Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Sassu, Roberto
add a person with the name Sassu, Roberto
 

Other publications of authors with the same name

Practical Assessment of Biba Integrity for TCG-Enabled Platforms., , and . TrustCom, page 495-504. IEEE Computer Society, (2014)Virtualized security at the network edge: a user-centric approach., , , , , , , , , and 6 other author(s). IEEE Communications Magazine, 53 (4): 176-186 (2015)The Trusted Platform Agent., , , , , and . IEEE Software, 28 (2): 35-41 (2011)On scalability of remote attestation., , , , and . STC@CCS, page 25-30. ACM, (2011)Exploiting the Network for Securing Personal Devices., , , , and . CSP Forum, volume 470 of Communications in Computer and Information Science, page 16-27. Springer, (2014)