Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Donghoon ChangIIIT-Delhi, IndiaEmail verificata su iiitd.ac.in
- Somitra SanadhyaDept. of CSE, IIT JodhpurEmail verificata su iitj.ac.in
- Munawar HasanNISTEmail verificata su nist.gov
- Aarushi GoelPost-Doctoral Fellow, NTT ResearchEmail verificata su ntt-research.com
- Mridul NandiIndian Statistical InstituteEmail verificata su isical.ac.in
- Ashwin JhaCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Eik ListChair of Media Security, Bauhaus-Universität WeimarEmail verificata su uni-weimar.de
- Rishabh RustogiCarnegie Mellon UniversityEmail verificata su andrew.cmu.edu
- Abhishek AgarwalCarnegie Mellon UniversityEmail verificata su snu.edu.in
- John KelseyNISTEmail verificata su nist.gov
- Dana Dachman-SoledAssociate Professor, Department of Electrical and Computer Engineering, University of MarylandEmail verificata su umd.edu
- Meltem Sonmez TuranNational Institute of Standards and TechnologyEmail verificata su nist.gov
- Sai Sandilya KonduruSaarland UniversityEmail verificata su stud.uni-saarland.de
- Mohona GhoshAssistant Professor, Indira Gandhi Delhi Technical University for WomenEmail verificata su igdtuw.ac.in
Segui