Gerardo Pelosi
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [j20]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Enforcing authorizations while protecting access confidentiality. Journal of Computer Security 26(2): 143-175 (2018) - [j19]Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi:
Systematic parsing of X.509: Eradicating security issues with a parse tree. Journal of Computer Security 26(6): 817-849 (2018) - [j18]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Reactive side-channel countermeasures: Applicability and quantitative security evaluation. Microprocessors and Microsystems - Embedded Hardware Design 62: 50-60 (2018) - [j17]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Three-Server Swapping for Access Confidentiality. IEEE Trans. Cloud Computing 6(2): 492-505 (2018) - [j16]Davide Zoni, Alessandro Barenghi, Gerardo Pelosi, William Fornaciari:
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture. ACM Trans. Design Autom. Electr. Syst. 23(5): 57:1-57:30 (2018) - [c61]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Access Privacy in the Cloud. From Database to Cyber Security 2018: 186-205 - [c60]Alessandro Barenghi, Gerardo Pelosi:
Side-channel security of superscalar CPUs: evaluating the impact of micro-architectural features. DAC 2018: 120:1-120:6 - [c59]Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi:
Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes. ICICS 2018: 177-191 - [c58]Alessandro Barenghi, Michele Madaschi, Nicholas Mainardi, Gerardo Pelosi:
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives. HPCS 2018: 634-641 - [c57]Alessandro Barenghi, Luca Breveglieri, Niccolò Izzo, Gerardo Pelosi:
Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks. IVSW 2018: 19-24 - [c56]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes. PQCrypto 2018: 3-24 - [e5]John Goodacre, Mikel Luján, Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi:
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018. ACM 2018, ISBN 978-1-4503-6374-7 [contents] - [i6]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini:
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes. CoRR abs/1801.08867 (2018) - [i5]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Joachim Rosenthal, Paolo Santini, Davide Schipani:
Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes. CoRR abs/1807.06127 (2018) - [i4]Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi:
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree. CoRR abs/1812.04959 (2018) - 2017
- [j15]Ariel Oleksiak, Michal Kierzynka, Wojciech Piatek, Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Mariano Cecowski, Robert Plestenjak, Justin Cinkelj, Mario Porrmann, Jens Hagemeyer, René Griessl, Jan Lachmair, Meysam Peykanu, Lennart Tigges, Micha vor dem Berge, Wolfgang Christmann, Stefan Krupop, Alexandre Carbon, Loïc Cudennec, Thierry Goubier, Jean-Marc Philippe, Sven Rosinger, Daniel Schlitt, Christian Pieper, Chris Adeniyi-Jones, Javier Setoain, Luca Ceva, Udo Janssen:
M2DC - Modular Microserver DataCentre with heterogeneous hardware. Microprocessors and Microsystems - Embedded Hardware Design 52: 117-130 (2017) - [c55]Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi:
A Security Audit of the OpenPGP Format. ISPAN-FCST-ISCC 2017: 336-343 - [c54]Alessandro Barenghi, Gerardo Pelosi:
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers. ITASEC 2017: 8-18 - [e4]Mats Brorsson, Zhonghai Lu, Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24, 2017. ACM 2017, ISBN 978-1-4503-4869-0 [contents] - 2016
- [j14]Alessandro Barenghi, Michele Beretta, Alessandro Di Federico, Gerardo Pelosi:
A privacy-preserving encrypted OSN with stateless server interaction: The Snake design. Computers & Security 63: 67-84 (2016) - [j13]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, Stefano Sanfilippo, Ruggero Susella:
A Fault-Based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure. JETC 13(1): 8:1-8:26 (2016) - [c53]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
