Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Kris GajGeorge Mason UniversityVerified email at gmu.edu
Ekawat Homsirikamol, PhDGeorge Mason UniversityVerified email at gmu.edu
Jens-Peter KapsAssociate Professor of Electrical and Computer Engineering, George Mason UniversityVerified email at gmu.edu
Paweł MorawieckiPolish Academy of SciencesVerified email at ipipan.waw.pl
Rabia ShahidUniversity of Engineering and Technology PeshawarVerified email at uetpeshawar.edu.pk
Malik U SharifGeorge Mason UniversityVerified email at gmu.edu
Marcin WójcikVerified email at cam.ac.uk
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Josef PieprzykCSIRO Data61Verified email at csiro.au
Frank K. GürkaynakSenior Scientist, ETH ZurichVerified email at ee.ethz.ch
Ahmad SalmanJames Madison UniversiyVerified email at jmu.edu
Panasayya YallaSecurity Analyst, Riscure North AmericaVerified email at riscure.com
Jacek RadzikowskiGeorge Mason UniversityVerified email at gmu.edu
Dai BuiUniversity of California, BerkeleyVerified email at eecs.berkeley.edu