Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
- Blase UrAssociate Professor, University of ChicagoVerified email at uchicago.edu
- Philipp MarkertFormer researcher @ Ruhr University BochumVerified email at rub.de
- Adam J AvivThe George Washington UniversityVerified email at email.gwu.edu
- Daniel V BaileyRuhr University BochumVerified email at sth.rub.de
- Miranda WeiUniversity of WashingtonVerified email at cs.washington.edu
- Leona LassakRuhr Universität BochumVerified email at rub.de
- Lea SchönherrCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Thorsten EisenhoferTechnische Universität BerlinVerified email at tu-berlin.de
- Jan WieleRuhr-Universität BochumVerified email at ruhr-uni-bochum.de
- Elissa M. RedmilesClare Luce Boothe Assistant Professor, Georgetown UniversityVerified email at georgetown.edu
- Earlence FernandesAssistant Professor, UC San DiegoVerified email at ucsd.edu
- Roshni PadhiStanford UniversityVerified email at stanford.edu
- Weijia HeUniversity of SouthamptonVerified email at soton.ac.uk
- Florian Marius FarkePhD Candidate @ Ruhr University BochumVerified email at rub.de
- David G. BalashUniversity of RichmondVerified email at richmond.edu
- Theodor SchnitzlerAssistant Professor at Maastricht UniversityVerified email at maastrichtuniversity.nl
- Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Dorothea KolossaTechnische Universität BerlinVerified email at tu-berlin.de
- David CashUniversity of ChicagoVerified email at cs.uchicago.edu