Get my own profile
Public access
View all27 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
- Lujo BauerCarnegie Mellon UniversityVerified email at cmu.edu
- Saranga KomanduriCarnegie Mellon UniversityVerified email at cs.cmu.edu
- Richard ShaySkyflowVerified email at richshay.com
- Tim VidasCarnegie Mellon UniveristyVerified email at cmu.edu
- Blase UrAssociate Professor, University of ChicagoVerified email at uchicago.edu
- Michelle L. MazurekAssociate Professor, University of MarylandVerified email at umd.edu
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
- Patrick Gage KelleyGoogle, University of New Mexico, Carnegie Mellon UniversityVerified email at google.com
- John ChuangProfessor, UC Berkeley School of InformationVerified email at ischool.berkeley.edu
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
- Serge EgelmanUniversity of California, Berkeley / International Computer Science Institute (ICSI) / AppCensusVerified email at cs.berkeley.edu
- Ben EdelmanAssociate Professor, Harvard Business SchoolVerified email at hbs.edu
- Anupam DattaProfessor, Electrical and Computer Engineering & Computer Science Departments, CMUVerified email at cmu.edu
- Jeremiah BlockiPurdue UniversityVerified email at purdue.edu
- Arunesh SinhaRutgers UniversityVerified email at rutgers.edu
- Jorg LiebeherrUniversity of Toronto, Department of ECEVerified email at comm.utoronto.ca
- Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
- Benjamin JohnsonUniversity of California, BerkeleyVerified email at ischool.berkeley.edu