Get my own profile
Co-authors
Nikita BorisovProfessor of Electrical and Computer Engineering, University of Illinois at UrbanaVerified email at illinois.edu
Joseph GardinerUniversity of Bristol; Lancaster UniversityVerified email at lancaster.ac.uk
Matthew CaesarAssociate Professor of Computer Science, University of IllinoisVerified email at cs.illinois.edu
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Chi-Yao HongGoogleVerified email at google.com
Prateek MittalAssociate Professor, Princeton UniversityVerified email at princeton.edu
Ryan ShahPhD Student, University of StrathclydeVerified email at strath.ac.uk
Amir HoumansadrUniversity of Massachusetts AmherstVerified email at cs.umass.edu
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Dipak GhosalProfessor of Computer Science, University of California, DavisVerified email at ucdavis.edu
Arnab Kumar BiswasResearch Fellow at National University of SingaporeVerified email at nus.edu.sg
Aridaman TripathiVerified email at fb.com
Djamila AouadaSenior Research Scientist, Interdisciplinary Centre for Security, Reliability, and Trust (SnTVerified email at uni.lu
F StajanoProfessor of Security and Privacy, University of Cambridge Computer LabVerified email at cl.cam.ac.uk
Ian WassellUniversity of CambridgeVerified email at cam.ac.uk
Prof. N. BalakrishnanIndian Institute of ScienceVerified email at serc.iisc.ernet.in
Virajith JalapartiMicrosoftVerified email at microsoft.com
Rushil KhuranaCarnegie Mellon UniversityVerified email at cmu.edu
Prerna AroteStudent (Ph. D) IISc, BangaloreVerified email at iisc.ac.in
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Shishir Nagaraja
Verified email at strath.ac.uk - Homepage