Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Flavio D. GarciaProfessor of Computer Security, University of BirminghamEmail verificata su bham.ac.uk
- Alessandro CimattiFondazione Bruno KesslerEmail verificata su fbk.eu
- Marco BozzanoFondazione Bruno KesslerEmail verificata su fbk.eu
- Roberto BruttomessoExpert Researcher and Software EngineerEmail verificata su atrenta.com
- Roberto SebastianiFull Professor in Computer Science, DISI, University of Trento, ItalyEmail verificata su unitn.it
- Tommi JunttilaAalto UniversityEmail verificata su aalto.fi
- Roel VerdultFactorIT BVEmail verificata su factorit.nl
- Ronny Wichers SchreurProgrammer, Radboud University NijmegenEmail verificata su cs.ru.nl
- Miguel E. AndresGoogle Inc, Ecole Polytechnique, Radboud UniversityEmail verificata su lix.polytechnique.fr
- Stephan SchulzProfessor of Computer Science, DHBW StuttgartEmail verificata su eprover.org
- Gerhard de Koning GansFactorIT BVEmail verificata su factorit.nl
- Catuscia PalamidessiInriaEmail verificata su lix.polytechnique.fr
- Silvio RaniseFBKEmail verificata su fbk.eu
- Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenEmail verificata su cs.ru.nl
- Ana SokolovaAssociate Professor at University of SalzburgEmail verificata su cs.uni-salzburg.at
- Wolter PietersProfessor of Work, Organisations and Digital Technology, Radboud University NijmegenEmail verificata su ru.nl
- Ichiro HasuoProfessor of Computer Science, National Institute of InformaticsEmail verificata su acm.org
- Erik PollRadboud University NijmegenEmail verificata su cs.ru.nl
- Pedro R. D'ArgenioFaMAF, Universidad Nacional de Córdoba - CONICETEmail verificata su famaf.unc.edu.ar
- Geoffrey SmithSchool of Computing and Information Sciences, Florida International UniversityEmail verificata su cis.fiu.edu