Get my own profile
Public access
View all24 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Yasemin AcarPaderborn University & The George Washington UniversityVerified email at sec.uni-hannover.de
Christian StranskyKKH Kaufmännische KrankenkasseVerified email at sec.uni-hannover.de
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Michelle L. MazurekAssociate Professor, University of MarylandVerified email at umd.edu
Henning PerlFraunhofer FKIE, BonnVerified email at fkie.fraunhofer.de
Doowon KimUniversity of Tennessee, KnoxvilleVerified email at utk.edu
Sven BugielCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Florian SchaubUniversity of MichiganVerified email at umich.edu
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Bernd FreislebenProfessor of Computer Science, University of Marburg, GermanyVerified email at informatik.uni-marburg.de
Felix FischerChair of Cyber Trust, Technical University of MunichVerified email at tum.de
Simson GarfinkelBasisTech, LLCVerified email at acm.org
Fabian YamaguchiWhirly Labs (Pty) Ltd, Qwiet.AI, Stellenbosch UniversityVerified email at codeminers.org
Konrad RieckTechnische Universität BerlinVerified email at tu-berlin.de
Joseph BonneauNew York UniversityVerified email at cs.nyu.edu
Elissa M. RedmilesAssistant Professor, Georgetown UniversityVerified email at georgetown.edu
Sebastian MöllerProfessor for Quality and Usability, TU Berlin and Scientific Director, DFKI and Adjunct ProfessorVerified email at tu-berlin.de
Dominik Schürmannheylogin GmbH (previously: TU Braunschweig, IBR)Verified email at schuermann.eu
Miranda WeiUniversity of WashingtonVerified email at cs.washington.edu
Blase UrAssociate Professor, University of ChicagoVerified email at uchicago.edu