Crea il mio profilo
Accesso pubblico
Visualizza tutto19 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Michal FeldmanProfessor of Computer Science, Tel Aviv UniversityEmail verificata su post.tau.ac.il
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichEmail verificata su in.tum.de
- Nicolas ChristinProfessor, Carnegie Mellon UniversityEmail verificata su andrew.cmu.edu
- Ion StoicaProfessor of Computer Science, UC BerkeleyEmail verificata su cs.berkeley.edu
- Benjamin JohnsonUniversity of California, BerkeleyEmail verificata su ischool.berkeley.edu
- Marvin SirbuCarnegie Mellon UniversityEmail verificata su cmu.edu
- Nick MerrillCenter for Long-Term Cybersecurity, UC BerkeleyEmail verificata su berkeley.edu
- Kevin LaiGraduate School of Technological and Vocational Education, National Yunlin University of Science andEmail verificata su gemail.yuntech.edu.tw
- Thomas MaillartUniversity of GenevaEmail verificata su unige.ch
- Max T. CurranUniversity of California, Berkeley School of InformationEmail verificata su berkeley.edu
- Ramayya KrishnanCarnegie Mellon UniversityEmail verificata su cmu.edu
- Kartik HosanagarWharton School, University of PennsylvaniaEmail verificata su wharton.upenn.edu
- Richmond Y. WongGeorgia Institute of TechnologyEmail verificata su gatech.edu
- Hui ZhangCarnegie Mellon University, ConvivaEmail verificata su andrew.cmu.edu
- Christos H PAPADIMITRIOUColumbia UniversityEmail verificata su columbia.edu
- Deirdre K. MulliganUC BerkeleyEmail verificata su berkeley.edu
- Michael D. SmithJ. Erik Jonsson Professor of Information Technology and Marketing, Carnegie Mellon UniversityEmail verificata su andrew.cmu.edu
- Vidyanand ChoudharyUniversity of California, IrvineEmail verificata su uci.edu
- Elaine SedenbergHarvard Berkman Klein CenterEmail verificata su ischool.berkeley.edu
- Scott ShenkerProfessor of Computer Science, UC BerkeleyEmail verificata su icsi.berkeley.edu