DE SANTIS, Alfredo
 Distribuzione geografica
Continente #
NA - Nord America 9.523
EU - Europa 3.013
AS - Asia 2.233
SA - Sud America 345
AF - Africa 17
Continente sconosciuto - Info sul continente non disponibili 11
OC - Oceania 10
Totale 15.152
Nazione #
US - Stati Uniti d'America 9.436
IT - Italia 916
CN - Cina 785
UA - Ucraina 724
SG - Singapore 622
RU - Federazione Russa 321
DE - Germania 314
BR - Brasile 312
IE - Irlanda 229
VN - Vietnam 211
TR - Turchia 195
HK - Hong Kong 192
FI - Finlandia 164
SE - Svezia 144
KR - Corea 89
CA - Canada 74
GB - Regno Unito 50
IN - India 47
LV - Lettonia 22
JP - Giappone 19
PL - Polonia 19
EE - Estonia 17
FR - Francia 13
AR - Argentina 12
AT - Austria 12
PK - Pakistan 11
CZ - Repubblica Ceca 10
ES - Italia 10
EU - Europa 10
MX - Messico 9
PH - Filippine 9
IL - Israele 8
CH - Svizzera 7
RO - Romania 7
AU - Australia 6
BD - Bangladesh 6
BE - Belgio 6
IQ - Iraq 6
NL - Olanda 6
EC - Ecuador 5
ID - Indonesia 5
CO - Colombia 4
IR - Iran 4
NZ - Nuova Zelanda 4
PY - Paraguay 4
TN - Tunisia 4
ZA - Sudafrica 4
BG - Bulgaria 3
BY - Bielorussia 3
EG - Egitto 3
MA - Marocco 3
MK - Macedonia 3
OM - Oman 3
SA - Arabia Saudita 3
UZ - Uzbekistan 3
VE - Venezuela 3
CL - Cile 2
DK - Danimarca 2
JM - Giamaica 2
JO - Giordania 2
LT - Lituania 2
MY - Malesia 2
NO - Norvegia 2
PE - Perù 2
AZ - Azerbaigian 1
BH - Bahrain 1
BN - Brunei Darussalam 1
BO - Bolivia 1
CY - Cipro 1
GE - Georgia 1
GL - Groenlandia 1
GR - Grecia 1
HR - Croazia 1
KG - Kirghizistan 1
LB - Libano 1
LK - Sri Lanka 1
MC - Monaco 1
MD - Moldavia 1
NG - Nigeria 1
NP - Nepal 1
PR - Porto Rico 1
PT - Portogallo 1
RS - Serbia 1
SC - Seychelles 1
SK - Slovacchia (Repubblica Slovacca) 1
SN - Senegal 1
TH - Thailandia 1
TW - Taiwan 1
XK - ???statistics.table.value.countryCode.XK??? 1
Totale 15.152
Città #
Ann Arbor 2.712
Chandler 940
Jacksonville 889
Woodbridge 790
Houston 741
Wilmington 687
Princeton 644
Dublin 228
Singapore 225
Dong Ket 202
Ashburn 192
Izmir 184
Hong Kong 183
Nanjing 154
Salerno 150
Beijing 145
Andover 144
Pellezzano 138
Boardman 135
Dearborn 125
Moscow 94
Munich 61
Nanchang 60
Shenyang 59
Fairfield 51
Hebei 49
Ottawa 49
Changsha 48
Düsseldorf 46
Mestre 45
Jiaxing 40
Dallas 35
São Paulo 34
New York 32
Tianjin 32
Norwalk 30
Guangzhou 29
The Dalles 28
Naples 27
Columbus 26
Rome 26
Silvi Marina 24
Nocera Inferiore 23
Redwood City 21
Council Bluffs 19
Los Angeles 19
Cambridge 18
San Diego 18
Tallinn 17
Des Moines 16
Washington 16
Catania 15
Chicago 15
Napoli 14
Santa Clara 14
Seattle 14
Turku 14
Fisciano 13
Frankfurt am Main 13
Nuremberg 12
Pune 12
Battipaglia 11
Brooklyn 10
Milan 10
Rio de Janeiro 10
Sarno 10
Tokyo 10
Belo Horizonte 9
Chennai 9
Giugliano In Campania 9
Jinan 9
Parma 9
San Francisco 9
Charlotte 8
Haikou 8
London 8
Edinburgh 7
Pescara 7
Porto Alegre 7
Prague 7
Shanghai 7
Tappahannock 7
Guarulhos 6
Hangzhou 6
Helsinki 6
Indiana 6
Kraków 6
Lioni 6
Manchester 6
Montecorvino Rovella 6
Shenzhen 6
Solofra 6
Vienna 6
Warsaw 6
Wuhan 6
Berlin 5
Dormagen 5
Florence 5
Hefei 5
Joinville 5
Totale 11.120
Nome #
A Note on Time-Bound Hierarchical Key Assignment Schemes 175
A botnet-based command and control approach relying on swarm intelligence 162
Using generative adversarial networks for improving classification effectiveness in credit card fraud detection 158
Novel algorithm for efficient distribution of molecular docking calculations 156
A new flexible protocol for docking studies 149
Forensically-Sound Methods to Collect Live Network Evidence 139
Secure group communication schemes for dynamic heterogeneous distributed computing 136
Automatic, Selective and Secure Deletion of Digital Evidence 134
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud 132
A Forensic Analysis of Images on Online Social Networks 131
Format-Independent Protection of DNA Microarray Images 130
Anonymous protocols: Notions and equivalence 130
Parallel low-complexity lossless coding of three-dimensional medical images 128
Cloud-based adaptive compression and secure management services for 3D healthcare data 127
`Perfectly-Secure Conference Key Distribution 125
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems 124
A Note on Secret Sharing Schemes 124
Engineering a secure mobile messaging framework 124
An asynchronous covert channel using spam 123
Protection of microscopy images through digital watermarking techniques 122
A Novel Anti-Forensics Technique for the Android OS 119
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 119
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 117
On Secure Data Management in Health-Care Environment 117
Reversible Copyright Protection for DNA Microarray Images 113
Hierarchical and shared key assignment 111
A collaborative decision-support system for secure analysis of cranial disorders 111
Weaknesses in a Recent Ultra-lightweight RFID Authentication Protocol. 110
An Efficient Protocol for Reliable Data Communication on Dataless Devices 110
