Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gilles Van AsscheSTMicroelectronicsVerified email at noekeon.org
Ruggero SusellaSTMicroelectronicsVerified email at st.com
Alireza MehrdadSecurity Engineer, UL SolutionsVerified email at ul.com
Filippo MelzaniSecurity PatternVerified email at securitypattern.com
Diego CarreraSTMicroelectronicsVerified email at st.com
Pasqualina FragnetoSTMicroelectronicsVerified email at st.com
Beatrice RossiSTMicroelectronicsVerified email at st.com
Alessandro BarenghiPolitecnico di MilanoVerified email at polimi.it
Gerardo PelosiPolitecnico di MilanoVerified email at polimi.it
Claudio FerrettiAssociate Professor of Computer Science, Milano-Bicocca UniversityVerified email at disco.unimib.it
Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
Lorenzo GrassiPostDoc at Ruhr University Bochum - Casa (Germany)Verified email at ruhr-uni-bochum.de
Daniël KuijstersRadboud UniversityVerified email at ru.nl
Luca Frittolilastminute.comVerified email at lastminute.com
Matteo BocchiSr. Advanced Research Engineer on Cryptography, STMicroelectronicsVerified email at st.com
Luca MagriPolitecnico di MilanoVerified email at polimi.it
Parisa Amiri EliasiRadboud UniversityVerified email at nyu.edu
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Weissbart LéoPhD candidateVerified email at cs.ru.nl
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be