DE SANTIS, Alfredo
 Distribuzione geografica
Continente #
AS - Asia 13.171
NA - Nord America 10.119
EU - Europa 3.098
SA - Sud America 443
AF - Africa 40
OC - Oceania 14
Continente sconosciuto - Info sul continente non disponibili 13
Totale 26.898
Nazione #
HK - Hong Kong 10.878
US - Stati Uniti d'America 10.001
IT - Italia 933
CN - Cina 892
UA - Ucraina 724
SG - Singapore 694
BR - Brasile 384
RU - Federazione Russa 327
DE - Germania 316
VN - Vietnam 245
IE - Irlanda 229
TR - Turchia 197
FI - Finlandia 165
SE - Svezia 150
KR - Corea 94
CA - Canada 86
GB - Regno Unito 66
IN - India 51
PL - Polonia 26
JP - Giappone 22
LV - Lettonia 22
AR - Argentina 21
ES - Italia 18
EE - Estonia 17
AT - Austria 16
FR - Francia 15
MX - Messico 15
PH - Filippine 12
PK - Pakistan 12
CZ - Repubblica Ceca 10
EU - Europa 10
IL - Israele 10
NL - Olanda 10
EC - Ecuador 9
ID - Indonesia 9
IQ - Iraq 9
ZA - Sudafrica 9
BD - Bangladesh 8
BE - Belgio 7
CH - Svizzera 7
CO - Colombia 7
RO - Romania 7
AU - Australia 6
CL - Cile 6
MK - Macedonia 6
MA - Marocco 5
NZ - Nuova Zelanda 5
VE - Venezuela 5
BG - Bulgaria 4
BY - Bielorussia 4
IR - Iran 4
PE - Perù 4
PY - Paraguay 4
TN - Tunisia 4
UZ - Uzbekistan 4
BS - Bahamas 3
EG - Egitto 3
JM - Giamaica 3
LT - Lituania 3
OM - Oman 3
PT - Portogallo 3
SA - Arabia Saudita 3
SN - Senegal 3
CW - ???statistics.table.value.countryCode.CW??? 2
CY - Cipro 2
DK - Danimarca 2
DO - Repubblica Dominicana 2
GE - Georgia 2
GM - Gambi 2
JO - Giordania 2
KE - Kenya 2
LC - Santa Lucia 2
MY - Malesia 2
NO - Norvegia 2
NP - Nepal 2
RS - Serbia 2
SK - Slovacchia (Repubblica Slovacca) 2
TH - Thailandia 2
TJ - Tagikistan 2
TT - Trinidad e Tobago 2
ZW - Zimbabwe 2
AF - Afghanistan, Repubblica islamica di 1
AZ - Azerbaigian 1
BH - Bahrain 1
BJ - Benin 1
BN - Brunei Darussalam 1
BO - Bolivia 1
BW - Botswana 1
CG - Congo 1
CI - Costa d'Avorio 1
GF - Guiana Francese 1
GH - Ghana 1
GL - Groenlandia 1
GR - Grecia 1
HR - Croazia 1
IS - Islanda 1
KG - Kirghizistan 1
LB - Libano 1
LK - Sri Lanka 1
MC - Monaco 1
Totale 26.880
Città #
Hong Kong 10.862
Ann Arbor 2.712
Chandler 940
Jacksonville 889
Woodbridge 790
Houston 742
Wilmington 687
Princeton 644
Dallas 458
Singapore 259
Dublin 228
Ashburn 221
Dong Ket 202
Izmir 184
Nanjing 154
Salerno 150
Beijing 145
Andover 144
Pellezzano 138
Boardman 135
Dearborn 125
Moscow 96
Munich 61
Nanchang 60
Shenyang 59
Fairfield 51
Hebei 49
Ottawa 49
Changsha 48
Düsseldorf 46
Mestre 45
Jiaxing 40
New York 39
São Paulo 37
The Dalles 33
Tianjin 32
Rome 31
Norwalk 30
Guangzhou 29
Naples 27
Columbus 26
Los Angeles 25
Silvi Marina 24
Nocera Inferiore 23
Santa Clara 22
Council Bluffs 21
Redwood City 21
Brooklyn 19
Chicago 19
Cambridge 18
San Diego 18
Tallinn 17
Des Moines 16
Washington 16
Catania 15
Fisciano 15
Frankfurt am Main 15
London 15
Seattle 15
Napoli 14
Turku 14
Ho Chi Minh City 13
San Francisco 13
Tokyo 13
Boston 12
Hanoi 12
Montreal 12
Nuremberg 12
Pune 12
Rio de Janeiro 12
Battipaglia 11
Chennai 11
Milan 11
Warsaw 11
Sarno 10
Belo Horizonte 9
Charlotte 9
Giugliano In Campania 9
Jinan 9
Parma 9
Porto Alegre 9
Stockholm 9
Vienna 9
Haikou 8
Amsterdam 7
Edinburgh 7
Pescara 7
Prague 7
Quito 7
Shanghai 7
Tappahannock 7
Atlanta 6
Guarulhos 6
Hangzhou 6
Helsinki 6
Indiana 6
Johannesburg 6
Kraków 6
Lioni 6
Manchester 6
Totale 22.407
Nome #
Variations on a Theme by Akl and Taylor: Security and Tradeoffs 910
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 908
Improved Schemes for Visual Cryptography 637
On Secret Set Schemes 600
On the Protection of fMRI Images in Multi-domain Environments 562
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments 538
Unconditionally Secure Hierarchical Key Assignment Schemes 498
A Note on Secret Sharing Schemes 483
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 482
Automatic, Selective and Secure Deletion of Digital Evidence 471
One-Message Unilateral Entity Authentication Schemes 460
New Results on Distributed Secret Sharing Protocols 458
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 426
Forensically-Sound Methods to Collect Live Network Evidence 405
Cloud-based adaptive compression and secure management services for 3D healthcare data 404
Hyppocrates: A New Proactive Password Checker 366
Format-Independent Protection of DNA Microarray Images 363
On-board format-independent security of functional magnetic resonance images 350
Novel algorithm for efficient distribution of molecular docking calculations 312
Efficient Provably-Secure Hierarchical Key Assignment Schemes 300
Security and Tradeoffs of the Akl-Taylor Scheme and its Variants 278
Secure group communication schemes for dynamic heterogeneous distributed computing 255
Visual Cryptography with Reversing 250
The Randomness Complexity of Private Computation 241
Necessary and Sufficient Assumptions for Non-Interactive Zero-Knowledge proofs of Knowledge for all NP relations 235
Un Sistema a Garanzia dell’Anonimato su Internet 222
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications 222
On Information Dispersal Algorithms 215
