Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
Blase UrAssociate Professor, University of ChicagoVerified email at uchicago.edu
Philipp MarkertFormer researcher @ Ruhr University BochumVerified email at rub.de
Adam J AvivThe George Washington UniversityVerified email at email.gwu.edu
Daniel V BaileyRuhr University BochumVerified email at sth.rub.de
Earlence FernandesAssistant Professor, UC San DiegoVerified email at ucsd.edu
Roshni PadhiStanford UniversityVerified email at stanford.edu
Weijia HeDartmouth CollegeVerified email at dartmouth.edu
Elissa M. RedmilesAssistant Professor, Georgetown UniversityVerified email at georgetown.edu
Lea SchönherrCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Thorsten EisenhoferTechnische Universität BerlinVerified email at tu-berlin.de
Jan WieleRuhr-Universität BochumVerified email at ruhr-uni-bochum.de
Miranda WeiUniversity of WashingtonVerified email at cs.washington.edu
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Dorothea KolossaTechnische Universität BerlinVerified email at tu-berlin.de
Leona LassakRuhr Universität BochumVerified email at rub.de
Theodor SchnitzlerResearch Center Trustworthy Data Science and Security and TU DortmundVerified email at tu-dortmund.de
David CashUniversity of ChicagoVerified email at cs.uchicago.edu
Florian Marius FarkePhD Candidate @ Ruhr University BochumVerified email at rub.de
David G. BalashUniversity of RichmondVerified email at richmond.edu