Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Aniket KatePurdue University / Supra ResearchVerified email at purdue.edu
Kartik NayakDuke UniversityVerified email at cs.duke.edu
Nibesh ShresthaSupra LabsVerified email at supraoracles.com
Michael ReiterJames B. Duke Distinguished Professor, Duke UniversityVerified email at duke.edu
Akhil BandarupalliPh.D. student in Computer Science, Purdue UniversityVerified email at purdue.edu
Saurabh BagchiElectrical and Computer Engineering, Computer Science; Director Army A2I2 & NSF CHORUS; PurdueVerified email at purdue.edu
Bernardo MagriThe University of ManchesterVerified email at manchester.ac.uk
Daniel TschudiConcordiumVerified email at concordium.com
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
Zhongtang LuoResearch Assistant, Purdue UniversityVerified email at purdue.edu
Avishay YanaiVMware ResearchVerified email at biu.ac.il
Ittai AbrahamIntelVerified email at cs.huji.ac.il
Alin TomescuAptos LabsVerified email at alum.mit.edu
Benny applebaumElectrical Engineering School, Tel-Aviv UniversityVerified email at post.tau.ac.il
Benny PinkasBar Ilan UniversityVerified email at biu.ac.il
Tiantian GongPurdue UniversityVerified email at purdue.edu
Chen-Da Liu-ZhangLucerne University of Applied Sciences and Arts & Web3 FoundationVerified email at hslu.ch
Manish NagarajPurdue UniversityVerified email at purdue.edu
Dominique SchröderFull Professor, Computer Science, TU Wien