Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Alessandro ArmandoUniversity of GenovaEmail verificata su unige.it
Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyEmail verificata su fbk.eu
Serena Elisa PontaSAP Security ResearchEmail verificata su sap.com
Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityEmail verificata su imm.dtu.dk
Yannick ChevalierMaître de Conférences en informatique, IRIT, Université Toulouse 3Email verificata su irit.fr
Giancarlo PellegrinoCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
Michael RusinowitchINRIAEmail verificata su loria.fr
Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeEmail verificata su kcl.ac.uk
David BasinProfessor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyEmail verificata su ieee.org
Silvio RaniseFBKEmail verificata su fbk.eu
Olga KouchnarenkoFEMTO-ST and UFC/UBFCEmail verificata su univ-fcomte.fr
Pierre-Cyrille HeamUniversité de Franche-Comté, Computer ScienceEmail verificata su femto-st.fr
Daniel dos SantosForescoutEmail verificata su forescout.com
Avinash SudhodananPrivacy Engineer at MetaEmail verificata su meta.com
Nicola ZannoneEindhoven University of TechnologyEmail verificata su tue.nl
Llanos TobarraUNEDEmail verificata su scc.uned.es
Alessandro SorniottiIBM Research - ZurichEmail verificata su zurich.ibm.com
Giampaolo BellaUniversity of CataniaEmail verificata su dmi.unict.it
Marco RocchettoV-ResearchEmail verificata su v-research.it