DE SANTIS, Alfredo
 Distribuzione geografica
Continente #
AS - Asia 14.010
NA - Nord America 10.365
EU - Europa 3.176
SA - Sud America 547
AF - Africa 48
OC - Oceania 14
Continente sconosciuto - Info sul continente non disponibili 13
Totale 28.173
Nazione #
HK - Hong Kong 10.878
US - Stati Uniti d'America 10.226
SG - Singapore 1.338
CN - Cina 986
IT - Italia 944
UA - Ucraina 726
BR - Brasile 450
RU - Federazione Russa 330
DE - Germania 319
VN - Vietnam 299
IE - Irlanda 229
TR - Turchia 198
FI - Finlandia 165
SE - Svezia 158
CA - Canada 98
KR - Corea 95
GB - Regno Unito 88
IN - India 63
AR - Argentina 45
PL - Polonia 41
JP - Giappone 32
ES - Italia 24
LV - Lettonia 22
MX - Messico 22
EE - Estonia 17
AT - Austria 16
FR - Francia 15
PK - Pakistan 15
PH - Filippine 14
EC - Ecuador 13
ID - Indonesia 13
IQ - Iraq 13
NL - Olanda 13
ZA - Sudafrica 13
IL - Israele 11
BD - Bangladesh 10
CZ - Repubblica Ceca 10
EU - Europa 10
CO - Colombia 9
BE - Belgio 7
CH - Svizzera 7
LT - Lituania 7
PY - Paraguay 7
RO - Romania 7
AU - Australia 6
CL - Cile 6
MA - Marocco 6
MK - Macedonia 6
PE - Perù 6
BG - Bulgaria 5
IR - Iran 5
NZ - Nuova Zelanda 5
TN - Tunisia 5
VE - Venezuela 5
BO - Bolivia 4
BY - Bielorussia 4
EG - Egitto 4
JM - Giamaica 4
UZ - Uzbekistan 4
AE - Emirati Arabi Uniti 3
BS - Bahamas 3
DO - Repubblica Dominicana 3
KE - Kenya 3
NP - Nepal 3
OM - Oman 3
PT - Portogallo 3
SA - Arabia Saudita 3
SN - Senegal 3
CW - ???statistics.table.value.countryCode.CW??? 2
CY - Cipro 2
DK - Danimarca 2
GE - Georgia 2
GM - Gambi 2
JO - Giordania 2
LB - Libano 2
LC - Santa Lucia 2
MY - Malesia 2
NO - Norvegia 2
RS - Serbia 2
SK - Slovacchia (Repubblica Slovacca) 2
TH - Thailandia 2
TJ - Tagikistan 2
TT - Trinidad e Tobago 2
ZW - Zimbabwe 2
AF - Afghanistan, Repubblica islamica di 1
AZ - Azerbaigian 1
BH - Bahrain 1
BJ - Benin 1
BN - Brunei Darussalam 1
BW - Botswana 1
CG - Congo 1
CI - Costa d'Avorio 1
GF - Guiana Francese 1
GH - Ghana 1
GL - Groenlandia 1
GR - Grecia 1
HR - Croazia 1
IS - Islanda 1
KG - Kirghizistan 1
KZ - Kazakistan 1
Totale 28.153
Città #
Hong Kong 10.862
Ann Arbor 2.712
Chandler 940
Jacksonville 889
Woodbridge 790
Houston 752
Wilmington 687
Princeton 644
Singapore 593
Dallas 460
Ashburn 285
Dublin 228
Dong Ket 202
Izmir 184
Beijing 175
Nanjing 154
Salerno 150
Andover 144
Pellezzano 138
Boardman 135
Dearborn 125
Moscow 96
Munich 61
Nanchang 60
New York 60
Shenyang 59
Fairfield 51
São Paulo 50
Hebei 49
Ottawa 49
Changsha 48
Düsseldorf 46
Los Angeles 46
Mestre 45
Jiaxing 40
Ho Chi Minh City 36
Rome 36
The Dalles 33
Tianjin 32
Guangzhou 30
Norwalk 30
Santa Clara 28
Naples 27
Columbus 26
Chicago 24
Silvi Marina 24
Nocera Inferiore 23
Tokyo 23
Warsaw 23
Council Bluffs 21
Montreal 21
Redwood City 21
Brooklyn 20
Hanoi 20
Cambridge 18
Des Moines 18
London 18
San Diego 18
Chennai 17
Frankfurt am Main 17
Stockholm 17
Tallinn 17
Washington 16
Catania 15
Fisciano 15
Seattle 15
Boston 14
Manchester 14
Napoli 14
Turku 14
Atlanta 13
Nuremberg 13
Rio de Janeiro 13
San Francisco 13
Denver 12
Pune 12
Battipaglia 11
Belo Horizonte 11
Milan 11
Amsterdam 10
Charlotte 10
Johannesburg 10
Sarno 10
Giugliano In Campania 9
Jinan 9
Mexico City 9
Parma 9
Poplar 9
Porto Alegre 9
Vienna 9
Haikou 8
Edinburgh 7
Guarulhos 7
Haiphong 7
New Delhi 7
Orem 7
Pescara 7
Prague 7
Quito 7
Shanghai 7
Totale 23.047
Nome #
Variations on a Theme by Akl and Taylor: Security and Tradeoffs 914
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 910
Improved Schemes for Visual Cryptography 641
On Secret Set Schemes 604
On the Protection of fMRI Images in Multi-domain Environments 569
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments 541
Unconditionally Secure Hierarchical Key Assignment Schemes 501
A Note on Secret Sharing Schemes 498
Automatic, Selective and Secure Deletion of Digital Evidence 485
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 485
One-Message Unilateral Entity Authentication Schemes 470
New Results on Distributed Secret Sharing Protocols 464
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 448
Forensically-Sound Methods to Collect Live Network Evidence 418
Cloud-based adaptive compression and secure management services for 3D healthcare data 412
Hyppocrates: A New Proactive Password Checker 373
Format-Independent Protection of DNA Microarray Images 372
On-board format-independent security of functional magnetic resonance images 355
Novel algorithm for efficient distribution of molecular docking calculations 319
Efficient Provably-Secure Hierarchical Key Assignment Schemes 303
Security and Tradeoffs of the Akl-Taylor Scheme and its Variants 280
Secure group communication schemes for dynamic heterogeneous distributed computing 261
Visual Cryptography with Reversing 251
The Randomness Complexity of Private Computation 243
Necessary and Sufficient Assumptions for Non-Interactive Zero-Knowledge proofs of Knowledge for all NP relations 238
Un Sistema a Garanzia dell’Anonimato su Internet 226
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications 226
On Information Dispersal Algorithms 220
