Get my own profile
Public access
View all24 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Erkay SavasSabanci UniversityVerified email at sabanciuniv.edu
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Nazar Abbas SaqibImam Abdulrahman Bin Faisal University, 2835 King Faisal Road, Dammam 34212Verified email at iau.edu.sa
Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
Onur AciicmezSamsung Research AmericaVerified email at samsung.com
Francisco Rodríguez-HenríquezTechnology Innovation Center: Cryptography Research Centre of the Technology Innovation CentreVerified email at cs.cinvestav.mx
Tolga AcarMicrosoftVerified email at microsoft.com
Ray C.C. CheungAssociate Provost (Digital Learning), Professor of Computer Engineering, City University of HongVerified email at cityu.edu.hk
Burt Kaliski Jr.VerisignVerified email at alum.mit.edu
Donglong ChenAssociate Professor, BNU-HKBU United International College (UIC)Verified email at uic.edu.cn
Jean-Pierre SeifertEinstein Professor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
Tugrul YanikResearch ScientistVerified email at lifetime.oregonstate.edu
Guanrong ChenCity University of Hong KongVerified email at cityu.edu.hk
Lo'ai TawalbehProf. of Computing and Cyber SecurityVerified email at synopsys.com
Murat AydosHacettepe ÜniversitesiVerified email at hacettepe.edu.tr
Serdar S. ErdemGebze technical University, Kocaeli, TurkeyVerified email at gtu.edu.tr
Albert LeviSabancı ÜniversitesiVerified email at sabanciuniv.edu
Zeynep Ödemiş ÖzgerDepartment of Software Engineering, Iğdır UniversityVerified email at igdir.edu.tr
Efstratios GallopoulosComputer Engineering and Informatics Department (CEID), University of Patras, GreeceVerified email at ceid.upatras.gr
Gokay SaldamliSan Jose State UniversityVerified email at sjsu.edu