Automated instantiation of side-channel attacks countermeasures for software cipher implementations. Conf. Computing Frontiers 2016: 455-460 - [c52]Sabrina De Capitani di Vimercati, Sara Foresti, Riccardo Moretti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud. CloudCom 2016: 391-398 - [c51]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Access Control for the Shuffle Index. DBSec 2016: 130-147 - [c50]Mariano Cecowski, Giovanni Agosta, Ariel Oleksiak, Michal Kierzynka, Micha vor dem Berge, Wolfgang Christmann, Stefan Krupop, Mario Porrmann, Jens Hagemeyer, René Griessl, Meysam Peykanu, Lennart Tigges, Sven Rosinger, Daniel Schlitt, Christian Pieper, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Robert Plestenjak, Justin Cinkelj, Loïc Cudennec, Thierry Goubier, Jean-Marc Philippe, Udo Janssen, Chris Adeniyi-Jones:
The M2DC Project: Modular Microserver DataCentre. DSD 2016: 68-74 - [c49]Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Stefano Delucchi, Massimo Massa, Maurizio Mongelli, Enrico Ferrari, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Dajana Cassioli, Luigi Pomante:
V2I Cooperation for Traffic Management with SafeCop. DSD 2016: 621-627 - [c48]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Encasing block ciphers to foil key recovery attempts via side channel. ICCAD 2016: 96 - [c47]Alessandro Barenghi, Gerardo Pelosi:
A Note on Fault Attacks Against Deterministic Signature Schemes. IWSEC 2016: 182-192 - [c46]Michal Kierzynka, Ariel Oleksiak, Giovanni Agosta, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Micha vor dem Berge, Wolfgang Christmann, Stefan Krupop, Mariano Cecowski, Robert Plestenjak, Justin Cinkelj, Mario Porrmann, Jens Hagemeyer, René Griessl, Meysam Peykanu, Lennart Tigges, Loïc Cudennec, Thierry Goubier, Jean-Marc Philippe, Sven Rosinger, Daniel Schlitt, Christian Pieper, Chris Adeniyi-Jones, Udo Janssen, Luca Ceva:
Data centres for IoT applications: The M2DC approach (Invited paper). SAMOS 2016: 293-299 - [c45]Alessio Agneessens, Francesco Buemi, Stefano Delucchi, Massimo Massa, Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Enrico Ferrari, Dajana Cassioli, Luigi Pomante, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Maurizio Mongelli:
Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project. SAMOS 2016: 320-327 - [e3]Martin Palkovic, Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi:
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016. ACM 2016, ISBN 978-1-4503-4065-6 [contents] - 2015
- [j12]Giovanni Agosta, Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi:
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives. Concurrency and Computation: Practice and Experience 27(14): 3633-3660 (2015) - [j11]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software. Inf. Process. Lett. 115(2): 292-297 (2015) - [j10]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks. IEEE Trans. on CAD of Integrated Circuits and Systems 34(8): 1320-1333 (2015) - [j9]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Shuffle Index: Efficient and Private Access to Outsourced Data. TOS 11(4): 19:1-19:55 (2015) - [c44]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Information leakage chaff: feeding red herrings to side channel attackers. DAC 2015: 33:1-33:6 - [c43]Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi, Stefano Sanfilippo:
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? ESORICS (1) 2015: 429-446 - [c42]Giovanni Agosta, Alessio Antonini, Alessandro Barenghi, Dario Galeri, Gerardo Pelosi:
Cyber-security analysis and evaluation for smart home management solutions. ICCST 2015: 1-6 - [e2]Andy D. Pimentel, Stephan Wong, Gerardo Pelosi, Israel Koren, Giovanni Agosta, Alessandro Barenghi:
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015. ACM 2015, ISBN 978-1-4503-3187-6 [contents] - 2014
- [j8]Giovanni Agosta, Alessandro Barenghi, Massimo Maggi, Gerardo Pelosi:
Design space extension for secure implementation of block ciphers. IET Computers & Digital Techniques 8(6): 256-263 (2014) - [c41]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Protecting Access Confidentiality with Data Distribution and Swapping. BDCloud 2014: 167-174 - [c40]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software. DAC 2014: 210:1-210:6 - [c39]Alessandro Barenghi, Michele Beretta, Alessandro Di Federico, Gerardo Pelosi:
