Get my own profile
Public access
View all6 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Patrick SchaumontWorcester Polytechnic InstituteVerified email at wpi.edu
- Pantea KiaeiPhD Student, Worcester Polytechnic InstituteVerified email at wpi.edu
- Mo YangPhD student of Electrical and Computer Engineering, Virginia TechVerified email at vt.edu
- Barış EgeRiscure B.V.Verified email at riscure.com
- Bilgiday YuceSecurity Researcher at IntelVerified email at vt.edu
- Shahin TajikAssistant Professor, Worcester Polytechnic Institute (WPI)Verified email at wpi.edu
- Ulkuhan GulerWorcester Polytecnic InstituteVerified email at wpi.edu
- Tuna Berk TufanPhD Student, Electrical and Computer Engineering, Worcester Polytechnic InstituteVerified email at wpi.edu
- Michael TunstallCryptography ResearchVerified email at cryptography.com
- Conor PatrickVirgina TechVerified email at vt.edu