Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Elissa M. RedmilesClare Luce Boothe Assistant Professor, Georgetown UniversityVerified email at georgetown.edu
Florian SchaubUniversity of MichiganVerified email at umich.edu
Vaughn HamiltonMax Planck Institute for Software SystemsVerified email at mpi-sws.orgJ. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at umich.edu
Benjamin VanderSlootAssistant Professor, University of Detroit MercyVerified email at udmercy.edu
Matthew BernhardEnhanced VotingVerified email at enhancedvoting.com
Thomas RistenpartProfessor of Computer Science, Cornell TechVerified email at cornell.edu
Nicola DellCornell UniversityVerified email at cornell.edu
Kevin Alejandro RoundyAndromeda SecurityVerified email at andromedasecurity.com
Acar TamersoyPrincipal Applied Scientist at MicrosoftVerified email at gatech.edu
Yixin ZouTenure-Track Faculty, Max Planck Institute for Security and PrivacyVerified email at mpi-sp.org
Catherine BarwulorPhD Candidate, Clemson UniversityVerified email at clemson.edu
Ananta SonejiPhD Student, Arizona State UniversityVerified email at asu.edu
Roya EnsafiAssociate Professor, Computer Science & Engineering, University of MichiganVerified email at umich.edu
Niu (Janet) ChenCornell UniversityVerified email at cornell.eduEmily TsengPostdoctoral Researcher, Microsoft ResearchVerified email at uw.edu
Kentaro ToyamaUniversity of Michigan, School of InformationVerified email at umich.edu