Snake: An End-to-End Encrypted Online Social Network. HPCC/CSS/ICESS 2014: 763-770 - [c38]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Towards Transparently Tackling Functionality and Performance Issues across Different OpenCL Platforms. CANDAR 2014: 130-136 - [c37]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
Securing software cryptographic primitives for embedded systems against side channel attacks. ICCST 2014: 1-6 - [c36]Alessio Antonini, Alessandro Barenghi, Gerardo Pelosi, Saman A. Zonouz:
Security challenges in building automation and SCADA. ICCST 2014: 1-6 - [c35]Iyad Al Khatib, Gerardo Pelosi, Giovanni Agosta, Heikki Terio:
Security Integration in Medical Device Design: Extension of an Automated Bio-Medical Engineering Design Methodology. ITNG 2014: 137-142 - [c34]Alessandro Barenghi, Gerardo Pelosi:
On the Security of Partially Masked Software Implementations. SECRYPT 2014: 492-499 - [c33]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis. SIN 2014: 137 - [e1]Jens Knoop, Valentina Salapura, Israel Koren, Gerardo Pelosi:
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014. ACM 2014, ISBN 978-1-4503-2484-7 [contents] - [i3]Alessandro Barenghi, Gerardo Pelosi, Francesco Regazzoni:
Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks. IACR Cryptology ePrint Archive 2014: 307 (2014) - 2013
- [j7]Alessandro Barenghi, Gerardo Pelosi, Federico Terraneo:
Secure and efficient design of software block cipher implementations on microcontrollers. IJGUC 4(2/3): 110-118 (2013) - [j6]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Supporting concurrency and multiple indexes in private access to outsourced data. Journal of Computer Security 21(3): 425-461 (2013) - [j5]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi:
A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA. Journal of Systems and Software 86(7): 1864-1878 (2013) - [c32]Giovanni Agosta, Alessandro Barenghi, Massimo Maggi, Gerardo Pelosi:
Compiler-based side channel vulnerability analysis and optimized countermeasures application. DAC 2013: 81:1-81:6 - [c31]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Distributed Shuffling for Preserving Access Confidentiality. ESORICS 2013: 628-645 - [c30]Alessandro Barenghi, Gerardo Pelosi, Fabio Pozzi:
Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception. ITNG 2013: 640-647 - [c29]Giovanni Agosta, Gerardo Pelosi, Ettore Speziale:
On Task Assignment in Data Intensive Scalable Computing. JSSPP 2013: 136-155 - [c28]Alessio Antonini, Alessandro Barenghi, Gerardo Pelosi:
Security Analysis of Building Automation Networks - Threat Model and Viable Mitigation Techniques. NordSec 2013: 199-214 - [c27]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs. NSS 2013: 692-698 - 2012
- [c26]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
Exploiting Bit-level Parallelism in GPGPUs: a Case Study on KeeLoq Exhaustive Search Attacks. ARCS Workshops 2012: 385-396 - [c25]Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
A code morphing methodology to automate power analysis countermeasures. DAC 2012: 77-82 - [c24]Giovanni Agosta, Alessandro Barenghi, Antonio Parata, Gerardo Pelosi:
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution. ITNG 2012: 189-194 - [p2]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Injection Technologies for Fault Attacks on Microprocessors. Fault Analysis in Cryptography 2012: 275-293 - 2011
- [c23]Alessandro Barenghi, Gerardo Pelosi:
Security and Privacy in Smart Grid Infrastructures. DEXA Workshops 2011: 102-108 - [c22]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Supporting Concurrency in Private Data Outsourcing. ESORICS 2011: 648-664 - [c21]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Efficient and Private Access to Outsourced Data. ICDCS 2011: 710-719 - [c20]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, Andrea Palomba:
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults. SIN 2011: 63-72 - [c19]Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia:
Information Leakage Discovery Techniques to Enhance Secure Chip Design. WISTP 2011: 128-143 - [p1]Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Selective Exchange of Confidential Data in the Outsourcing Scenario. Privacy and Identity Management for Life 2011: 181-198 - [r2]Gerardo Pelosi:
Secure Audit Logs. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1097-1099 - [r1]
