DE SANTIS, Alfredo
 Distribuzione geografica
Continente #
AS - Asia 15.197
NA - Nord America 11.906
EU - Europa 5.372
SA - Sud America 754
AF - Africa 104
OC - Oceania 15
Continente sconosciuto - Info sul continente non disponibili 13
Totale 33.361
Nazione #
US - Stati Uniti d'America 11.731
HK - Hong Kong 10.906
FI - Finlandia 2.029
SG - Singapore 1.822
CN - Cina 1.080
IT - Italia 976
UA - Ucraina 737
VN - Vietnam 574
BR - Brasile 551
DE - Germania 349
RU - Federazione Russa 345
IE - Irlanda 233
TR - Turchia 208
FR - Francia 187
SE - Svezia 161
KR - Corea 139
IN - India 117
GB - Regno Unito 109
CA - Canada 104
AR - Argentina 85
JP - Giappone 55
BD - Bangladesh 50
PL - Polonia 46
IQ - Iraq 41
MX - Messico 38
ES - Italia 32
PK - Pakistan 31
PH - Filippine 30
CO - Colombia 25
LV - Lettonia 23
NL - Olanda 23
EC - Ecuador 22
ID - Indonesia 22
VE - Venezuela 22
ZA - Sudafrica 20
CL - Cile 18
MA - Marocco 18
AT - Austria 17
EE - Estonia 17
UZ - Uzbekistan 14
PY - Paraguay 13
SA - Arabia Saudita 13
TN - Tunisia 13
IL - Israele 12
CZ - Repubblica Ceca 10
EU - Europa 10
MY - Malesia 9
AE - Emirati Arabi Uniti 8
EG - Egitto 8
LT - Lituania 8
NP - Nepal 8
OM - Oman 8
PE - Perù 8
AU - Australia 7
BE - Belgio 7
CH - Svizzera 7
DZ - Algeria 7
JM - Giamaica 7
JO - Giordania 7
KE - Kenya 7
PT - Portogallo 7
RO - Romania 7
BG - Bulgaria 6
BO - Bolivia 6
KZ - Kazakistan 6
MK - Macedonia 6
DO - Repubblica Dominicana 5
ET - Etiopia 5
IR - Iran 5
NZ - Nuova Zelanda 5
BY - Bielorussia 4
CR - Costa Rica 4
LB - Libano 4
SN - Senegal 4
BH - Bahrain 3
BS - Bahamas 3
MD - Moldavia 3
RS - Serbia 3
SY - Repubblica araba siriana 3
TH - Thailandia 3
TT - Trinidad e Tobago 3
TW - Taiwan 3
UY - Uruguay 3
AL - Albania 2
CG - Congo 2
CW - ???statistics.table.value.countryCode.CW??? 2
CY - Cipro 2
DK - Danimarca 2
GE - Georgia 2
GM - Gambi 2
GR - Grecia 2
HR - Croazia 2
HU - Ungheria 2
LC - Santa Lucia 2
LK - Sri Lanka 2
LY - Libia 2
MR - Mauritania 2
MT - Malta 2
NG - Nigeria 2
NO - Norvegia 2
Totale 33.319
Città #
Hong Kong 10.888
Ann Arbor 2.712
Helsinki 1.870
Chandler 940
Singapore 896
Jacksonville 889
San Jose 806
Woodbridge 790
Houston 756
Wilmington 687
Princeton 644
Dallas 461
Ashburn 448
Dublin 231
Council Bluffs 218
Dong Ket 202
Izmir 184
Beijing 183
The Dalles 170
Lauterbourg 163
Nanjing 155
Salerno 150
Andover 144
Pellezzano 138
Boardman 137
Ho Chi Minh City 134
Dearborn 125
Moscow 97
Hanoi 88
New York 70
Munich 61
São Paulo 61
Los Angeles 60
Nanchang 60
Shenyang 59
Fairfield 51
Ottawa 50
Santa Clara 50
Changsha 49
Hebei 49
Rome 47
Düsseldorf 46
Mestre 45
Tokyo 45
Jiaxing 40
Frankfurt am Main 38
Tianjin 33
Guangzhou 30
Norwalk 30
Chicago 28
Warsaw 28
Columbus 27
Naples 27
Orem 27
Chennai 24
Montreal 24
Silvi Marina 24
Brooklyn 23
Nocera Inferiore 23
London 22
Redwood City 21
Des Moines 20
Fisciano 20
Stockholm 20
Amsterdam 18
Cambridge 18
San Diego 18
Da Nang 17
Manchester 17
Nuremberg 17
Rio de Janeiro 17
Tallinn 17
Boston 16
Washington 16
Baghdad 15
Belo Horizonte 15
Catania 15
Haiphong 15
Seattle 15
Atlanta 14
Denver 14
Napoli 14
Turku 14
Pune 13
San Francisco 13
Tashkent 13
Charlotte 12
Johannesburg 12
Milan 12
Battipaglia 11
Curitiba 11
Dhaka 11
Mumbai 11
Parma 11
Poplar 11
Mexico City 10
New Delhi 10
Porto Alegre 10
Sarno 10
City of London 9
Totale 27.130
Nome #
Using generative adversarial networks for improving classification effectiveness in credit card fraud detection 2.054
Variations on a Theme by Akl and Taylor: Security and Tradeoffs 930
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 924
Improved Schemes for Visual Cryptography 661
On Secret Set Schemes 618
On the Protection of fMRI Images in Multi-domain Environments 589
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments 566
A Note on Secret Sharing Schemes 520
Unconditionally Secure Hierarchical Key Assignment Schemes 509
Automatic, Selective and Secure Deletion of Digital Evidence 506
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 505
One-Message Unilateral Entity Authentication Schemes 484
New Results on Distributed Secret Sharing Protocols 480
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 473
Forensically-Sound Methods to Collect Live Network Evidence 439
Cloud-based adaptive compression and secure management services for 3D healthcare data 432
Format-Independent Protection of DNA Microarray Images 389
Hyppocrates: A New Proactive Password Checker 386
On-board format-independent security of functional magnetic resonance images 376
Novel algorithm for efficient distribution of molecular docking calculations 345
Efficient Provably-Secure Hierarchical Key Assignment Schemes 312
Security and Tradeoffs of the Akl-Taylor Scheme and its Variants 293
Secure group communication schemes for dynamic heterogeneous distributed computing 280
Visual Cryptography with Reversing 272
The Randomness Complexity of Private Computation 261
Necessary and Sufficient Assumptions for Non-Interactive Zero-Knowledge proofs of Knowledge for all NP relations 251
Un Sistema a Garanzia dell’Anonimato su Internet 248
