Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Juba ZianiGeorgia Institute of Technology (IsyE)Verified email at isye.gatech.edu
- Aaron RothProfessor of Computer Science, University of PennsylvaniaVerified email at cis.upenn.edu
- Eshwar Ram ArunachaleswaranPhD Student, University of PennsylvaniaVerified email at seas.upenn.edu
- Sampath KannanProfessor, Computer and Information Science, University of PennsylvaniaVerified email at seas.upenn.edu
- Rachid El-AzouziAvignon UniversityVerified email at univ-avignon.fr
- sudheer poojaryQualcomm, BangaloreVerified email at qti.qualcomm.com
- Eitan AltmanSenior Researchers at INRIA, Sophia-Antipolis, FranceVerified email at inria.fr
- Himadri Mukherjeeassistant professor, BITS-PILANIVerified email at goa.bits-pilani.ac.in
- Jajati Keshari SahooAssociate Professor, Department of Mathematics, BITS Pilani Goa CampusVerified email at goa.bits-pilani.ac.in
- Franziska BoenischAssistant Professor, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Rakshit NaiduGeorgia Institute of Technology, Carnegie Mellon UniversityVerified email at gatech.edu