Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Michele BezziSAP Security ResearchVerified email at sap.com
- Yves RoudierProfessor, UCA - I3S - CNRS - Université Côte d'AzurVerified email at i3s.unice.fr
- Gomez LaurentSAP Security ResearchVerified email at sap.com
- Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
- Sabrina De Capitani di VimercatiComputer Science Department, Universita' degli Studi di Milano, ItalyVerified email at unimi.it
- Eros PedriniNTT DataVerified email at nttdata.com
- Gregory NevenChainlink LabsVerified email at smartcontract.com
- Stefano ParaboschiProfessor of Computer Science and Engineering, Università degli Studi di Bergamo, ItalyVerified email at unibg.it
- Claudio ArdagnaRicercatore, Università degli Studi di MilanoVerified email at unimi.it
- Jan CamenischDFINITYVerified email at dfinity.org
- Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
- Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
- Matteo CasalinoAmadeusVerified email at amadeus.com
- Daniele SgandurraVerified email at danielesgandurra.com