Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Marco BaldiAssociate Professor in Telecommunications, Universitą Politecnica delle MarcheVerified email at univpm.it
Franco ChiaraluceUniversitą Politecnica delle MarcheVerified email at univpm.it
Edoardo PersichettiAssociate Professor, Florida Atlantic UniversityVerified email at fau.edu
Alessandro BarenghiPolitecnico di MilanoVerified email at polimi.it
Gerardo PelosiPolitecnico di MilanoVerified email at polimi.it
Massimo BattaglioniTenure-Track Researcher, Universitą Politecnica delle MarcheVerified email at staff.univpm.it
Violetta WegerTechnical University of MunichVerified email at tum.de
Karan KhathuriaInfosec GlobalVerified email at infosecglobal.com
Giulia RafaianiPhD Student, Universitą Politecnica delle MarcheVerified email at staff.univpm.it
Anna-Lena Horlemann-TrautmannAssociate Professor at University of St. Gallen, SwitzerlandVerified email at unisg.ch
Antonia Wachter-ZehProfessor at Technical University of Munich (TUM)Verified email at tum.de
Gustavo BanegasResearcher at Inria Saclay & LIX, École PolytechniqueVerified email at inria.fr
Jean-Christophe DeneuvilleAssociate Professor, ENAC, Toulouse, FranceVerified email at enac.fr
Shay GueronProfessor, University of Haifa and Distinguished Engineer, MetaVerified email at math.haifa.ac.il
Joachim RosenthalProfessor of Mathematics, University of ZurichVerified email at math.uzh.ch
Davide Schipaniuniversity of zurichVerified email at math.uzh.ch
Daniel AponUniversity of MarylandVerified email at cs.umd.edu
Tran NgoFlorida Atlantic UniversityVerified email at fau.edu
Simona SamardjiskaDigital Security Group, Radboud University, The NetherlandsVerified email at cs.ru.nl
Giacomo BorinPre Doc at IBM Research ZurichVerified email at ibm.com