Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Erkay SavasSabanci UniversityVerified email at sabanciuniv.edu
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
Onur AciicmezSamsung Research AmericaVerified email at samsung.com
Tolga AcarMicrosoftVerified email at microsoft.com
Nazar Abbas SaqibImam Abdulrahman Bin Faisal University, 2835 King Faisal Road, Dammam 34212Verified email at iau.edu.sa
Francisco Rodríguez-HenríquezComputer Science CINVESTAV-IPN: Cryptography Research Centre of the Technology Innovation CentreVerified email at cs.cinvestav.mx
Burt Kaliski Jr.VerisignVerified email at alum.mit.edu
Jean-Pierre SeifertProfessor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
Tugrul YanikResearch ScientistVerified email at lifetime.oregonstate.edu
Murat AydosHacettepe ÜniversitesiVerified email at hacettepe.edu.tr
Serdar S. ErdemGebze technical University, Kocaeli, TurkeyVerified email at gtu.edu.tr
Ray C.C. CheungAssociate Professor, City University of Hong KongVerified email at cityu.edu.hk
Guanrong ChenCity University of Hong KongVerified email at cityu.edu.hk
Albert LeviSabancı ÜniversitesiVerified email at sabanciuniv.edu
Efstratios GallopoulosComputer Engineering and Informatics Department (CEID), University of Patras, GreeceVerified email at ceid.upatras.gr
Gokay SaldamliSan Jose State UniversityVerified email at sjsu.edu
Lo'ai TawalbehProf. of Computing and Cyber SecurityVerified email at tamusa.edu
Donglong ChenAssociate Professor, BNU-HKBU United International College (UIC)Verified email at uic.edu.cn
Adnan GutubProfessor of Computer Engineering at Umm Al-Qura University, Saudi ArabiaVerified email at uqu.edu.sa