Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Marco BaldiAssociate Professor in Telecommunications, Università Politecnica delle MarcheVerified email at univpm.it
Franco ChiaraluceUniversità Politecnica delle MarcheVerified email at univpm.it
Edoardo PersichettiAssociate Professor, Florida Atlantic UniversityVerified email at fau.edu
Alessandro BarenghiPolitecnico di MilanoVerified email at polimi.it
Gerardo PelosiPolitecnico di MilanoVerified email at polimi.it
Massimo BattaglioniTenure-Track Researcher, Università Politecnica delle MarcheVerified email at staff.univpm.it
Violetta WegerTechnical University of MunichVerified email at tum.de
Karan KhathuriaInfosec GlobalVerified email at infosecglobal.com
Anna-Lena Horlemann-TrautmannAssociate Professor at University of St.Gallen, SwitzerlandVerified email at unisg.ch
Antonia Wachter-ZehProfessor at Technical University of Munich (TUM)Verified email at tum.de
Giulia RafaianiResearch Fellow, Università Politecnica delle MarcheVerified email at staff.univpm.it
Gustavo BanegasResearcher at Inria Saclay & LIX, École PolytechniqueVerified email at inria.fr
Jean-Christophe DeneuvilleAssociate Professor, ENAC, Toulouse, FranceVerified email at enac.fr
Shay GueronProfessor, University of Haifa and Distinguished Engineer, MetaVerified email at math.haifa.ac.il
Joachim RosenthalProfessor of Mathematics, University of ZurichVerified email at math.uzh.ch
Davide Schipaniuniversity of zurichVerified email at math.uzh.ch
Tran NgoFlorida Atlantic UniversityVerified email at fau.edu
Daniel AponUniversity of MarylandVerified email at cs.umd.edu
Simona SamardjiskaDigital Security Group, Radboud University, The NetherlandsVerified email at cs.ru.nl
Giacomo BorinPre Doc at IBM Research ZurichVerified email at ibm.com