A triadic closure and homophily-based recommendation system for online social networks 110
Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems 108
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness 107
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 107
Randomness in secret sharing and visual cryptography schemes 106
On-board format-independent security of functional magnetic resonance images 106
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes 105
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome 104
Automated Production of Predetermined Digital Evidence 103
A Lower Bound on the Encoding Length in Lossy Transmission 102
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 102
Variations on a Theme by Akl and Taylor: Security and Tradeoffs 102
Un Sistema a Garanzia dell’Anonimato su Internet 101
SPEECH: Secure Personal End-to-End Communication with Handheld 101
On the Construction of a False Digital Alibi on the Android OS 100
An Information-Theoretic Treatment of Secret Sharing Schemes 100
Security of Public Key Cryptosystems based on Chebyshev Polynomials. 98
DISCERN: A collaborative visualization system for learning cryptographic protocols 98
Visualization of Cryptographic Protocols with GRACE 98
Automated Construction of a False Digital Alibi 97
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 97
Secure and reliable data communication in developing regions and rural areas 96
Anonymous Membership Broadcast Schemes 95
On Monotone Formula Composition of Perfect Zero Knowledge Languages 95
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines 95
Bounds on Entropy in a Guessing Game 94
A t-Private k-Database Private Information Retrieval Scheme 94
New Steganographic Techniques for the OOXML File Format 94
Device Tracking in Private Networks via NAPT Log Analysis 94
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 94
Security and Tradeoffs of the Akl-Taylor Scheme and its Variants 93
Optimising SD and LSD in presence of non-uniform probabilities of revocation. 93
On the Protection of fMRI Images in Multi-domain Environments 93
An Attack on a Payment Scheme 92
An Extensible Framework for Efficient Secure SMS 92
Taking Advantages of a Disadvantage: Digital Forensics and Steganography using Document Metadata 91
Hyppocrates: A New Proactive Password Checker 90
Characterizing and Classifying Card-Sharing Traffic Through Wavelet Analysis 90
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes 90
New Results on the Randomness of Visual Cryptography Schemes 89
How to Forge a Digital Alibi on Mac OS X 89
Necessary and Sufficient Assumptions for Non-Interactive Zero-Knowledge proofs of Knowledge for all NP relations 88
Towards a Lawfully Secure and Privacy Preserving Video Surveillance System 88
Colored Visual Cryptography without Color Darkening 87
Efficient provably-secure hierarchical key assignment schemes 87
On the Information Rate of Secret Sharing Schemes (Extended Abstract) 87
Hierarchical and Shared Access Control 87
On the protection of consumer genomic data in the Internet of Living Things 87
Multimedia-based battery drain attacks for Android devices 86
Ideal Contrast Visual Cryptography Schemes with Reversing 85
Improved Schemes for Visual Cryptography 83
Steganography and Secure Communication on Online Social Networks and Online Photo Sharing 83
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 83
Color visual cryptography schemes for black and white secret images 83
Cryptographic Hierarchical Access Control for Dynamic Structures 83
Visual Cryptography for Grey Levels Images 82
A Blocker-proof Conditional Access System 82
FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment 82
E-mail-based Covert Channels for Asynchronous Message Steganography 82
Efficient Provably-Secure Hierarchical Key Assignment Schemes 81
Neural Network Techniques for Proactive Password Checking. 80
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios 80
Using Colors to Improve Visual Cryptography for Black and White Images 80
Key Privacy and Anonymous Protocols 80
Randomness-Optimal Characterization of Two NP Proof Systems 78
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes, 78
Analyzing the Internet Stability in Presence of Disasters 78
A Simple Algorithm for the Constrained Sequence Problems 78
Hierarchical Key Assignment Schemes with Key Rotation 77
On Information Dispersal Algorithms 77
Visual cryptography schemes with optimal pixel expansion 77
Totale 10.230
Categoria #
all - tutte 53.967
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 53.967


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.381 23 143 150 4 165 53 164 7 245 9 171 247
2021/20221.213 3 3 0 8 26 24 10 49 159 157 211 563
2022/20232.094 206 176 31 266 289 442 19 193 283 4 133 52
2023/2024866 91 127 58 37 55 71 52 93 12 54 69 147
2024/20252.106 110 57 49 161 77 222 270 250 282 91 216 321
2025/2026132 132 0 0 0 0 0 0 0 0 0 0 0
Totale 15.556