Get my own profile
Public access
View all17 articles
1 article
available
not available
Based on funding mandates
Co-authors
Michal FeldmanProfessor of Computer Science, Tel Aviv UniversityVerified email at post.tau.ac.il
Nicolas ChristinProfessor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
Ion StoicaProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Benjamin JohnsonUniversity of California, BerkeleyVerified email at ischool.berkeley.edu
Marvin SirbuCarnegie Mellon UniversityVerified email at cmu.edu
Nick MerrillCenter for Long-Term Cybersecurity, UC BerkeleyVerified email at berkeley.edu
Kevin LaiGraduate School of Technological and Vocational Education, National Yunlin University of Science andVerified email at gemail.yuntech.edu.tw
Thomas MaillartUniversity of GenevaVerified email at unige.ch
Max T. CurranUniversity of California, Berkeley School of InformationVerified email at berkeley.edu
Ramayya KrishnanCarnegie Mellon UniversityVerified email at cmu.edu
Kartik HosanagarWharton School, University of PennsylvaniaVerified email at wharton.upenn.edu
Richmond Y. WongGeorgia Institute of TechnologyVerified email at gatech.edu
Hui ZhangCarnegie Mellon University, ConvivaVerified email at andrew.cmu.edu
Christos H PAPADIMITRIOUColumbia UniversityVerified email at columbia.edu
Deirdre K. MulliganUC BerkeleyVerified email at berkeley.edu
Scott ShenkerProfessor of Computer Science, UC BerkeleyVerified email at icsi.berkeley.edu
Michael D. SmithJ. Erik Jonsson Professor of Information Technology and Marketing, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Mikhail AtallahDistinguished Professor of Computer ScienceVerified email at cs.purdue.edu
Elaine SedenbergHarvard Berkman Klein CenterVerified email at ischool.berkeley.edu