Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Donghoon ChangIIIT-Delhi, IndiaVerified email at iiitd.ac.in
- Somitra SanadhyaDept. of CSE, IIT JodhpurVerified email at iitj.ac.in
- Munawar HasanNISTVerified email at nist.gov
- Aarushi GoelAssistant Professor, Purdue UniversityVerified email at purdue.edu
- Rishabh RustogiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Abhishek AgarwalCarnegie Mellon UniversityVerified email at snu.edu.in
- Mridul NandiIndian Statistical InstituteVerified email at isical.ac.in
- Ashwin JhaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
- John KelseyNISTVerified email at nist.gov
- Dana Dachman-SoledAssociate Professor, Department of Electrical and Computer Engineering, University of MarylandVerified email at umd.edu
- Meltem Sonmez TuranNational Institute of Standards and TechnologyVerified email at nist.gov
- Sai Sandilya KonduruCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Mohona GhoshAssistant Professor, Indira Gandhi Delhi Technical University for WomenVerified email at igdtuw.ac.in