Get my own profile
Public access
View all2 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Pranjal DuttaAssistant Professor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Rishab GoyalUW-MadisonVerified email at wisc.edu
Santanu SarkarProfessor, IIT MadrasVerified email at iitm.ac.in
RAJENDRA KUMARIndian Institute of Technology DelhiVerified email at cse.iitd.ac.in
Shashank K MehtaProfessor of Computer Scinece, Indian Institute of Technology-KanpurVerified email at cse.iitk.ac.inHoda AlkhzaimiNEW YORK UNIVERSITY ABU DHABIVerified email at nyu.edu
Manoj PrabhakaranComputer Science and Engineering, IIT BombayVerified email at cse.iitb.ac.in
Varun NarayananUCLAVerified email at campus.technion.ac.ilKaartik BhushanCNRS Postdoc, IRIFVerified email at irif.fr
Nico DöttlingHelmholtz Center for Information Security (CISPA)Verified email at cispa.de
Anne MüllerCISPA Helmholtz Center for Information SecurityVerified email at cispa.deRyo NishimakiNTT Social Informatics LaboratoriesVerified email at ntt.com
Takashi YamakawaNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jpAman VermaIndian Institute of Technology DelhiVerified email at cse.iitd.ac.in
Venkata KoppulaIndian Institute of Technology, Delhi
Dhairya GuptaIndian Institute of Technology Delhi
Harihar SwaminathanIIT Delhi