Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Antonio MañaProfessor of Computer Science, ITIS Software, University of MalagaVerified email at uma.es
Javier LopezProfessor of Computer Science, University of MalagaVerified email at lcc.uma.es
Hristo KoshutanskiAtos Research & Innovation, SpainVerified email at atos.net
Carmen Fernandez GagoUniversity of Malaga (Spain)Verified email at lcc.uma.es
Carsten RudolphMonash University, Melbourne, AustraliaVerified email at monash.edu
Ana Checa-RosCEU Cardenal Herrera UniversityVerified email at uchceu.es
Luca CompagnaSAP Security ResearchVerified email at sap.com
Jamal ToutouhMassachusetts Institute of Technology (MIT)Verified email at mit.edu
George SpanoudakisSphynx Technology Solutions AGVerified email at sphynx.ch
Eamonn PowerCTO, Telenostic Ltd.Verified email at telenostic.com
Marcos ArjonaTechnical Research Assistant, University of MalagaVerified email at lcc.uma.es
Jose Fran. RuizAtosVerified email at atos.net
Sergio NesmachnowFull Professor, Universidad de la República, UruguayVerified email at fing.edu.uy
Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
Raian AliProfessor, HBKU, QatarVerified email at hbku.edu.qa
Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyVerified email at fbk.eu
Javier GonzálezMicrosoft Research CambridgeVerified email at microsoft.com