Get my own profile
Public access
View all26 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Gerardo PelosiPolitecnico di MilanoVerified email at polimi.itGiovanni AgostaPolitecnico di Milano, ItalyVerified email at elet.polimi.it
Israel KorenProfessor of Computer Engineering, University of MassachusettsVerified email at ecs.umass.edu
Paolo SantiniUniversità Politecnica delle MarcheVerified email at staff.univpm.it
Marco BaldiAssociate Professor in Telecommunications, Università Politecnica delle MarcheVerified email at univpm.it
Franco ChiaraluceUniversità Politecnica delle MarcheVerified email at univpm.it
Stefano ZaneroPolitecnico di MilanoVerified email at polimi.it
Ruggero SusellaSTMicroelectronicsVerified email at st.com
Nicholas MainardiPhD Candidate, Politecnico di MilanoVerified email at polimi.itFederico MaggiSenior Security EngineerVerified email at polimi.it
Andrea ContinellaAssociate Professor at University of TwenteVerified email at utwente.nl
Francesco RegazzoniUniversity of Amsterdam and Università della Svizzera italianaVerified email at alari.chChristof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Matteo Pradellaassociate professor, Politecnico di MilanoVerified email at polimi.it
Timo KasperKasper & Oswald GmbHVerified email at ruhr-uni-bochum.de
Massimo MaggiVerified email at mail.polimi.it
Federico TerraneoPolitecnico di MilanoVerified email at polimi.it