Get my own profile
Public access
View all10 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Lawrence PaulsonUniversity of CambridgeVerified email at cam.ac.uk
Gianpiero CostantinoIIT-CNRVerified email at iit.cnr.it
Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
Rosario GiustolisiIT University of CopenhagenVerified email at itu.dk
Pietro BiondiPh.D, University of CataniaVerified email at phd.unict.it
Stefano BistarelliFull professor of Computer Science at University of PerugiaVerified email at unipg.it
Ilaria MatteucciIIT-CNRVerified email at iit.cnr.it
Elvinia RiccobeneProfessore, Università di Milano, ItalyVerified email at unimi.it
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
Domenico CantoneProfessor of Computer Science, University of CataniaVerified email at dmi.unict.it
Marianna Nicolosi AsmundoAssistant Professor of Computer Science, Catania UniversityVerified email at aixia.it
Luca CompagnaSAP Security ResearchVerified email at sap.com
Diego SempreboniKing's College LondonVerified email at kcl.ac.uk
Fabio MartinelliConsiglio Nazionale delle RicercheVerified email at iit.cnr.it
Denis ButinTU Darmstadt, Inria, Dublin City UniversityVerified email at cdc.informatik.tu-darmstadt.de
Paul CurzonProfessor in Computer Science, Queen Mary University of LondonVerified email at eecs.qmul.ac.uk
Karen RenaudDepartment of Computer and Information Sciences, University of StrathclydeVerified email at strath.ac.uk
Simon N FoleyVerified email at simonfoley.org