Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Michele BezziSAP Security ResearchVerified email at sap.com
Yves RoudierProfessor, UCA - I3S - CNRS - Université Côte d'AzurVerified email at i3s.unice.fr
Gomez LaurentSAP Security ResearchVerified email at sap.com
Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
Sabrina De Capitani di VimercatiComputer Science Department, Universita' degli Studi di Milano, ItalyVerified email at unimi.it
Eros PedriniNTT DataVerified email at nttdata.com
Gregory NevenChainlink LabsVerified email at smartcontract.com
Stefano ParaboschiProfessor of Computer Science and Engineering, Università degli Studi di Bergamo, ItalyVerified email at unibg.it
Claudio ArdagnaRicercatore, Università degli Studi di MilanoVerified email at unimi.it
Jan CamenischDFINITYVerified email at dfinity.org
Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
Matteo CasalinoAmadeusVerified email at amadeus.com
Daniele SgandurraVerified email at danielesgandurra.com