Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Stefano TessaroProfessor at the University of WashingtonVerified email at cs.washington.edu
Sikhar PatranabisIBM Research IndiaVerified email at ibm.com
Rajat SadhukhanIndian Institute of Technology Roorkee, IndiaVerified email at iitkgp.ac.in
Debdeep MukhopadhyayProfessor, Dept of Computer Science and Engineering, IIT Kharagpur, IndiaVerified email at cse.iitkgp.ac.in
Ilan KomargodskiHebrew UniversityVerified email at cs.huji.ac.il
NILanjan DattaInstitute for Advancing Intelligence, TCG CRESTVerified email at tcgcrest.org
Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu
Cody FreitagPostdoc, Northeastern University and Boston UniversityVerified email at northeastern.edu
Joseph JaegerAssistant Professor, Georgia Institute of TechnologyVerified email at gatech.edu
Mingxun ZhouCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Vishal SaraswatBosch Global Software Technologies, Bangalore, IndiaVerified email at umn.edu
Thomas De CnuddeVerified email at fabriccryptography.com
Riddhi GhosalUCLAVerified email at cs.ucla.edu
Baitian LiUndergraduate, Tsinghua UniversityVerified email at mails.tsinghua.edu.cn
Gil SegevProfessor of Computer Science, Hebrew UniversityVerified email at cs.stanford.edu
Bo PengPeking UniversityVerified email at stu.pku.edu.cn