Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Paolo MoriIstituto di Informatica e Telematica - Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
Artsiom YautsiukhinIIT-CNRVerified email at iit.cnr.it
Gabriele CostaIMT LuccaVerified email at imtlucca.it
Nicola DragoniProfessor in Secure Pervasive Computing, PhDVerified email at dtu.dk
Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
Ilaria MatteucciIIT-CNRVerified email at iit.cnr.it
Patrizio DazziDepartment of Computer Science, University of PisaVerified email at unipi.it
Andrea SaracinoIstituto di Informatica e Telematica, Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
Emanuele CarliniISTI-CNRVerified email at isti.cnr.it
Gaetano F. AnastasiMIUR, ItalyVerified email at istruzione.it
Piero CastoldiScuola Superiore Sant'AnnaVerified email at santannapisa.it