VISCONTI, Ivan
 Distribuzione geografica
Continente #
NA - Nord America 5.034
EU - Europa 1.287
AS - Asia 735
Continente sconosciuto - Info sul continente non disponibili 5
AF - Africa 3
SA - Sud America 2
Totale 7.066
Nazione #
US - Stati Uniti d'America 5.012
IT - Italia 412
CN - Cina 375
UA - Ucraina 352
SG - Singapore 138
DE - Germania 117
IE - Irlanda 116
SE - Svezia 104
TR - Turchia 91
VN - Vietnam 82
FI - Finlandia 76
IN - India 27
CA - Canada 22
RU - Federazione Russa 22
GB - Regno Unito 16
CZ - Repubblica Ceca 13
FR - Francia 12
PL - Polonia 11
RO - Romania 9
HK - Hong Kong 6
PK - Pakistan 5
DK - Danimarca 4
EU - Europa 4
IL - Israele 4
BE - Belgio 3
BG - Bulgaria 3
CH - Svizzera 3
CM - Camerun 3
NL - Olanda 3
AR - Argentina 2
ES - Italia 2
GR - Grecia 2
IR - Iran 2
JP - Giappone 2
KR - Corea 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AT - Austria 1
HR - Croazia 1
KZ - Kazakistan 1
LI - Liechtenstein 1
LT - Lituania 1
ME - Montenegro 1
NO - Norvegia 1
RS - Serbia 1
Totale 7.066
Città #
Ann Arbor 1.437
Woodbridge 632
Houston 481
Chandler 469
Jacksonville 423
Princeton 340
Wilmington 246
Ashburn 118
Dublin 112
Salerno 93
Izmir 90
Andover 89
Nanjing 87
Singapore 87
Dong Ket 82
Beijing 81
Boardman 78
Pellezzano 67
Silvi Marina 58
Mestre 31
Shenyang 29
Fairfield 28
Los Angeles 24
Jiaxing 23
Hebei 22
Nanchang 22
Washington 22
Redwood City 21
Changsha 20
Düsseldorf 20
Norwalk 20
Pune 20
Rome 19
Moscow 18
Ottawa 18
Olomouc 12
Guangzhou 11
Kraków 10
Romano 10
San Diego 10
Dearborn 9
Macerata Campania 9
Seattle 9
Tianjin 9
Santa Clara 8
Dallas 7
Orta di Atella 7
Horia 6
Milan 6
Bologna 5
Falls Church 5
Munich 5
Vietri sul Mare 5
Cercola 4
Helsinki 4
Indore 4
New York 4
Spinea 4
Toronto 4
Zhengzhou 4
Aarhus 3
Bonnyrigg 3
Dormagen 3
Lappeenranta 3
Manchester 3
Old Bridge 3
Prata 3
Shanghai 3
Sofia 3
Atlanta 2
Azzanello 2
Brussels 2
Cambridge 2
Capri 2
Des Moines 2
Edinburgh 2
Frankfurt am Main 2
Jinan 2
Kyiv 2
Lariano 2
Longyan 2
Los Alamitos 2
Madrid 2
Moiano 2
Naaldwijk 2
Napoli 2
Nettuno 2
Ningbo 2
Panchgani 2
Rapolla 2
Redmond 2
San Francisco 2
Secaucus 2
Seocho-gu 2
Tappahannock 2
Tokyo 2
Torre Del Greco 2
Turin 2
Wuxi 2
Zárate 2
Totale 5.687
Nome #
Concurrent non-malleable commitments (and more) in 3 rounds 163
Executable proofs, input-size hiding secure computation and a new ideal world 137
Security and Cryptography for Networks - 8th International Conference, SCN 2012 131
Anonymizer-Enabled Security and Privacy for RFID 124
Collusion-Free Multiparty Computation in the Mediated Model 122
Location Privacy in RFID Applications 121
4-Round Resettably-Sound Zero Knowledge 116
On RFID Privacy with Mutual Authentication and Tag Corruption 114
Improved OR-Composition of Sigma-Protocols 111
Co-sound Zero-Knowledge with Public Keys 107
An Architecture for Kernel-Level Verification of Executables at Run Time 107
Online/offline or composition of sigma protocols 107
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles 106
Nearly Simultaneously Resettable Black-Box Zero Knowledge 105
On Input Indistinguishable Proof Systems 104
Statistical Concurrent Non-malleable Zero Knowledge 103
Constructing Non-Malleable Commitments: A Black-Box Approach 102
Black-box non-black-box zero knowledge 99
Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments 98
User privacy issues regarding certificates and the TLS protocol 98
SmartK: Smart Cards in Operating Systems at Kernel Level 98
Concurrent Zero Knowledge in the Bounded Player Model 98
Impossibility of black-box simulation against leakage attacks 98
Simulation-Based Concurrent Non-malleable Commitments and Decommitments 97
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model 96
User Privacy in Transport Systems Based on RFID E-Tickets 95
The design and implementation of a secure CAPTCHA against man-in-the-middle attacks 95
On Non-Interactive Zero-Knowledge Proofs of Knowledge in the Shared Random String Model 94
Improved Security Notions and Protocols for Non-Transferable Identification 94
Hybrid Commitments and their Applications to Zero-Knowledge Proof Systems 93
An anonymous credential system and a privacy-awake PKI 93
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports 93
Secure Database Commitments and Universal Arguments of Quasi Knowledge 93
6th International Conference on Security and Cryptography for Networks, SCN 2008 93
Reliable Accounting in Grid Economic Transactions 92