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 218
A Note on Time-Bound Hierarchical Key Assignment Schemes 209
A new flexible protocol for docking studies 195
Securing visual search queries in ubiquitous scenarios empowered by smart personal devices 192
A botnet-based command and control approach relying on swarm intelligence 190
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 187
An Efficient Protocol for Reliable Data Communication on Dataless Devices 173
Using generative adversarial networks for improving classification effectiveness in credit card fraud detection 173
A Forensic Analysis of Images on Online Social Networks 172
Parallel low-complexity lossless coding of three-dimensional medical images 172
`Perfectly-Secure Conference Key Distribution 167
Anonymous Membership Broadcast Schemes 165
Non-Interactive Zero-Knowledge: A Low-Randomness Characterization of NP 165
Ideal Contrast Visual Cryptography Schemes with Reversing 164
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud 162
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures 159
Distributed Group Key Management for Event Notification Confidentiality among Sensors 158
Cryptographic Key Assignment Schemes for any Access Control Policy 155
A Novel Anti-Forensics Technique for the Android OS 150
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 150
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems 147
Engineering a secure mobile messaging framework 146
A collaborative decision-support system for secure analysis of cranial disorders 144
Anonymous protocols: Notions and equivalence 142
An asynchronous covert channel using spam 141
A triadic closure and homophily-based recommendation system for online social networks 140
On the Information Rate of Secret Sharing Schemes (Extended Abstract) 138
Compression-based steganography 136
On Secure Data Management in Health-Care Environment 136
On the Construction of a False Digital Alibi on the Android OS 135
A Lower Bound on the Encoding Length in Lossy Transmission 134
Protection of microscopy images through digital watermarking techniques 132
Efficient provably-secure hierarchical key assignment schemes 130
Reversible Copyright Protection for DNA Microarray Images 130
Bounds on Entropy in a Guessing Game 129
Cryptographic Hierarchical Access Control for Dynamic Structures 128
On the protection of consumer genomic data in the Internet of Living Things 128
A t-Private k-Database Private Information Retrieval Scheme 127
Automated Production of Predetermined Digital Evidence 126
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness 125
An Attack on a Payment Scheme 123
Randomness in secret sharing and visual cryptography schemes 119
Weaknesses in a Recent Ultra-lightweight RFID Authentication Protocol. 119
SPEECH: Secure Personal End-to-End Communication with Handheld 119
Automated Construction of a False Digital Alibi 119
An Information-Theoretic Treatment of Secret Sharing Schemes 119
Hierarchical and shared key assignment 118
An Extensible Framework for Efficient Secure SMS 115
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome 113
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes 112
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 112
Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems 110
FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment 109
Visualization of Cryptographic Protocols with GRACE 107
Randomness in Visual Cryptography 106
Robust non-interactive zero knowledge. 106
DISCERN: A collaborative visualization system for learning cryptographic protocols 106
On Monotone Formula Composition of Perfect Zero Knowledge Languages 105
Security of Public Key Cryptosystems based on Chebyshev Polynomials. 105
New Steganographic Techniques for the OOXML File Format 105
Hierarchical and Shared Access Control 105
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines 103
Secure and reliable data communication in developing regions and rural areas 103
New Results on the Randomness of Visual Cryptography Schemes 101
Un'Architettura Scalabile per Servizi di Time-Stamping 101
Characterizing and Classifying Card-Sharing Traffic Through Wavelet Analysis 101
A Simple Algorithm for the Constrained Sequence Problems 101
How to Forge a Digital Alibi on Mac OS X 100
Device Tracking in Private Networks via NAPT Log Analysis 100
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes 100
One-pass lossless data hiding and compression of remote sensing data 100
A Blocker-proof Conditional Access System 99
Totale 21.658
Categoria #
all - tutte 79.507
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 79.507


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021896 0 0 0 0 0 53 164 7 245 9 171 247
2021/20221.213 3 3 0 8 26 24 10 49 159 157 211 563
2022/20232.094 206 176 31 266 289 442 19 193 283 4 133 52
2023/2024866 91 127 58 37 55 71 52 93 12 54 69 147
2024/20252.106 110 57 49 161 77 222 270 250 282 91 216 321
2025/202613.154 2.275 5.660 3.841 438 918 22 0 0 0 0 0 0
Totale 28.578