Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Florian SchaubUniversity of MichiganVerified email at umich.edu
Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Norman SadehProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Hana HabibCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Abraham MhaidliJunior Research Group Leader, Max Planck Institute for Security and PrivacyVerified email at umich.edu
Adam J AvivThe George Washington UniversityVerified email at email.gwu.edu
Kevin Alejandro RoundyAndromeda SecurityVerified email at andromedasecurity.com
Acar TamersoyPrincipal Applied Scientist at MicrosoftVerified email at gatech.edu
Joel R. ReidenbergStanley D. and Nikki Waxberg Chair in Law, Fordham UniversityVerified email at law.fordham.edu
Kaiwen SunUniversity of MichiganVerified email at umich.edu
Yaxing YaoAssistant Professor at Virginia TechVerified email at vt.edu
Peter MayerUniversity of Southern Denmark, Karlsruhe Institute of TechnologyVerified email at imada.sdu.dk
Thomas RistenpartProfessor of Computer Science, Cornell TechVerified email at cornell.edu
Nicola DellCornell UniversityVerified email at cornell.edu
Allison McDonaldBoston UniversityVerified email at bu.edu
Austin McCallConsultant, DeloitteVerified email at umich.edu
Chelse SwoopesVerified email at g.harvard.edu
Sarah K. PearmanCarnegie Mellon UniversityVerified email at cmu.edu
Tanisha AfnanSchool of Information, University of MichiganVerified email at umich.edu