InstituteVerified email at wpi.edu
Yarkin DorozAssistant Teaching ProfessorVerified email at wpi.edu
Mehmet Sinan InciSecurity ResearcherVerified email at nvidia.com
Erdinc OzturkSabanci UniversityVerified email at sabanciuniv.edu
Ghaith HammouriClaveo SoftwareVerified email at alum.wpi.edu
Berk GulmezogluIowa State UniversityVerified email at iastate.edu
Daniel MoghimiUniversity of California San DiegoVerified email at ucsd.edu
Erkay SavasSabanci UniversityVerified email at sabanciuniv.edu
Çetin Kaya KoçKoç LabVerified email at ucsb.edu
William J MartinWorcester Polytechnic InstituteVerified email at wpi.edu
Jens-Peter KapsAssociate Professor of Electrical and Computer Engineering, George Mason UniversityVerified email at gmu.edu
Gizem S. CetinElectrical and Computer Engineering, Worcester Polytechnic InstituteVerified email at wpi.edu
Douglas StinsonProfessor Emeritus, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Mark G. KarpovskyProfessor of Computer Engineering, Boston UniversityVerified email at bu.edu
Dakshi AgrawalIBM Fellow, IBMVerified email at us.ibm.com
Pankaj RohatgiGoogleVerified email at google.com
Roel MaesIntrinsic IDVerified email at intrinsic-id.com
Xinming HuangProfessor, Worcester Polytechnic InstituteVerified email at wpi.edu
Aykutlu DanaVisiting Scholar, Stanford UniversityVerified email at stanford.edu