Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Blase UrAssistant Professor, University of ChicagoVerified email at uchicago.edu
Elissa M. RedmilesFaculty Member & Research Group Leader, Max Planck Institute for Software SystemsVerified email at mpi-sws.org
Ben WeinshelAppleVerified email at weinshel.net
Michelle L. MazurekAssociate Professor, University of MarylandVerified email at umd.edu
Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Yasemin AcarThe George Washington University & Max Planck Institute for Security and PrivacyVerified email at sec.uni-hannover.de
Maximilian GollaMax Planck Institute for Security and PrivacyVerified email at mpi-sp.org
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
Ruba Abu-SalmaLecturer (Assistant Professor) in Computer Science, King’s College LondonVerified email at kcl.ac.uk
Yuxi WuGeorgia Institute of TechnologyVerified email at gatech.edu
Mainack MondalAssistant Professor at Department of Computer Science and Engineering, IIT KharagpurVerified email at cse.iitkgp.ac.in
Shawn ShanUniversity of ChicagoVerified email at cs.uchicago.edu
Claire DolinUniversity of ChicagoVerified email at uchicago.edu
Justin GoodmanGraduate, University of MarylandVerified email at terpmail.umd.edu
Nathan ReitingerPh.D. Candidate, University of MarylandVerified email at umd.edu
Matthew KuglerNorthwestern UniversityVerified email at law.northwestern.edu