Anna Ferrara
974  results:
Search for persons X
?
1

Polyacrylate/polyacrylate-PEG biomaterials obtained by high..:

Corti, Marco ; Calleri, Enrica ; Perteghella, Sara...
Materials Science and Engineering: C.  105 (2019)  - p. 110060 , 2019
 
?
3

Comparative Analysis of Porcine and Human Thoracic Aortic S..:

de Beaufort, Hector W.L. ; Ferrara, Anna ; Conti, Michele...
European Journal of Vascular and Endovascular Surgery.  55 (2018)  4 - p. 560-566 , 2018
 
?
4

Corrigendum to: 'Impact of thoracic endovascular aortic rep..:

Nauta, Foeke J H ; de Beaufort, Hector W L ; Conti, Michele...
European Journal of Cardio-Thoracic Surgery.  53 (2018)  6 - p. 1299-1299 , 2018
 
?
5

Effects of clinico-pathological risk factors on in-vitro me..:

Ferrara, Anna ; Totaro, Pasquale ; Morganti, Simone.
Journal of the Mechanical Behavior of Biomedical Materials.  77 (2018)  - p. 1-11 , 2018
 
?
8

Human dilated ascending aorta: Mechanical characterization ..:

Ferrara, Anna ; Morganti, Simone ; Totaro, Pasquale..
Journal of the Mechanical Behavior of Biomedical Materials.  53 (2016)  - p. 257-271 , 2016
 
?
9

An experimental investigation of the impact of thoracic end..:

Nauta, Foeke J.H. ; Conti, Michele ; Marconi, Stefania...
European Journal of Cardio-Thoracic Surgery.  50 (2016)  5 - p. 955-961 , 2016
 
?
10

UN IMPROBABILE EROE PER LA RIVOLUZIONE SCIENTIFICA:

Findlen, Paula ; Ferrara, Anna
Quaderni storici.  32 (1997)  96 (3) - p. 839-852 , 1997
 
?
12

Identity-Based Matchmaking Encryption from Standard Lattice..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
13

Provably-Secure One-Message Unilateral Entity Authenticatio..:

De Santis, Alfredo ; Ferrara, Anna Lisa ; Flores, Manuela.
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  4 - p. 1665-1679 , 2024
 
?
14

Data and Applications Security and Privacy XXXVIII: 38th An.. 

Lecture Notes in Computer Science, 14901
Ferrara, Anna Lisa ; Krishnan, Ram - 1st ed. 2024 . , 2024
 
?
15

Hierarchical Key Assignment Schemes with Key Rotation:

, In: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies,
 
1-15