Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Michael RusinowitchINRIAEmail verificata su loria.fr
- Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityEmail verificata su imm.dtu.dk
- Alessandro ArmandoUniversity of GenovaEmail verificata su unige.it
- Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeEmail verificata su kcl.ac.uk
- David BasinProfessor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Olga KouchnarenkoFEMTO-ST and UFC/UBFCEmail verificata su univ-fcomte.fr
- Pierre-Cyrille HeamUniversité de Franche-Comté, Computer ScienceEmail verificata su femto-st.fr
- Giancarlo PellegrinoCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Serena Elisa PontaSAP Security ResearchEmail verificata su sap.com
- Marco RocchettoV-ResearchEmail verificata su v-research.it
- Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyEmail verificata su fbk.eu
- Marius MineaAssociate Professor, Politehnica University of TimisoaraEmail verificata su cs.upt.ro
- Alberto Calvi, PhDUniversity of VeronaEmail verificata su univr.it
- Joaquin Garcia-AlfaroSAMOVAR, Telecom SudParis, Institut Polytechnique de ParisEmail verificata su ieee.org
- Wiem TounsiPhD from Telecom Bretagne - Institut Mines-Telecom / Post-Doctoral Research Fellow LIP6Email verificata su telecom-bretagne.eu
- Frédéric CuppensPolytechnique MontréalEmail verificata su polymtl.ca