Get my own profile
Public access
View all46 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Jonathan SmithProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Ravi KuberAssociate Professor, UMBCVerified email at umbc.edu
Flynn WolfUniversity of Maryland at Baltimore CountyVerified email at umbc.edu
John SonchackPostdoctoral Researcher, Princeton UniversityVerified email at princeton.edu
Eric KellerUniversity of Colorado, BoulderVerified email at colorado.edu
Micah SherrCallahan Family Professor of Computer Science, Georgetown UniversityVerified email at cs.georgetown.edu
Daniel S. RocheAssociate Professor of Computer Science, United States Naval AcademyVerified email at usna.edu
Philipp MarkertFormer researcher @ Ruhr University BochumVerified email at rub.de
Seung Geol ChoiProfessor, US Naval AcademyVerified email at usna.edu
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
Maximilian GollaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Katherine L. GibsonUniversity of PennsylvaniaVerified email at seas.upenn.edu
Andrew G. WestPrincipal Research Scientist, Verisign / Verisign LabsVerified email at verisign.com
Daniel V BaileyRuhr University BochumVerified email at sth.rub.de
Travis MayberryUS Naval AcademyVerified email at usna.edu
Hirak RayUser Experience Researcher, UVaVerified email at umbc.edu
Andreas HaeberlenUniversity of PennsylvaniaVerified email at cis.upenn.edu
Jian ChangUniversity of PennsylvaniaVerified email at cis.upenn.edu
Insup LeeProfessor, Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Benjamin SappWaymoVerified email at google.com