Crea il mio profilo
Accesso pubblico
Visualizza tutto27 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Aron LaszkaAssistant Professor, Pennsylvania State UniversityEmail verificata su psu.edu
- Benjamin JohnsonUniversity of California, BerkeleyEmail verificata su ischool.berkeley.edu
- Alessandro AcquistiCarnegie Mellon UniversityEmail verificata su andrew.cmu.edu
- John ChuangProfessor, UC Berkeley School of InformationEmail verificata su ischool.berkeley.edu
- Nicolas ChristinProfessor, Carnegie Mellon UniversityEmail verificata su andrew.cmu.edu
- Severin EngelmannDigital Life Initiative, Cornell Tech, Cornell UniversityEmail verificata su cornell.edu
- Mo ChenTechnical University of MunichEmail verificata su tum.de
- Nathan GoodGood ResearchEmail verificata su goodresearch.com
- Rainer BöhmeUniversität Innsbruck, AustriaEmail verificata su uibk.ac.at
- Sadegh FarhangPennsylvania State UniversityEmail verificata su psu.edu
- Mingyi ZhaoNotionEmail verificata su makenotion.com
- Deirdre K. MulliganUC BerkeleyEmail verificata su berkeley.edu
- Jake WeidmanGoogleEmail verificata su google.com
- Dr. Paul MunteanTechnical University of Munich, Chair of IT Security, PostDocEmail verificata su sec.in.tum.de
- Sarah SpiekermannVienna University of Economics and Business - Wirtschaftsuniversität Wien (WU)Email verificata su wu.ac.at
- Heng XuProfessor of Management, Warrington College of Business, University of FloridaEmail verificata su ufl.edu
- Na WangPh.D., AWSEmail verificata su amazon.com
- Yu PuPh.D. Student in Pennsylvania State UniversityEmail verificata su ist.psu.edu
- Felix FischerChair of Cyber Trust, Technical University of MunichEmail verificata su tum.de
- Chris Jay HoofnagleUniversity of California, Berkeley School of Law, School of InformationEmail verificata su berkeley.edu
Segui
Jens Grossklags
Chair for Cyber Trust, Technical University of Munich
Email verificata su in.tum.de - Home page