Crea il mio profilo
Accesso pubblico
Visualizza tutto12 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Markus DürmuthProfessor for IT Security, Leibniz University HannoverEmail verificata su itsec.uni-hannover.de
- Blase UrAssociate Professor, University of ChicagoEmail verificata su uchicago.edu
- Philipp MarkertFormer researcher @ Ruhr University BochumEmail verificata su rub.de
- Adam J AvivThe George Washington UniversityEmail verificata su email.gwu.edu
- Daniel V BaileyRuhr University BochumEmail verificata su sth.rub.de
- Miranda WeiUniversity of WashingtonEmail verificata su cs.washington.edu
- Earlence FernandesAssistant Professor, UC San DiegoEmail verificata su ucsd.edu
- Roshni PadhiStanford UniversityEmail verificata su stanford.edu
- Weijia HeDartmouth CollegeEmail verificata su dartmouth.edu
- Lea SchönherrCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Thorsten EisenhoferTechnische Universität BerlinEmail verificata su tu-berlin.de
- Jan WieleRuhr-Universität BochumEmail verificata su ruhr-uni-bochum.de
- Elissa M. RedmilesClare Luce Boothe Assistant Professor, Georgetown UniversityEmail verificata su georgetown.edu
- Florian Marius FarkePhD Candidate @ Ruhr University BochumEmail verificata su rub.de
- David G. BalashUniversity of RichmondEmail verificata su richmond.edu
- Thorsten HolzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Dorothea KolossaTechnische Universität BerlinEmail verificata su tu-berlin.de
- Theodor SchnitzlerResearch Center Trustworthy Data Science and Security and TU DortmundEmail verificata su tu-dortmund.de
- Leona LassakRuhr Universität BochumEmail verificata su rub.de
- David CashUniversity of ChicagoEmail verificata su cs.uchicago.edu