Get my own profile
Public access
View all17 articles
11 articles
available
not available
Based on funding mandates
Co-authors
Danilo GligoroskiProfessor of Information Security and Cryptology, NTNUVerified email at item.ntnu.no
Kevin SkadronHarry Douglas Forsyth Professor of Computer Science, University of VirginiaVerified email at virginia.edu
Hristina Mihajloska TrpcheskaSs. Cyril and Methodius University, Faculty of Computer Science and EngineeringVerified email at finki.ukim.mk
Xinfei GuoShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Martin MargalaProfessor and Director, School of Computing and Informatics, University of Louisiana at LafayetteVerified email at louisiana.edu
Mircea R. StanVirginia Microelectronics Consortium (VMEC) Professor, University of VirginiaVerified email at virginia.edu
Simona SamardjiskaDigital Security Group, Radboud University, The NetherlandsVerified email at cs.ru.nl
S. F. MjølsnesProfessor at NTNUVerified email at item.ntnu.no
Jack WaddenComputer Science, University of MichiganVerified email at umich.edu
Amit Kulkarni, Ph.D.Postdoctoral Research Associate at ETH, ZurichVerified email at inf.ethz.ch
sohan purohitVerified email at intel.com
Gabriel RobinsUniversity of VirginiaVerified email at cs.virginia.edu
Georgios K. PitsilisPhD in Computer ScienceVerified email at ntnu.no
Ke WangAcumino