Get my own profile
Public access
View all25 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Lujo BauerCarnegie Mellon UniversityVerified email at cmu.edu
Saranga KomanduriCarnegie Mellon UniversityVerified email at cs.cmu.edu
Richard ShaySkyflowVerified email at richshay.com
Tim VidasCarnegie Mellon UniveristyVerified email at cmu.edu
Michelle L. MazurekAssociate Professor, University of MarylandVerified email at umd.edu
Blase UrAssociate Professor, University of ChicagoVerified email at uchicago.edu
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Patrick Gage KelleyGoogle, University of New Mexico, Carnegie Mellon UniversityVerified email at google.com
John ChuangProfessor, UC Berkeley School of InformationVerified email at ischool.berkeley.edu
Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
Serge EgelmanUniversity of California, Berkeley / International Computer Science Institute (ICSI) / AppCensusVerified email at cs.berkeley.edu
Jorg LiebeherrUniversity of Toronto, Department of ECEVerified email at comm.utoronto.ca
Ben EdelmanAssociate Professor, Harvard Business SchoolVerified email at hbs.edu
Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Anupam DattaProfessor, Electrical and Computer Engineering & Computer Science Departments, CMUVerified email at cmu.edu
Jeremiah BlockiPurdue UniversityVerified email at purdue.edu
Arunesh SinhaRutgers UniversityVerified email at rutgers.edu
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Benjamin JohnsonUniversity of California, BerkeleyVerified email at ischool.berkeley.edu
Follow