Get my own profile
Public access
View all22 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Gerardo PelosiPolitecnico di MilanoVerified email at polimi.it
Giovanni AgostaPolitecnico di Milano, ItalyVerified email at elet.polimi.it
Israel KorenProfessor of Computer Engineering, University of MassachusettsVerified email at ecs.umass.edu
Paolo SantiniUniversità Politecnica delle MarcheVerified email at staff.univpm.it
Franco ChiaraluceUniversità Politecnica delle MarcheVerified email at univpm.it
Marco BaldiAssociate Professor in Telecommunications, Università Politecnica delle MarcheVerified email at univpm.it
Francesco RegazzoniUniversity of Amsterdam and Università della Svizzera italianaVerified email at alari.ch
Giulio De PasqualeKing's College LondonVerified email at kcl.ac.uk
Stefano ZaneroPolitecnico di MilanoVerified email at polimi.it
Nicholas MainardiPhD Candidate, Politecnico di MilanoVerified email at polimi.it
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Federico MaggiSenior ResearcherVerified email at polimi.it
Andrea ContinellaAssistant Professor at University of TwenteVerified email at utwente.nl
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Matteo Pradellaassociate professor, Politecnico di MilanoVerified email at polimi.it
Timo KasperKasper & Oswald GmbHVerified email at ruhr-uni-bochum.de
Ruggero SusellaSTMicroelectronicsVerified email at st.com
Massimo MaggiVerified email at mail.polimi.it
Federico TerraneoPolitecnico di MilanoVerified email at polimi.it