Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Naman GovilGeorgia Institute of TechnologyEmail verificata su research.iiit.ac.in
- Chuadhry Mujeeb AhmedNewcastle UniversityEmail verificata su newcastle.ac.uk
- Daniele AntonioliEURECOMEmail verificata su eurecom.fr
- Ee-Chien ChangNational University of SingaporeEmail verificata su comp.nus.edu.sg
- Urbi ChatterjeeAssistant Professor, CSE, IIT Kanpur and Alumni, SEAL, IIT KharagpurEmail verificata su cse.iitk.ac.in
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Email verificata su sutd.edu.sg
- Rizwan QadeerLuxembourg Institute of Science & Technology - LISTEmail verificata su list.lu
- Michail (Mihalis) ManiatakosAssociate Professor, New York University Abu DhabiEmail verificata su nyu.edu
- Dr. Sajal SarkarInformation Security Department, POWERGRIDEmail verificata su powergrid.in
- Ahmed Al-DurraAssociate Provost for Research & Professor, Khalifa University of Science & TechnologyEmail verificata su ku.ac.ae
- Hadjer BenkraoudaPh.D. Student, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Dimitrios TychalasIntel CorporationEmail verificata su intel.com
- Bhyravarapu SriramAssistant Professor of Computer Science, Vignan's University