Get my own profile
Public access
View all14 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Aniket KatePurdue University / Supra ResearchVerified email at purdue.edu
- Adithya VadapalliIIT KanpurVerified email at cse.iitk.ac.in
- amir herzbergDept. of Computer Science and Engineering, University of ConnecticutVerified email at uconn.edu
- Femi OlumofinGoogleVerified email at google.com
- Syed Mahbub HafizStaff Security Research Engineer (Cryptography) at LG Electronics USA, Inc.Verified email at lge.com
- L Jean CampProfessor of Informatics and Computer Science, Luddy School, Indiana UniversityVerified email at indiana.edu
- Tadayoshi KohnoProfessor, Paul G. Allen School of Computer Science & Engineering, University of WashingtonVerified email at cs.washington.edu
- Shwetak PatelUniversity of Washington, Washington Research Foundation Endowed Professor, Computer ScienceVerified email at cs.washington.edu
- Shrirang MareWestern Washington UniversityVerified email at wwu.edu
- Joshua StreiffIndiana UniversityVerified email at iu.edu
- Wouter LueksCISPA Helmholtz Center for Information Security, GermanyVerified email at cispa.de
- Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
- KJ (Kyoung Jin) ChoiHaskayne School of Business, University of CalgaryVerified email at ucalgary.ca
- Alfred LeharHaskayne School of Business, University of CalgaryVerified email at ucalgary.ca
- Fattaneh BayatbabolghaniSoftware Engineer, Security at GoogleVerified email at google.com
- Tiantian GongPurdue UniversityVerified email at purdue.edu
- Alexandros PsomasAssistant Professor, Purdue UniversityVerified email at cs.purdue.edu
- Bailey KacsmarUniversity of AlbertaVerified email at ualberta.ca
- Sarah PloskerDepartment of Mathematics & Computer Science, Brandon UniversityVerified email at brandonu.ca
- Natnatee DokmaiPostdoctoral Associate, Yale School of MedicineVerified email at yale.edu