Get my own profile
Public access
View all40 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Öznur ÖzkasapProfessor of Computer Engineering, Koç UniversityVerified email at ku.edu.tr
- C. Chris ErwayVerified email at cs.brown.edu
- Mohammad EtemadUniversity of VirginiaVerified email at virginia.edu
- Yahya Hassanzadeh-NazarabadiPh.D. in Computer SciencesVerified email at ieee.org
- Charalampos PapamanthouYale UniversityVerified email at yale.edu
- Anna LysyanskayaProfessor of Computer Science, Brown UniversityVerified email at cs.brown.edu
- Roberto TamassiaPlastech Professor of Computer Science, Brown UniversityVerified email at cs.brown.edu
- Sanaz Taheri-BoshrooyehSenior Protocol Engineer (Ph.D. of Computer Science)Verified email at celestia.org
- Osman BiçerUniversity of BaselVerified email at unibas.ch
- Tolga AcarMicrosoftVerified email at microsoft.com
- Ertem EsinerSenior Research Scientist & Coordinator, IARCS (University of Illinois Urbana-Champaign)Verified email at illinois.edu
- Ege ErdoganTechnical University of MunichVerified email at tum.de
- A. Ercument CicekAssociate Professor, Bilkent University; Adj. Faculty Member, Carnegie Mellon UniversityVerified email at cs.bilkent.edu.tr
- Melissa ChaseMicrosoft ResearchVerified email at microsoft.com
- Buket YukselKoç UniversityVerified email at ku.edu.tr
- Devriş İşlerIMDEA Networks & UC3MVerified email at imdea.org
- Daniel WichsNortheastern University, ProfessorVerified email at ccs.neu.edu
- David CashUniversity of ChicagoVerified email at cs.uchicago.edu
- David EvansUniversity of Virginia, Computer ScienceVerified email at virginia.edu
- Ferhat KarakoçSecurity and Privacy Researcher, EricssonVerified email at itu.edu.tr