Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Blase UrAssociate Professor, University of ChicagoVerified email at uchicago.edu
- Tadayoshi KohnoProfessor, Paul G. Allen School of Computer Science & Engineering, University of WashingtonVerified email at cs.washington.edu
- Franziska RoesnerProfessor, Paul G. Allen School of Computer Science & Engineering, Univ. of WashingtonVerified email at cs.washington.edu
- Elissa M. RedmilesClare Luce Boothe Assistant Professor, Georgetown UniversityVerified email at georgetown.edu
- Ben WeinshelCarnegie Mellon UniversityVerified email at cmu.edu
- Michelle L. MazurekAssociate Professor, University of MarylandVerified email at umd.edu
- Maximilian GollaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Yasemin AcarPaderborn University & The George Washington UniversityVerified email at sec.uni-hannover.de
- Eric ZengPostdoctoral Researcher, Carnegie Mellon UniversityVerified email at cmu.edu
- Shawn ShanUniversity of ChicagoVerified email at uchicago.edu
- Ruba Abu-SalmaLecturer (Assistant Professor) in Computer Science, King’s College LondonVerified email at kcl.ac.uk
- Nathan ReitingerPh.D. Candidate, University of MarylandVerified email at umd.edu
- Yuxi WuNortheastern UniversityVerified email at northeastern.edu
- Patrick Gage KelleyGoogle, University of New Mexico, Carnegie Mellon UniversityVerified email at google.com
- Sunny ConsolvoResearcher @ GoogleVerified email at google.com
- Kurt ThomasResearch Scientist @ GoogleVerified email at google.com
- Matthew KuglerNorthwestern UniversityVerified email at law.northwestern.edu
- Lior Jacob StrahilevitzSidley Austin Professor of Law, University of ChicagoVerified email at uchicago.edu
- Pardis Emami-NaeiniAssistant Professor, Computer Science Department, Duke UniversityVerified email at cs.duke.edu