Get my own profile
Public access
View all19 articles
1 article
available
not available
Based on funding mandates
Co-authors
Michal FeldmanProfessor of Computer Science, Tel Aviv UniversityVerified email at post.tau.ac.il
Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
Nicolas ChristinProfessor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Ion StoicaProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Benjamin JohnsonUniversity of California, BerkeleyVerified email at ischool.berkeley.edu
Marvin SirbuCarnegie Mellon UniversityVerified email at cmu.edu
Nick MerrillCenter for Long-Term Cybersecurity, UC BerkeleyVerified email at berkeley.edu
Kevin LaiGraduate School of Technological and Vocational Education, National Yunlin University of Science andVerified email at gemail.yuntech.edu.tw
Thomas MaillartUniversity of GenevaVerified email at unige.ch
Max T. CurranUniversity of California, Berkeley School of InformationVerified email at berkeley.edu
Ramayya KrishnanCarnegie Mellon UniversityVerified email at cmu.edu
Kartik HosanagarWharton School, University of PennsylvaniaVerified email at wharton.upenn.edu
Richmond Y. WongGeorgia Institute of TechnologyVerified email at gatech.edu
Hui ZhangCarnegie Mellon University, ConvivaVerified email at andrew.cmu.edu
Christos H PAPADIMITRIOUColumbia UniversityVerified email at columbia.edu
Deirdre K. MulliganUC BerkeleyVerified email at berkeley.edu
Scott ShenkerProfessor of Computer Science, UC BerkeleyVerified email at icsi.berkeley.edu
Michael D. SmithJ. Erik Jonsson Professor of Information Technology and Marketing, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Elaine SedenbergHarvard Berkman Klein CenterVerified email at ischool.berkeley.edu
Dongyan XuSamuel Conte Professor of Computer Science and Director of CERIAS, Purdue UniversityVerified email at purdue.edu