Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Arpita PatraAssociate Professor, Dept. of Computer Science & Automation, Indian Institute of ScienceVerified email at iisc.ac.in
- Xiao WangNorthwestern UniversityVerified email at northwestern.edu
- Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
- Sarbajit MukherjeePhd Student, Utah State UniversityVerified email at aggiemail.usu.edu
- Goutam PaulAssociate Professor, Cryptology & Security Research Unit (CSRU), Indian Statistical InstituteVerified email at ieee.org
- Divya RaviUniversity of Amsterdam, NetherlandsVerified email at uva.nl
- Chaya GaneshIndian Institute of ScienceVerified email at iisc.ac.in
- Sikhar PatranabisIBM Research IndiaVerified email at ibm.com
- Chenkai WengPhD student, Northwestern UniversityVerified email at u.northwestern.edu
- Saikrishna BadrinarayananStaff Applied Researcher, LinkedInVerified email at linkedin.com
- Ajith SureshTechnology Innovation Institute (TII), Abu DhabiVerified email at tii.ae
- Suvradip ChakrabortyResearch Scientist @Visa ResearchVerified email at visa.com
- Dimitris MourisNillionVerified email at nillion.com
- Nektarios Georgios TsoutsosAssistant Professor, University of DelawareVerified email at udel.edu
- Yashvanth KondiSilence Laboratories (employed by Deel)Verified email at silencelaboratories.com
- Ashish ChoudhuryIIIT BangaloreVerified email at iiitb.ac.in
- Gayathri GarimellaOregon State UniversityVerified email at oregonstate.edu
- Pratyay MukherjeeSupra ResearchVerified email at supraoracles.com
- Daniel MasnyMetaVerified email at fb.com
- Srinivasan RaghuramanVisa ResearchVerified email at visa.com