Get my own profile
Public access
View all19 articles
1 article
available
not available
Based on funding mandates
Co-authors
Michal FeldmanProfessor of Computer Science, Tel Aviv UniversityVerified email at post.tau.ac.il
Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
Nicolas ChristinAssociate Professor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Ion StoicaProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Benjamin JohnsonUniversity of California, BerkeleyVerified email at ischool.berkeley.edu
Marvin SirbuCarnegie Mellon UniversityVerified email at cmu.edu
Nick MerrillCenter for Long-Term Cybersecurity, UC BerkeleyVerified email at berkeley.edu
Kevin LaiGraduate School of Technological and Vocational Education, National Yunlin University of Science andVerified email at gemail.yuntech.edu.tw
Thomas MaillartUniversity of GenevaVerified email at unige.ch
Ramayya KrishnanCarnegie Mellon UniversityVerified email at cmu.edu
Kartik HosanagarWharton School, University of PennsylvaniaVerified email at wharton.upenn.edu
Max T. CurranUniversity of California, Berkeley School of InformationVerified email at ischool.berkeley.edu
Hui ZhangCarnegie Mellon University, ConvivaVerified email at andrew.cmu.edu
Christos H PAPADIMITRIOUColumbia UniversityVerified email at columbia.edu
Richmond Y. WongUniversity of California BerkeleyVerified email at berkeley.edu
Scott ShenkerProfessor of Computer Science, UC BerkeleyVerified email at icsi.berkeley.edu
Deirdre K. MulliganUC BerkeleyVerified email at berkeley.edu
Michael D. SmithJ. Erik Jonsson Professor of Information Technology and Marketing, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Mikhail AtallahDistinguished Professor of Computer ScienceVerified email at cs.purdue.edu
Elaine SedenbergHarvard Berkman Klein CenterVerified email at ischool.berkeley.edu