Get my own profile
Public access
View all7 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Lawrence PaulsonUniversity of CambridgeVerified email at cam.ac.uk
Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
Gianpiero CostantinoIIT-CNRVerified email at iit.cnr.it
Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
Stefano BistarelliFull professor of Computer Science at University of PerugiaVerified email at unipg.it
Rosario GiustolisiIT University of CopenhagenVerified email at itu.dk
Pietro BiondiPh.D Student, University of CataniaVerified email at phd.unict.it
Elvinia RiccobeneProfessore, Università di Milano, ItalyVerified email at unimi.it
Ilaria MatteucciIIT-CNRVerified email at iit.cnr.it
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Luca CompagnaSAP Security ResearchVerified email at sap.com
Fabio MartinelliConsiglio Nazionale delle RicercheVerified email at iit.cnr.it
Denis ButinTU Darmstadt, Inria, Dublin City UniversityVerified email at cdc.informatik.tu-darmstadt.de
Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
Paul CurzonProfessor in Computer Science, Queen Mary University of LondonVerified email at eecs.qmul.ac.uk
Simon N FoleyVerified email at simonfoley.org
Ronaldo MenezesProfessor of Data and Network Science, University of ExeterVerified email at exeter.ac.uk
Dr.Saad AlmutairiUniversity of TabukVerified email at ut.edu.sa
P. Lió, Pietro Lio, P. Lio, Pietro Liò, Pie...University of CambridgeVerified email at cam.ac.uk
Domenico CantoneProfessor of Computer Science, University of CataniaVerified email at dmi.unict.it