Get my own profile
Public access
View all38 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Lujo BauerCarnegie Mellon UniversityVerified email at cmu.edu
Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Richard ShayTechnical Staff, MIT Lincoln LaboratoryVerified email at richshay.com
Nicolas ChristinAssociate Professor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Saranga KomanduriCarnegie Mellon UniversityVerified email at cs.cmu.edu
Blase UrAssistant Professor, University of ChicagoVerified email at uchicago.edu
Patrick Gage KelleyGoogle, University of New Mexico, Carnegie Mellon UniversityVerified email at google.com
Elissa M. RedmilesFaculty Member & Research Group Leader, Max Planck Institute for Software SystemsVerified email at mpi-sws.org
Daniel VotipkaTufts UniversityVerified email at cs.tufts.edu
Tim VidasCarnegie Mellon UniveristyVerified email at cmu.edu
Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Yasemin AcarThe George Washington University & Max Planck Institute for Security and PrivacyVerified email at sec.uni-hannover.de
Rock StevensUniversity of MarylandVerified email at umd.edu
Doowon KimUniversity of Tennessee, KnoxvilleVerified email at utk.edu
Christian StranskyCISPA Helmholtz Center for Information Security, GermanyVerified email at cispa.de
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Sean KrossThe University of California San DiegoVerified email at ucsd.edu
Michael ReiterJames B. Duke Distinguished Professor, Duke UniversityVerified email at duke.edu
Wei BaiGoogle, University of Maryland, College ParkVerified email at google.com
Manya SleeperGoogleVerified email at google.com
Follow