Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Blase UrAssociate Professor, University of ChicagoVerified email at uchicago.edu
Tadayoshi KohnoProfessor, Paul G. Allen School of Computer Science & Engineering, University of WashingtonVerified email at cs.washington.edu
Franziska RoesnerProfessor, Paul G. Allen School of Computer Science & Engineering, Univ. of WashingtonVerified email at cs.washington.edu
Elissa M. RedmilesClare Luce Boothe Assistant Professor, Georgetown UniversityVerified email at georgetown.edu
Ben WeinshelCarnegie Mellon UniversityVerified email at cmu.edu
Michelle L. MazurekAssociate Professor, University of MarylandVerified email at umd.edu
Maximilian GollaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Yasemin AcarPaderborn University & The George Washington UniversityVerified email at sec.uni-hannover.de
Eric ZengPostdoctoral Researcher, Carnegie Mellon UniversityVerified email at cmu.edu
Shawn ShanUniversity of ChicagoVerified email at uchicago.edu
Nathan ReitingerPh.D. Candidate, University of MarylandVerified email at umd.edu
Ruba Abu-SalmaLecturer (Assistant Professor) in Computer Science, King’s College LondonVerified email at kcl.ac.uk
Yuxi WuNortheastern UniversityVerified email at northeastern.edu
Patrick Gage KelleyGoogle, University of New Mexico, Carnegie Mellon UniversityVerified email at google.com
Sunny ConsolvoResearcher @ GoogleVerified email at google.com
Kurt ThomasResearch Scientist @ GoogleVerified email at google.com
Matthew KuglerNorthwestern UniversityVerified email at law.northwestern.edu
Lior Jacob StrahilevitzSidley Austin Professor of Law, University of ChicagoVerified email at uchicago.edu
Pardis Emami-NaeiniAssistant Professor, Computer Science Department, Duke UniversityVerified email at cs.duke.edu