Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
Blase UrAssistant Professor, University of ChicagoVerified email at uchicago.edu
Philipp MarkertPhD Student @ Ruhr University BochumVerified email at rub.de
Adam J AvivThe George Washington UniversityVerified email at email.gwu.edu
Daniel V BaileyRuhr University BochumVerified email at sth.rub.de
Earlence FernandesAssistant Professor, UC San DiegoVerified email at ucsd.edu
Roshni PadhiStanford UniversityVerified email at stanford.edu
Weijia HeDartmouth CollegeVerified email at dartmouth.edu
Elissa M. RedmilesFaculty Member & Research Group Leader, Max Planck Institute for Software SystemsVerified email at mpi-sws.org
Lea SchönherrCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Thorsten EisenhoferRuhr University BochumVerified email at rub.de
Jan WieleRuhr-Universität BochumVerified email at ruhr-uni-bochum.de
Miranda WeiUniversity of WashingtonVerified email at cs.washington.edu
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Dorothea KolossaTechnische Universität BerlinVerified email at tu-berlin.de
Claude CastellucciaResearch Director, InriaVerified email at inria.fr
Florian Marius FarkePhD Student @ Ruhr University BochumVerified email at rub.de
David G. BalashThe George Washington UniversityVerified email at gwmail.gwu.edu
Theodor SchnitzlerResearch Center Trustworthy Data Science and Security and TU DortmundVerified email at tu-dortmund.de
David CashUniversity of ChicagoVerified email at cs.uchicago.edu