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications 244
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 241
On Information Dispersal Algorithms 231
A Note on Time-Bound Hierarchical Key Assignment Schemes 227
A new flexible protocol for docking studies 218
A botnet-based command and control approach relying on swarm intelligence 212
Securing visual search queries in ubiquitous scenarios empowered by smart personal devices 211
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 199
A Forensic Analysis of Images on Online Social Networks 197
An Efficient Protocol for Reliable Data Communication on Dataless Devices 194
Anonymous Membership Broadcast Schemes 190
`Perfectly-Secure Conference Key Distribution 189
Parallel low-complexity lossless coding of three-dimensional medical images 188
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud 185
Cryptographic Key Assignment Schemes for any Access Control Policy 181
Non-Interactive Zero-Knowledge: A Low-Randomness Characterization of NP 180
Distributed Group Key Management for Event Notification Confidentiality among Sensors 176
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures 176
Ideal Contrast Visual Cryptography Schemes with Reversing 175
A Novel Anti-Forensics Technique for the Android OS 172
Compression-based steganography 172
Engineering a secure mobile messaging framework 170
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems 168
A collaborative decision-support system for secure analysis of cranial disorders 167
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 165
A triadic closure and homophily-based recommendation system for online social networks 164
Anonymous protocols: Notions and equivalence 160
An asynchronous covert channel using spam 159
On the Construction of a False Digital Alibi on the Android OS 159
On the Information Rate of Secret Sharing Schemes (Extended Abstract) 158
A Lower Bound on the Encoding Length in Lossy Transmission 155
On Secure Data Management in Health-Care Environment 155
Cryptographic Hierarchical Access Control for Dynamic Structures 153
Reversible Copyright Protection for DNA Microarray Images 152
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness 151
Automated Production of Predetermined Digital Evidence 150
On the protection of consumer genomic data in the Internet of Living Things 147
An Information-Theoretic Treatment of Secret Sharing Schemes 145
Protection of microscopy images through digital watermarking techniques 145
A t-Private k-Database Private Information Retrieval Scheme 144
Efficient provably-secure hierarchical key assignment schemes 143
Automated Construction of a False Digital Alibi 140
An Attack on a Payment Scheme 139
SPEECH: Secure Personal End-to-End Communication with Handheld 139
Bounds on Entropy in a Guessing Game 136
An Extensible Framework for Efficient Secure SMS 135
Hierarchical and shared key assignment 135
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 135
FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment 132
Visualization of Cryptographic Protocols with GRACE 131
Randomness in secret sharing and visual cryptography schemes 130
Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems 130
Weaknesses in a Recent Ultra-lightweight RFID Authentication Protocol. 129
New Steganographic Techniques for the OOXML File Format 129
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome 129
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes 129
Security of Public Key Cryptosystems based on Chebyshev Polynomials. 125
How to Forge a Digital Alibi on Mac OS X 125
Hierarchical and Shared Access Control 125
Randomness in Visual Cryptography 124
New Results on the Randomness of Visual Cryptography Schemes 121
Device Tracking in Private Networks via NAPT Log Analysis 120
Robust non-interactive zero knowledge. 119
Un'Architettura Scalabile per Servizi di Time-Stamping 119
Data hiding using compressed archives 119
One-pass lossless data hiding and compression of remote sensing data 119
DISCERN: A collaborative visualization system for learning cryptographic protocols 118
Characterizing and Classifying Card-Sharing Traffic Through Wavelet Analysis 117
Secure and reliable data communication in developing regions and rural areas 117
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines 116
Hierarchical Key Assignment Schemes with Key Rotation 115
A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy 115
On Monotone Formula Composition of Perfect Zero Knowledge Languages 115
Totale 25.398
Categoria #
all - tutte 86.815
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 86.815


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021427 0 0 0 0 0 0 0 0 0 9 171 247
2021/20221.213 3 3 0 8 26 24 10 49 159 157 211 563
2022/20232.094 206 176 31 266 289 442 19 193 283 4 133 52
2023/2024866 91 127 58 37 55 71 52 93 12 54 69 147
2024/20252.106 110 57 49 161 77 222 270 250 282 91 216 321
2025/202618.349 2.275 5.660 3.841 438 918 443 1.349 293 2.335 797 0 0
Totale 33.773