Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Debarghya GhoshdastidarTechnical University of MunichVerified email at cit.tum.de
- Pascal M. EsserTechnical University of MunichVerified email at in.tum.de
- Sivasankar ElangoAssociate Professor ,Department of Computer Science & Engineering ,National Institute of TechnologyVerified email at nitt.edu
- SELVI CHANDRANAssistant Professor, Indian Institute of Information Technology Kottayam, KeralaVerified email at iiitkottayam.ac.in
- Leena Chennuru VankadaraAmazon Research; Previously University of Tübingen and Max Planck Institute, TübingenVerified email at uni-tuebingen.de
- Freya BehrensEPFL, LausanneVerified email at epfl.ch
- Anna DawidLeiden UniversityVerified email at liacs.leidenuniv.nl
- Urte AdomaitytePhD Student, King's College LondonVerified email at kcl.ac.uk
- Satyaki MukherjeeNational University of SingaporeVerified email at nus.edu.sg
- Krikamol MuandetCISPA - Helmholtz Center for Information SecurityVerified email at cispa.de
- ANURAG SINGHCISPA Helmholtz Center for Information SecurityVerified email at nsit.net.in