Get my own profile
Public access
View all19 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Michal FeldmanProfessor of Computer Science, Tel Aviv UniversityVerified email at post.tau.ac.il
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
- Nicolas ChristinCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Ion StoicaProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
- Benjamin JohnsonUniversity of California, BerkeleyVerified email at ischool.berkeley.edu
- Marvin SirbuCarnegie Mellon UniversityVerified email at cmu.edu
- Nick MerrillCenter for Long-Term Cybersecurity, UC BerkeleyVerified email at berkeley.edu
- Kevin LaiGraduate School of Technological and Vocational Education, National Yunlin University of Science andVerified email at gemail.yuntech.edu.tw
- Thomas MaillartUniversity of GenevaVerified email at unige.ch
- Max T. CurranUniversity of California, Berkeley School of InformationVerified email at berkeley.edu
- Ramayya KrishnanCarnegie Mellon UniversityVerified email at cmu.edu
- Kartik HosanagarWharton School, University of PennsylvaniaVerified email at wharton.upenn.edu
- Richmond Y. WongGeorgia Institute of TechnologyVerified email at gatech.edu
- Hui ZhangCarnegie Mellon University, ConvivaVerified email at andrew.cmu.edu
- Christos H PAPADIMITRIOUColumbia UniversityVerified email at columbia.edu
- Deirdre K. MulliganUC BerkeleyVerified email at berkeley.edu
- Michael D. SmithJ. Erik Jonsson Professor of Information Technology and Marketing, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
- Vidyanand ChoudharyUniversity of California, IrvineVerified email at uci.edu
- Elaine SedenbergHarvard Berkman Klein CenterVerified email at ischool.berkeley.edu
- Jeremy GordonPhD, University of California, BerkeleyVerified email at berkeley.edu