Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoVerified email at uchicago.edu
Vern PaxsonProfessor, EECS, University of California, BerkeleyVerified email at berkeley.edu
Jedidiah CrandallAssociate Professor, Arizona State UniversityVerified email at asu.edu
Nicholas WeaverInternational Computer Science InstituteVerified email at berkeley.edu
Philipp WinterBrave SoftwareVerified email at nymity.ch
Ram Sundara RamanGraduate Student, University of MichiganVerified email at umich.edu
J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at umich.edu
Reethika RameshUniversity of MichiganVerified email at umich.edu
Frank LiAssistant Professor, Georgia TechVerified email at gatech.edu
Anne EdmundsonPrinceton UniversityVerified email at alumni.princeton.edu
Muhammad IkramProject Lead at MQCSH; Deputy Program Leader Cyber Security, Macquarie UniversityVerified email at mq.edu.au
William MarczakUC BerkeleyVerified email at cs.berkeley.edu
Ronald J. DeibertProfessor of Political Science and Director of the Citizen Lab, University of TorontoVerified email at utoronto.ca
John Scott-RailtonSenior Researcher, Citizen Lab, Munk School of Global Affairs, University of TorontoVerified email at citizenlab.ca
Will ScottProtocol LabsVerified email at cs.washington.edu
Allison McDonaldBoston UniversityVerified email at bu.edu
Matthew BernhardVotingWorksVerified email at voting.works
Jennifer RexfordProfessor of Computer Science, Princeton UniversityVerified email at cs.princeton.edu
Abdullah MueenAssociate Professor, Department of Computer Science, University of New MexicoVerified email at cs.unm.edu
Gareth TysonHong Kong University of Science and TechnologyVerified email at ust.hk
Follow
Roya Ensafi
Assistant Professor, Computer Science & Engineering, University of Michigan
Verified email at umich.edu - Homepage