Get my own profile
Public access
View all21 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Michal FeldmanProfessor of Computer Science, Tel Aviv UniversityVerified email at post.tau.ac.il
Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
Nicolas ChristinCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Ion StoicaProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Benjamin JohnsonUniversity of California, BerkeleyVerified email at ischool.berkeley.edu
Marvin SirbuCarnegie Mellon UniversityVerified email at cmu.edu
Nick MerrillCenter for Long-Term Cybersecurity, UC BerkeleyVerified email at berkeley.edu
Kevin LaiGraduate School of Technological and Vocational Education, National Yunlin University of Science andVerified email at gemail.yuntech.edu.tw
Thomas MaillartUniversity of GenevaVerified email at unige.ch
Max T. CurranUniversity of California, Berkeley School of InformationVerified email at berkeley.edu
Ramayya KrishnanCarnegie Mellon UniversityVerified email at cmu.edu
Kartik HosanagarWharton School, University of PennsylvaniaVerified email at wharton.upenn.edu
Richmond Y. WongGeorgia Institute of TechnologyVerified email at gatech.edu
Hui ZhangCarnegie Mellon University, ConvivaVerified email at andrew.cmu.edu
Christos H PAPADIMITRIOUColumbia UniversityVerified email at columbia.edu
Deirdre K. MulliganUC BerkeleyVerified email at berkeley.edu
Jeremy GordonPhD, University of California, BerkeleyVerified email at berkeley.edu
Michael D. SmithJ. Erik Jonsson Professor of Information Technology and Marketing, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Vidyanand ChoudharyUniversity of California, IrvineVerified email at uci.edu
Elaine SedenbergHarvard Berkman Klein CenterVerified email at ischool.berkeley.edu