Reliable Accounting in Grids 91
Collusion-Free Protocols in the Mediated Model 90
Securing Operating System Services Based on Smart Cards 90
Mercurial Commitments: Minimal Assumptions and Efficient Constructions 89
Revisiting DoS Attacks and Privacy in RFID-Enabled Networks 89
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model 89
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions 88
Resettable Statistical Zero Knowledge 87
Special issue: Advances in security for communication networks 87
Simultaneous Resettability from One-Way Functions 87
Four-round concurrent non-malleable commitments from one-way functions 87
Constant-Round Concurrent Non-Malleable Zero Knowledge in the Bare Public-Key Model 87
On Selective-Opening Attacks against Encryption Schemes 86
An Efficient and Usable Multi-Show Non-Transferable Anonymous Credential System 85
Single-Prover Concurrent Zero Knowledge in Almost Constant Rounds 84
Anonymous Group Communication in Mobile Networks (Extended Abstract) 83
On constant-round concurrent non-malleable proof systems 81
Completely Non-Malleable Encryption Revisited 80
Impossibility Results for RFID Privacy Notions 80
Efficient Zero Knowledge on the Internet 79
Delayed-input cryptographic protocols 79
Revisiting Lower and Upper Bounds for Selective Decommitments 76
Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge 76
Unconditional UC-secure computation with (Stronger-malicious) PUFs 76
Simultaneously Resettable Arguments of Knowledge 75
A Lightweight Security Model for WBEM 74
Secure Set Intersection with Untrusted Hardware Tokens 73
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code 72
Concurrent Zero Knowledge in the Public-Key Model 70
A Distributed and Secure Architecture for Signature and Decryption Delegation Through Remote Smart Cards 70
On Round-Optimal Zero Knowledge in the Bare Public-Key Model 66
A secure and private system for subscription-based remote services 60
Controlled homomorphic encryption: Definition and construction 60
Enhancing RFID Security and Privacy by Physically Unclonable Functions 59
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge 57
Black-box constructions of bounded-concurrent secure computation 57
Hybrid Trapdoor Commitments and their Applications 56
Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds 56
Impossibility Results for Static Input Secure Computation 54
Impossibility and Feasibility Results for Zero Knowledge with Public Keys 50
Proxy Smart Card Systems 49
On Defining Proofs of Knowledge in the Bare Public Key Model 47
Round-Optimal Secure Two-Party Computation from Trapdoor Permutations 44
Resettably-sound resettable zero knowledge in constant rounds 42
The Blockchain Quadrilemma: When Also Computational Effectiveness Matters 42
Non-interactive zero knowledge proofs in the random oracle model 41
Continuously non-malleable codes in the split-state model from minimal assumptions 40
Efficient NIZK Arguments with Straight-Line Simulation and Extraction 38
Publicly Verifiable Proofs from Blockchains 38
Non-interactive secure computation from one-way functions 35
How to extract useful randomness from unreliable sources 35
UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens 34
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System 34
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains 24
Universally Composable Secure Computation with Corrupted Tokens 23
Shielded Computations in Smart Contracts Overcoming Forks 18
Efficient Proofs of Knowledge for Threshold Relations 16
Towards Data Redaction in Bitcoin 14
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems 14
Cryptographic Tools for Blockchains 14
Doubly adaptive zero-knowledge proofs 12
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges 11
Privacy and Integrity Threats in Contact Tracing Systems and Their Mitigations 9
Zero-Knowledge Proofs 8
Preventing Content Cloning in NFT Collections 6
Totale 7.420
Categoria #
all - tutte 20.899
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 20.899


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020461 0 0 0 12 63 23 76 11 73 34 149 20
2020/2021755 6 67 97 0 77 49 85 0 165 15 88 106
2021/2022685 16 0 1 52 6 14 13 30 87 94 86 286
2022/20231.087 111 83 7 133 155 226 2 109 173 3 63 22
2023/2024521 52 68 39 19 34 87 28 12 4 43 25 110
2024/2025149 50 31 20 48 0 0 0 0 0 0 0 0
Totale 7.430