Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
- Saad IslamWorcester Polytechnic InstituteVerified email at wpi.edu
- Berk GulmezogluIowa State UniversityVerified email at iastate.edu
- Ziming ZhangAssistant Professor, Worcester Polytechnic Institute (WPI)Verified email at wpi.edu
- Yarkin DorozAssistant Teaching ProfessorVerified email at wpi.edu
- Andrew AdilettaGraduate Hardware Security Researcher, WPIVerified email at wpi.edu
- Thomas EisenbarthUniversity of LübeckVerified email at uni-luebeck.de
- Andreas ZanklSecurity Researcher, Fraunhofer AISECVerified email at aisec.fraunhofer.de
- Koksal MusWorcester Polytechnic InstituteVerified email at wpi.edu
- Syed Mahbub HafizStaff Security Research Engineer (Cryptography) at LG Electronics USA, Inc.Verified email at lge.com
- Keewoo LeeUC BerkeleyVerified email at berkeley.edu