- 2010
- [c18]Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Fault attack on AES with single-bit induced faults. IAS 2010: 167-172 - [c17]Alessandro Barenghi, Luca Breveglieri, Israel Koren, Gerardo Pelosi, Francesco Regazzoni:
Countermeasures against fault attacks on software implemented AES: effectiveness and cost. WESS 2010: 7 - [c16]Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Low Voltage Fault Attacks to AES. HOST 2010: 7-12 - [c15]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Encryption-Based Policy Enforcement for Cloud Storage. ICDCS Workshops 2010: 42-51 - [c14]Giovanni Agosta, Alessandro Barenghi, Fabrizio De Santis, Gerardo Pelosi:
Record Setting Software Implementation of DES Using CUDA. ITNG 2010: 748-755 - [c13]Gerardo Pelosi, Giuseppe Psaila:
SMaC: spatial map caching technique for mobile devices. SAC 2010: 1829-1830 - [c12]Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia:
Improving first order differential power attacks through digital signal processing. SIN 2010: 124-133 - [i2]Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Low Voltage Fault Attacks to AES and RSA on General Purpose Processors. IACR Cryptology ePrint Archive 2010: 130 (2010)
2000 – 2009
- 2009
- [j4]Giovanni Agosta, Francesco Bruschi, Gerardo Pelosi, Donatella Sciuto:
A Transform-Parametric Approach to Boolean Matching. IEEE Trans. on CAD of Integrated Circuits and Systems 28(6): 805-817 (2009) - [c11]Alessandro Barenghi, Guido Bertoni, Emanuele Parrinello, Gerardo Pelosi:
Low Voltage Fault Attacks on the RSA Cryptosystem. FDTC 2009: 23-31 - [c10]Andrea Di Biagio, Alessandro Barenghi, Giovanni Agosta, Gerardo Pelosi:
Design of a parallel AES for graphics hardware using the CUDA framework. IPDPS 2009: 1-8 - [c9]Giovanni Agosta, Alessandro Barenghi, Fabrizio De Santis, Andrea Di Biagio, Gerardo Pelosi:
Fast Disk Encryption through GPGPU Acceleration. PDCAT 2009: 102-109 - 2008
- [j3]Guido Marco Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi:
Parallel Hardware Architectures for the Cryptographic Tate Pairing. I. J. Network Security 7(1): 31-37 (2008) - [j2]Guido Bertoni, Luca Breveglieri, Liqun Chen, Pasqualina Fragneto, Keith A. Harrison, Gerardo Pelosi:
A pairing SW implementation for Smart-Cards. Journal of Systems and Software 81(7): 1240-1247 (2008) - [c8]Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Gerardo Pelosi:
A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp. ITNG 2008: 112-119 - [c7]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Preserving confidentiality of security policies in data outsourcing. WPES 2008: 75-84 - 2007
- [j1]Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi, Martino Sykora:
Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications. JCP 2(9): 50-59 (2007) - [c6]Giovanni Agosta, Francesco Bruschi, Gerardo Pelosi, Donatella Sciuto:
A Unified Approach to Canonical Form-based Boolean Matching. DAC 2007: 841-846 - [c5]
- [c4]Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi, Israel Koren:
Countermeasures against Branch Target Buffer Attacks. FDTC 2007: 75-79 - [c3]Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi, Martino Sykora:
Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications. ITNG 2007: 3-10 - 2006
- [c2]Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi, L. Sportiello:
Software implementation of Tate pairing over GF(2m). DATE Designers' Forum 2006: 7-11 - [c1]Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi:
Parallel Hardware Architectures for the Cryptographic Tate Pairing. ITNG 2006: 186-191 - [i1]Giovanni Agosta, Gerardo Pelosi:
Countermeasures for the Simple Branch Prediction Analysis. IACR Cryptology ePrint Archive 2006: 482 (2006)
Coauthor Index
[j19] [j18] [j16] [c60] [c59] [c58] [c57] [c56] [e5] [i6] [i5] [i4] [j15] [c55] [c54] [e4] [j14] [j13] [c53] [c49] [c48] [c47] [c45] [e3] [j12] [j11] [j10] [c44] [c43] [c42] [e2] [j8] [c40] [c39] [c38] [c37] [c36] [c34] [c33] [i3] [j7] [j5] [c32] [c30] [c28] [c27] [c26] [c25] [c24] [p2] [c23] [c20] [c19] [c18] [c17] [c16] [c14] [c12] [i2] [c11] [c10] [c9] [c8]
Guido Bertoni
aka: Guido Marco Bertoni
aka: Guido Marco Bertoni
last updated on 2019-02-14 22:49 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint