DE SANTIS, Alfredo
 Distribuzione geografica
Continente #
NA - Nord America 9.313
EU - Europa 2.894
AS - Asia 1.987
SA - Sud America 262
AF - Africa 15
Continente sconosciuto - Info sul continente non disponibili 11
OC - Oceania 10
Totale 14.492
Nazione #
US - Stati Uniti d'America 9.247
IT - Italia 912
CN - Cina 781
UA - Ucraina 724
SG - Singapore 600
RU - Federazione Russa 318
DE - Germania 254
BR - Brasile 234
IE - Irlanda 229
VN - Vietnam 204
TR - Turchia 192
FI - Finlandia 150
SE - Svezia 142
KR - Corea 85
CA - Canada 59
GB - Regno Unito 36
IN - India 32
HK - Hong Kong 23
LV - Lettonia 22
EE - Estonia 17
PL - Polonia 14
FR - Francia 13
JP - Giappone 13
EU - Europa 10
AR - Argentina 9
CZ - Repubblica Ceca 9
PH - Filippine 9
IL - Israele 8
PK - Pakistan 8
CH - Svizzera 7
RO - Romania 7
AU - Australia 6
BE - Belgio 6
NL - Olanda 6
AT - Austria 5
EC - Ecuador 5
ES - Italia 5
ID - Indonesia 5
MX - Messico 5
CO - Colombia 4
IR - Iran 4
NZ - Nuova Zelanda 4
TN - Tunisia 4
BD - Bangladesh 3
BG - Bulgaria 3
BY - Bielorussia 3
EG - Egitto 3
IQ - Iraq 3
MA - Marocco 3
MK - Macedonia 3
PY - Paraguay 3
UZ - Uzbekistan 3
CL - Cile 2
DK - Danimarca 2
MY - Malesia 2
NO - Norvegia 2
OM - Oman 2
PE - Perù 2
VE - Venezuela 2
ZA - Sudafrica 2
AZ - Azerbaigian 1
BN - Brunei Darussalam 1
BO - Bolivia 1
CY - Cipro 1
GE - Georgia 1
GL - Groenlandia 1
GR - Grecia 1
HR - Croazia 1
JM - Giamaica 1
JO - Giordania 1
KG - Kirghizistan 1
LK - Sri Lanka 1
MC - Monaco 1
MD - Moldavia 1
NG - Nigeria 1
SA - Arabia Saudita 1
SC - Seychelles 1
SK - Slovacchia (Repubblica Slovacca) 1
SN - Senegal 1
TH - Thailandia 1
TW - Taiwan 1
XK - ???statistics.table.value.countryCode.XK??? 1
Totale 14.492
Città #
Ann Arbor 2.712
Chandler 940
Jacksonville 888
Woodbridge 790
Houston 741
Wilmington 687
Princeton 644
Dublin 228
Singapore 204
Dong Ket 202
Ashburn 184
Izmir 184
Nanjing 154
Salerno 150
Andover 144
Beijing 143
Pellezzano 138
Boardman 135
Dearborn 125
Moscow 93
Nanchang 60
Shenyang 59
Fairfield 51
Hebei 49
Changsha 48
Ottawa 48
Düsseldorf 46
Mestre 45
Jiaxing 40
Tianjin 32
Norwalk 30
Guangzhou 28
Naples 27
Rome 26
Silvi Marina 24
São Paulo 24
Dallas 23
New York 23
Nocera Inferiore 23
Redwood City 21
Council Bluffs 19
Cambridge 18
San Diego 18
Tallinn 17
Des Moines 16
The Dalles 16
Washington 16
Catania 15
Hong Kong 14
Napoli 14
Frankfurt am Main 13
Seattle 13
Fisciano 12
Pune 12
Battipaglia 11
Chicago 11
Milan 10
Sarno 10
Giugliano In Campania 9
Jinan 9
Nuremberg 9
Parma 9
Haikou 8
Los Angeles 8
Edinburgh 7
Pescara 7
Prague 7
Rio de Janeiro 7
Shanghai 7
Tappahannock 7
Tokyo 7
Belo Horizonte 6
Chennai 6
Guarulhos 6
Hangzhou 6
Helsinki 6
Indiana 6
Kraków 6
Lioni 6
London 6
Montecorvino Rovella 6
Shenzhen 6
Solofra 6
Wuhan 6
Berlin 5
Dormagen 5
Florence 5
Hefei 5
Joinville 5
Munich 5
Ningbo 5
Omaha 5
Pomigliano d'Arco 5
Porto Alegre 5
Quito 5
Spinea 5
Trento 5
Zurich 5
Brussels 4
Bucharest 4
Totale 10.725
Nome #
A Note on Time-Bound Hierarchical Key Assignment Schemes 168
A botnet-based command and control approach relying on swarm intelligence 154
Using generative adversarial networks for improving classification effectiveness in credit card fraud detection 152
Novel algorithm for efficient distribution of molecular docking calculations 149
A new flexible protocol for docking studies 137
Forensically-Sound Methods to Collect Live Network Evidence 133
Secure group communication schemes for dynamic heterogeneous distributed computing 132
Automatic, Selective and Secure Deletion of Digital Evidence 130
Anonymous protocols: Notions and equivalence 127
Format-Independent Protection of DNA Microarray Images 125
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud 125
A Forensic Analysis of Images on Online Social Networks 124
Cloud-based adaptive compression and secure management services for 3D healthcare data 122
Parallel low-complexity lossless coding of three-dimensional medical images 121
An asynchronous covert channel using spam 119
Engineering a secure mobile messaging framework 119
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems 118
A Note on Secret Sharing Schemes 118
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence 117
`Perfectly-Secure Conference Key Distribution 116
Protection of microscopy images through digital watermarking techniques 116
A Novel Anti-Forensics Technique for the Android OS 114
On Secure Data Management in Health-Care Environment 114
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme 113
Weaknesses in a Recent Ultra-lightweight RFID Authentication Protocol. 110
Reversible Copyright Protection for DNA Microarray Images 109
Hierarchical and shared key assignment 107
Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems 106
A triadic closure and homophily-based recommendation system for online social networks 104
Randomness in secret sharing and visual cryptography schemes 103
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness 102
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes 102
On-board format-independent security of functional magnetic resonance images 102
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome 101
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 100
Variations on a Theme by Akl and Taylor: Security and Tradeoffs 100
A collaborative decision-support system for secure analysis of cranial disorders 100
An Efficient Protocol for Reliable Data Communication on Dataless Devices 99
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants 99
Un Sistema a Garanzia dell’Anonimato su Internet 98
A Lower Bound on the Encoding Length in Lossy Transmission 96
Security of Public Key Cryptosystems based on Chebyshev Polynomials. 96
Automated Production of Predetermined Digital Evidence 96
SPEECH: Secure Personal End-to-End Communication with Handheld 95
On the Construction of a False Digital Alibi on the Android OS 95
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines 95
Secure and reliable data communication in developing regions and rural areas 95
DISCERN: A collaborative visualization system for learning cryptographic protocols 94
Visualization of Cryptographic Protocols with GRACE 94
Device Tracking in Private Networks via NAPT Log Analysis 94
Automated Construction of a False Digital Alibi 93
New Steganographic Techniques for the OOXML File Format 93
On Monotone Formula Composition of Perfect Zero Knowledge Languages 92
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update 92
Taking Advantages of a Disadvantage: Digital Forensics and Steganography using Document Metadata 91
Optimising SD and LSD in presence of non-uniform probabilities of revocation. 91
Modeling energy-efficient secure communications in multi-mode wireless mobile devices 90
Security and Tradeoffs of the Akl-Taylor Scheme and its Variants 89
Characterizing and Classifying Card-Sharing Traffic Through Wavelet Analysis 89
An Information-Theoretic Treatment of Secret Sharing Schemes 89
On the Protection of fMRI Images in Multi-domain Environments 89
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes 89
Bounds on Entropy in a Guessing Game 88
An Extensible Framework for Efficient Secure SMS 88
How to Forge a Digital Alibi on Mac OS X 88
A t-Private k-Database Private Information Retrieval Scheme 87
Towards a Lawfully Secure and Privacy Preserving Video Surveillance System 87
New Results on the Randomness of Visual Cryptography Schemes 86
Anonymous Membership Broadcast Schemes 86
Colored Visual Cryptography without Color Darkening 86
Necessary and Sufficient Assumptions for Non-Interactive Zero-Knowledge proofs of Knowledge for all NP relations 85
Efficient provably-secure hierarchical key assignment schemes 85
Hyppocrates: A New Proactive Password Checker 84
Hierarchical and Shared Access Control 84
Steganography and Secure Communication on Online Social Networks and Online Photo Sharing 83
Ideal Contrast Visual Cryptography Schemes with Reversing 82
Improved Schemes for Visual Cryptography 82
On the Information Rate of Secret Sharing Schemes (Extended Abstract) 82
Color visual cryptography schemes for black and white secret images 82
Visual Cryptography for Grey Levels Images 81
On the protection of consumer genomic data in the Internet of Living Things 81
E-mail-based Covert Channels for Asynchronous Message Steganography 81
An Attack on a Payment Scheme 80
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios 80
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 80
Key Privacy and Anonymous Protocols 80
Multimedia-based battery drain attacks for Android devices 80
Using Colors to Improve Visual Cryptography for Black and White Images 79
Neural Network Techniques for Proactive Password Checking. 78
Efficient Provably-Secure Hierarchical Key Assignment Schemes 78
Analyzing the Internet Stability in Presence of Disasters 78
Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices 77
A Blocker-proof Conditional Access System 76
Visual cryptography schemes with optimal pixel expansion 76
FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment 76
An Intelligent Security Architecture for Distributed Firewalling Environments 76
Randomness-Optimal Characterization of Two NP Proof Systems 75
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes, 75
On Ultralightweight RFID Authentication Protocols 75
Cheating Immune Threshold Visual Secret Sharing 75
Totale 9.824
Categoria #
all - tutte 50.534
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 50.534


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020286 0 0 0 0 0 0 0 0 0 0 261 25
2020/20211.381 23 143 150 4 165 53 164 7 245 9 171 247
2021/20221.213 3 3 0 8 26 24 10 49 159 157 211 563
2022/20232.094 206 176 31 266 289 442 19 193 283 4 133 52
2023/2024866 91 127 58 37 55 71 52 93 12 54 69 147
2024/20251.578 110 57 49 161 77 222 270 250 282 91 9 0
Totale 14.896