Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Aniket KatePurdue University / Supra ResearchVerified email at purdue.edu
- Kartik NayakDuke UniversityVerified email at cs.duke.edu
- Nibesh ShresthaSupra LabsVerified email at supraoracles.com
- Michael ReiterJames B. Duke Distinguished Professor, Duke UniversityVerified email at duke.edu
- Akhil BandarupalliPh.D. student in Computer Science, Purdue UniversityVerified email at purdue.edu
- Saurabh BagchiElectrical and Computer Engineering, Computer Science; Director Army A2I2 & NSF CHORUS; PurdueVerified email at purdue.edu
- Bernardo MagriThe University of ManchesterVerified email at manchester.ac.uk
- Daniel TschudiConcordiumVerified email at concordium.com
- Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
- Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
- Zhongtang LuoResearch Assistant, Purdue UniversityVerified email at purdue.edu
- Avishay YanaiVMware ResearchVerified email at biu.ac.il
- Ittai AbrahamIntelVerified email at cs.huji.ac.il
- Alin TomescuAptos LabsVerified email at alum.mit.edu
- Tiantian GongPurdue UniversityVerified email at purdue.edu
- Benny applebaumElectrical Engineering School, Tel-Aviv UniversityVerified email at post.tau.ac.il
- Benny PinkasBar Ilan University and Aptos LabsVerified email at biu.ac.il
- Manish NagarajPurdue UniversityVerified email at purdue.edu
- Chen-Da Liu-ZhangLucerne University of Applied Sciences and Arts & Web3 FoundationVerified email at hslu.ch
- Dominique SchröderFull Professor, Computer Science, TU Wien