Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Nadia HeningerUniversity of California San DiegoVerified email at cs.ucsd.edu
Luke ValentaCloudflareVerified email at cloudflare.com
Joshua FriedMITVerified email at csail.mit.edu
David AdrianIndependentVerified email at umich.edu
Yuval ShavittTel Aviv UniversityVerified email at eng.tau.ac.il
Nimrod AviramTel Aviv UniversityVerified email at mail.tau.ac.il
Matthew GreenJohns Hopkins UniversityVerified email at cs.jhu.edu
J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at umich.edu
David A. HoffmanProfessor of Law, University of Pennsylvania Law SchoolVerified email at law.upenn.edu
Sebastian SchinzelMünster University of Applied Sciences, Fraunhofer SIT, AtheneVerified email at fh-muenster.de
Emilia KasperSoftware engineer, GoogleVerified email at google.com
Stephen CheckowayAssociate Professor at Oberlin CollegeVerified email at oberlin.edu
Hovav ShachamProfessor of Computer Science, The University of Texas at AustinVerified email at cs.utexas.edu
Ralf-Philipp WeinmannComsecuris GmbHVerified email at comsecuris.com
Juraj SomorovskyPaderborn UniversityVerified email at upb.de
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Christina GarmanPurdue UniversityVerified email at purdue.edu
Jacob MaskiewiczGraduate Researcher, University of California San DiegoVerified email at cs.ucsd.edu
David A. WishnickGeorgetown University Law CenterVerified email at georgetown.edu
Madelyn R SanfilippoAssistant Professor, School of Information Sciences, University of Illinois at Urbana-ChampaignVerified email at illinois.edu