Get my own profile
Public access
View all39 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Norman SadehProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Michael WeberProfessor, Ulm UniversityVerified email at uni-ulm.de
Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Shomir WilsonAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
Bastian KöningsInstitute of Media Informatics, Ulm UniversityVerified email at alumni.uni-ulm.de
Yixin ZouTenure-Track Faculty Member, Max Planck Institute for Security and PrivacyVerified email at mpi-sp.org
Frank KarglProfessor of Computer Science, Ulm UniversityVerified email at uni-ulm.de
Joel R. ReidenbergStanley D. and Nikki Waxberg Chair in Law, Fordham UniversityVerified email at law.fordham.edu
Abraham MhaidliPhD Student, University of MichiganVerified email at umich.edu
Hana HabibCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Yuvraj AgarwalAssociate Professor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Martin DegelingStiftung Neue VerantwortungVerified email at ruhr-uni-bochum.de
Travis BreauxAssociate Professor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Idris AdjeridAssociate Professor, Virginia TechVerified email at vt.edu
Ashwini RaoEydle Inc.Verified email at eydle.com
Fei LiuEmory UniversityVerified email at emory.edu
Rebecca BalebakoGoogleVerified email at google.com
Mads Schaarup AndersenSenior Usable Security ExpertVerified email at alexandra.dk
Marcel WalchUlm UniversityVerified email at uni-ulm.de