Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Blase UrAssociate Professor, University of ChicagoEmail verificata su uchicago.edu
- Roshni PadhiStanford UniversityEmail verificata su stanford.edu
- Earlence FernandesAssistant Professor, UC San DiegoEmail verificata su ucsd.edu
- Lefan ZhangPhD, The University of ChicagoEmail verificata su uchicago.edu
- Jesse J. MartinezPhD Student, Paul G. Allen School of Computer Science and Engineering, University of WashingtonEmail verificata su cs.washington.edu
- Maximilian GollaCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Markus DürmuthProfessor for IT Security, Leibniz University HannoverEmail verificata su itsec.uni-hannover.de
- Michael LittmanBrown UniversityEmail verificata su brown.edu
- Shan LuProfessor of Computer Science, University of ChicagoEmail verificata su uchicago.edu
- Valerie ZhaoUniversity of ChicagoEmail verificata su uchicago.edu
- Abhimanyu DeoraEmail verificata su deora.dev
- Will BrackenburyUniversity of ChicagoEmail verificata su uchicago.edu
- Josiah HesterAssociate Professor, Interactive Computing and Computer Science, Georgia TechEmail verificata su gatech.edu
- Nathan ReitingerPh.D. Candidate, University of MarylandEmail verificata su umd.edu
- Mounib KhanaferAssociate Professor of Electrical and Computer Engineering, American University of KuwaitEmail verificata su auk.edu.kw
- Denise AnthonyProfessor, Health Mgmt & Policy | Sociology, University of MichiganEmail verificata su umich.edu
- Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Susan LandauTufts UniversityEmail verificata su privacyink.org
- David KotzDartmouth CollegeEmail verificata su dartmouth.edu
- Timothy J. PiersonDartmouth CollegeEmail verificata su cs.dartmouth.edu