Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Nobuko YoshidaDepartment of Computing, Imperial College LondonVerified email at doc.ic.ac.uk
Fabrizio MontesiProfessor of Computer Science, University of Southern DenmarkVerified email at imada.sdu.dk
Mogens NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Gianluigi ZavattaroProfessor in Computer Science, University of BolognaVerified email at cs.unibo.it
Ivan LaneseUniversity of BolognaVerified email at unibo.it
Carsten SchürmannComputer Science, IT University of CopenhagenVerified email at itu.dk
Vladimiro SassoneUniversity of SouthamptonVerified email at ecs.soton.ac.uk
Thomas Troels HildebrandtProfessor, Computer Science Departement University of CopenhagenVerified email at di.ku.dk
Paddy NixonUniversity of CanberraVerified email at canberra.edu.au
Mario BravettiUniversity of BolognaVerified email at cs.unibo.it
Hugo Torres VieiraEvidence SrlVerified email at evidence.eu.com
Sergio MaffeisSenior Lecturer (Associate Professor) in Computer Security, Imperial College LondonVerified email at doc.ic.ac.uk
Emilio TuostoGran Sasso Science InstituteVerified email at gssi.it
Andy TwiggOxford UniversityVerified email at cs.ox.ac.uk
Giovanna Di Marzo SerugendoProfessor of Computer Science, University of GenevaVerified email at unige.ch
PD Dr Jean-Marc SeigneurUniversity of GenevaVerified email at unige.ch
Vinny CahillProfessor of Computer Science, Trinity College DublinVerified email at tcd.ie
Hugo Andrés LópezAssociate Professor, Technical University of DenmarkVerified email at dtu.dk
Joshua GuttmanResearch Professor, Computer Science, Worcester Polytechnic InstituteVerified email at wpi.edu
Andrzej W±sowskiProfessor, IT University of Copenhagen, DenmarkVerified email at itu.dk
Follow