Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Soma BiswasAssociate Professor, Indian Institute of Science, Bangalore, IndiaVerified email at iisc.ac.in
- Dr. Deepak Kumar SharmaAssociate Professor, Dept. of Information Tech, Indira Gandhi Delhi Technical University for WomenVerified email at igdtuw.ac.in
- Megh BhaleraoUniversity of WashingtonVerified email at uw.edu
- Naren DoraiswamyUniversity of MichiganVerified email at umich.edu
- A V SubramanyamAssociate ProfessorVerified email at iiitd.ac.in
- LAKSHAY VIRMANICarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Gautam SrivastavaBrandon UniversityVerified email at brandonu.ca
- Krikamol MuandetCISPA - Helmholtz Center for Information SecurityVerified email at cispa.de
- Mahalakshmi SabanayagamPhD, Technical University of MunichVerified email at tum.de
- Debarghya GhoshdastidarTechnical University of MunichVerified email at cit.tum.de
- Chau Siu LunPostdoc at CISPA - Helmholtz Center for Information SecurityVerified email at cispa.de
- Shahine BouabidUniversity of OxfordVerified email at stats.ox.ac.uk