Get my own profile
Public access
View all53 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Patrick McDanielTsun-Ming Shih Professor of Computer Sciences, University of Wisconsin-MadisonVerified email at cs.wisc.edu
Ronald PerezFormer Intel, Visa, AMD, IBM, Cryptography Research, Motorola, and Tandem ComputersVerified email at acm.org
Leendert van DoornQualcomm, CMUVerified email at paramecium.org
Hayawardh VijayakumarSamsung Research AmericaVerified email at samsung.com
Giuseppe PetraccaPhD Candidate, Pennsylvania State UniversityVerified email at psu.edu
Xinyang GeMicrosoft ResearchVerified email at microsoft.com
Gang TanProfessor of computer science and engineering, Penn State UniversityVerified email at cse.psu.edu
Sandra Julieta RuedaUniversidad de Los Andes, ColombiaVerified email at uniandes.edu.co
Atul PrakashProfessor of EECS, University of MichiganVerified email at umich.edu
Yuqiong SunFacebook, Applied Privacy TechnologiesVerified email at fb.com
Somesh JhaLubar Chair of Computer Science, University of WisconsinVerified email at cs.wisc.edu
Thomas La PortaPenn State UniversityVerified email at cse.psu.edu
Mathias PayerEPFL IC, HexHive LaboratoryVerified email at nebelwelt.net
Thomas MoyerUNC CharlotteVerified email at uncc.edu
Kevin ElphinstoneUniversity of New South WalesVerified email at cse.unsw.edu.au
Vinod GanapathyProfessor of Computer Science, Indian Institute of Science BangaloreVerified email at iisc.ac.in
William EnckProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Kevin ButlerUniversity of FloridaVerified email at ufl.edu
Aviel D. RubinProfessor of Computer Science, Johns Hopkins UniversityVerified email at jhu.edu
Follow
Trent Jaeger
Professor of Computer Science and Engineering, UC Riverside
Verified email at ucr.edu - Homepage