Get my own profile
Public access
View all44 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Jonathan SmithProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Ravi KuberAssociate Professor, UMBCVerified email at umbc.edu
Flynn WolfUniversity of Maryland at Baltimore CountyVerified email at umbc.edu
John SonchackPostdoctoral Researcher, Princeton UniversityVerified email at princeton.edu
Eric KellerUniversity of Colorado, BoulderVerified email at colorado.edu
Daniel S. RocheAssociate Professor of Computer Science, United States Naval AcademyVerified email at usna.edu
Micah SherrCallahan Family Professor of Computer Science, Georgetown UniversityVerified email at cs.georgetown.edu
Seung Geol ChoiAssociate Professor, US Naval AcademyVerified email at usna.edu
Philipp MarkertFormer researcher @ Ruhr University BochumVerified email at rub.de
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
Maximilian GollaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Andrew G. WestPrincipal Research Scientist, Verisign / Verisign LabsVerified email at verisign.com
Katherine L. GibsonUniversity of PennsylvaniaVerified email at seas.upenn.edu
Travis MayberryUS Naval AcademyVerified email at usna.edu
Daniel V BaileyRuhr University BochumVerified email at sth.rub.de
Hirak RayUser Experience Researcher, UVaVerified email at umbc.edu
Andreas HaeberlenUniversity of PennsylvaniaVerified email at cis.upenn.edu
Jian ChangUniversity of PennsylvaniaVerified email at cis.upenn.edu
Insup LeeProfessor, Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Benjamin SappWaymoVerified email at google.com