Get my own profile
Public access
View all41 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Norman SadehProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Michael WeberProfessor, Ulm UniversityVerified email at uni-ulm.de
Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Shomir WilsonAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
Yixin ZouTenure-Track Faculty Member, Max Planck Institute for Security and PrivacyVerified email at mpi-sp.org
Bastian KöningsInstitute of Media Informatics, Ulm UniversityVerified email at alumni.uni-ulm.de
Frank KarglProfessor of Computer Science, Ulm UniversityVerified email at uni-ulm.de
Joel R. ReidenbergStanley D. and Nikki Waxberg Chair in Law, Fordham UniversityVerified email at law.fordham.edu
Abraham MhaidliPhD Student, University of MichiganVerified email at umich.edu
Martin DegelingStiftung Neue VerantwortungVerified email at ruhr-uni-bochum.de
Hana HabibCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Travis BreauxAssociate Professor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Yuvraj AgarwalAssociate Professor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Idris AdjeridAssociate Professor, Virginia TechVerified email at vt.edu
Ashwini RaoEydle Inc.Verified email at eydle.com
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Christine UtzPostdoctoral researcher, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Rebecca BalebakoGoogleVerified email at google.com
Fei LiuEmory UniversityVerified email at emory.edu