Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Nadia HeningerUniversity of California San DiegoVerified email at cs.ucsd.edu
- Luke ValentaCloudflareVerified email at cloudflare.com
- Joshua FriedMITVerified email at csail.mit.edu
- David AdrianIndependentVerified email at umich.edu
- Yuval ShavittTel Aviv UniversityVerified email at eng.tau.ac.il
- Nimrod AviramTel Aviv UniversityVerified email at mail.tau.ac.il
- Matthew GreenJohns Hopkins UniversityVerified email at cs.jhu.edu
- J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at umich.edu
- David A. HoffmanProfessor of Law, University of Pennsylvania Law SchoolVerified email at law.upenn.edu
- Sebastian SchinzelMünster University of Applied SciencesVerified email at fh-muenster.de
- Emilia KasperSoftware engineer, GoogleVerified email at google.com
- Stephen CheckowayAssociate Professor at Oberlin CollegeVerified email at oberlin.edu
- Hovav ShachamProfessor of Computer Science, The University of Texas at AustinVerified email at cs.utexas.edu
- Ralf-Philipp WeinmannComsecuris GmbHVerified email at comsecuris.com
- Juraj SomorovskyPaderborn UniversityVerified email at upb.de
- Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
- Christina GarmanPurdue UniversityVerified email at purdue.edu
- Jacob MaskiewiczGraduate Researcher, University of California San DiegoVerified email at cs.ucsd.edu
- David A. WishnickGeorgetown University Law CenterVerified email at georgetown.edu
- Madelyn R SanfilippoAssistant Professor, School of Information Sciences, University of Illinois at Urbana-ChampaignVerified email at illinois.edu