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 213
A Note on Time-Bound Hierarchical Key Assignment Schemes 185
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 184
A botnet-based command and control approach relying on swarm intelligence 177
Securing visual search queries in ubiquitous scenarios empowered by smart personal devices 177
A new flexible protocol for docking studies 170
Parallel low-complexity lossless coding of three-dimensional medical images 167
Using generative adversarial networks for improving classification effectiveness in credit card fraud detection 164
Non-Interactive Zero-Knowledge: A Low-Randomness Characterization of NP 161
Ideal Contrast Visual Cryptography Schemes with Reversing 160
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures 157
An Efficient Protocol for Reliable Data Communication on Dataless Devices 155
Distributed Group Key Management for Event Notification Confidentiality among Sensors 154
`Perfectly-Secure Conference Key Distribution 153
A Forensic Analysis of Images on Online Social Networks 151
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud 149
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 148
Anonymous Membership Broadcast Schemes 145
Cryptographic Key Assignment Schemes for any Access Control Policy 145
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems 137
A Novel Anti-Forensics Technique for the Android OS 136
An asynchronous covert channel using spam 135
On the Information Rate of Secret Sharing Schemes (Extended Abstract) 135
A collaborative decision-support system for secure analysis of cranial disorders 135
Anonymous protocols: Notions and equivalence 134
Engineering a secure mobile messaging framework 131
Efficient provably-secure hierarchical key assignment schemes 127
Protection of microscopy images through digital watermarking techniques 126
Compression-based steganography 126
On Secure Data Management in Health-Care Environment 125
Bounds on Entropy in a Guessing Game 124
On the Construction of a False Digital Alibi on the Android OS 124
Reversible Copyright Protection for DNA Microarray Images 123
Cryptographic Hierarchical Access Control for Dynamic Structures 120
A triadic closure and homophily-based recommendation system for online social networks 118
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness 116
Randomness in secret sharing and visual cryptography schemes 115
Weaknesses in a Recent Ultra-lightweight RFID Authentication Protocol. 114
Hierarchical and shared key assignment 114
A Lower Bound on the Encoding Length in Lossy Transmission 113
Automated Production of Predetermined Digital Evidence 112
An Information-Theoretic Treatment of Secret Sharing Schemes 110
On the protection of consumer genomic data in the Internet of Living Things 110
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome 109
Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems 108
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes 108
A t-Private k-Database Private Information Retrieval Scheme 107
Automated Construction of a False Digital Alibi 106
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 106
SPEECH: Secure Personal End-to-End Communication with Handheld 105
Robust non-interactive zero knowledge. 104
Visualization of Cryptographic Protocols with GRACE 104
Randomness in Visual Cryptography 103
Hierarchical and Shared Access Control 103
An Attack on a Payment Scheme 102
On Monotone Formula Composition of Perfect Zero Knowledge Languages 102
Security of Public Key Cryptosystems based on Chebyshev Polynomials. 102
DISCERN: A collaborative visualization system for learning cryptographic protocols 102
New Steganographic Techniques for the OOXML File Format 102
An Extensible Framework for Efficient Secure SMS 101
FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment 99
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines 99
Secure and reliable data communication in developing regions and rural areas 99
New Results on the Randomness of Visual Cryptography Schemes 98
Un'Architettura Scalabile per Servizi di Time-Stamping 97
Characterizing and Classifying Card-Sharing Traffic Through Wavelet Analysis 97
How to Forge a Digital Alibi on Mac OS X 96
Device Tracking in Private Networks via NAPT Log Analysis 96
One-pass lossless data hiding and compression of remote sensing data 96
Optimising SD and LSD in presence of non-uniform probabilities of revocation. 95
Taking Advantages of a Disadvantage: Digital Forensics and Steganography using Document Metadata 93
Hyppocrates: A New Proactive Password Checker 93
Totale 20.858
Categoria #
all - tutte 74.359
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 74.359


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.065 0 0 0 4 165 53 164 7 245 9 171 247
2021/20221.213 3 3 0 8 26 24 10 49 159 157 211 563
2022/20232.094 206 176 31 266 289 442 19 193 283 4 133 52
2023/2024866 91 127 58 37 55 71 52 93 12 54 69 147
2024/20252.106 110 57 49 161 77 222 270 250 282 91 216 321
2025/202611.879 2.275 5.660 3.841 103 0 0 0 0 0 0 0 0
Totale 27.303