Get my own profile
Public access
View all19 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Angelo De CaroIBM Research - ZurichVerified email at zurich.ibm.com
Giuseppe PersianoUniversita' di Salerno -- ItalyVerified email at unisa.it
Peter Browne RønneResearcherVerified email at nbi.dk
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Ivan ViscontiUniversity of Salerno, ITALYVerified email at unisa.it
Adam O'NeillUniversity of Massachusetts AmherstVerified email at cs.umass.edu
Alfredo RialUniversity of LuxembourgVerified email at uni.lu
Vincenzo BottaLa Sapienza UniversityVerified email at uniroma1.it
Gennaro AvitabileIMDEA Software InstituteVerified email at imdea.org
Carlo BlundoProfessor of Computer Science, Università di SalernoVerified email at unisa.it
Marjan ŠkrobotResearch Scientist at University of LuxembourgVerified email at uni.lu
Jose BecerraUniversity of LuxembourgVerified email at uni.lu
Abhishek JainAssociate Professor, Johns Hopkins UniversityVerified email at cs.jhu.edu
Omer PanethMITVerified email at mit.edu
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Rosario GiustolisiIT University of CopenhagenVerified email at itu.dk
Serge VaudenayProfessor at EPFLVerified email at epfl.ch
Martin VuagnouxResearcherVerified email at vuagnoux.com
Petra SalaUniversity of LuxembourgVerified email at uni.lu
Ziya Alper GençResearch Associate, University of LuxembourgVerified email at uni.lu