VISCONTI, Ivan
 Distribuzione geografica
Continente #
NA - Nord America 5.071
EU - Europa 1.512
AS - Asia 1.019
SA - Sud America 83
AF - Africa 9
Continente sconosciuto - Info sul continente non disponibili 5
Totale 7.699
Nazione #
US - Stati Uniti d'America 5.046
IT - Italia 434
CN - Cina 406
UA - Ucraina 353
SG - Singapore 319
RU - Federazione Russa 216
DE - Germania 120
IE - Irlanda 116
SE - Svezia 104
TR - Turchia 93
VN - Vietnam 82
FI - Finlandia 77
BR - Brasile 74
KR - Corea 50
IN - India 27
CA - Canada 22
GB - Regno Unito 16
HK - Hong Kong 14
CZ - Repubblica Ceca 13
FR - Francia 12
PL - Polonia 11
RO - Romania 9
IL - Israele 8
NL - Olanda 6
PK - Pakistan 5
DK - Danimarca 4
EU - Europa 4
AR - Argentina 3
BE - Belgio 3
BG - Bulgaria 3
CH - Svizzera 3
CM - Camerun 3
JP - Giappone 3
UZ - Uzbekistan 3
ZA - Sudafrica 3
AT - Austria 2
ES - Italia 2
GR - Grecia 2
IR - Iran 2
MX - Messico 2
VE - Venezuela 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AM - Armenia 1
AZ - Azerbaigian 1
BD - Bangladesh 1
BN - Brunei Darussalam 1
CL - Cile 1
CO - Colombia 1
CR - Costa Rica 1
DZ - Algeria 1
HR - Croazia 1
IQ - Iraq 1
KE - Kenya 1
KZ - Kazakistan 1
LB - Libano 1
LI - Liechtenstein 1
LT - Lituania 1
MA - Marocco 1
ME - Montenegro 1
NO - Norvegia 1
PY - Paraguay 1
RS - Serbia 1
UY - Uruguay 1
Totale 7.699
Città #
Ann Arbor 1.437
Woodbridge 632
Houston 481
Chandler 469
Jacksonville 423
Princeton 340
Wilmington 246
Ashburn 120
Singapore 117
Dublin 112
Salerno 93
Izmir 90
Andover 89
Nanjing 87
Beijing 84
Dong Ket 82
Boardman 78
Moscow 71
Pellezzano 67
Silvi Marina 58
Mestre 31
Shenyang 29
Fairfield 28
Los Angeles 24
Jiaxing 23
Hebei 22
Nanchang 22
Rome 22
Washington 22
Redwood City 21
Changsha 20
Düsseldorf 20
Norwalk 20
Pune 20
Ottawa 18
The Dalles 14
Milan 13
Olomouc 12
Council Bluffs 11
Guangzhou 11
Kraków 10
Romano 10
San Diego 10
Tianjin 10
Dearborn 9
Macerata Campania 9
Seattle 9
Santa Clara 8
Dallas 7
Orta di Atella 7
Horia 6
Bologna 5
Falls Church 5
Helsinki 5
Hong Kong 5
Munich 5
Shanghai 5
São Paulo 5
Vietri sul Mare 5
Cercola 4
Indore 4
New York 4
Spinea 4
Toronto 4
Zhengzhou 4
Aarhus 3
Amsterdam 3
Belo Horizonte 3
Bonnyrigg 3
Dormagen 3
Lappeenranta 3
Manchester 3
Old Bridge 3
Prata 3
Sofia 3
Tokyo 3
Yubileyny 3
Anápolis 2
Aracaju 2
Atlanta 2
Azzanello 2
Brussels 2
Cambridge 2
Capri 2
Chengdu 2
Chongqing 2
Des Moines 2
Edinburgh 2
Frankfurt am Main 2
Ha Kwai Chung 2
Heidenheim 2
Jinan 2
Kyiv 2
Lariano 2
Longyan 2
Los Alamitos 2
Madrid 2
Moiano 2
Naaldwijk 2
Naples 2
Totale 5.820
Nome #
Concurrent non-malleable commitments (and more) in 3 rounds 173
Security and Cryptography for Networks - 8th International Conference, SCN 2012 139
Executable proofs, input-size hiding secure computation and a new ideal world 139
Collusion-Free Multiparty Computation in the Mediated Model 132
Anonymizer-Enabled Security and Privacy for RFID 130
Location Privacy in RFID Applications 126
4-Round Resettably-Sound Zero Knowledge 125
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles 120
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model 118
On RFID Privacy with Mutual Authentication and Tag Corruption 118
Improved OR-Composition of Sigma-Protocols 118
An Architecture for Kernel-Level Verification of Executables at Run Time 117
Online/offline or composition of sigma protocols 114
Co-sound Zero-Knowledge with Public Keys 111
An anonymous credential system and a privacy-awake PKI 109
Nearly Simultaneously Resettable Black-Box Zero Knowledge 109
Statistical Concurrent Non-malleable Zero Knowledge 109
Concurrent Zero Knowledge in the Bounded Player Model 108
Black-box non-black-box zero knowledge 107
On Input Indistinguishable Proof Systems 107
Constructing Non-Malleable Commitments: A Black-Box Approach 106
Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments 102
User privacy issues regarding certificates and the TLS protocol 101
User Privacy in Transport Systems Based on RFID E-Tickets 100
SmartK: Smart Cards in Operating Systems at Kernel Level 100
Impossibility of black-box simulation against leakage attacks 100
6th International Conference on Security and Cryptography for Networks, SCN 2008 100
Four-round concurrent non-malleable commitments from one-way functions 99
Simulation-Based Concurrent Non-malleable Commitments and Decommitments 98
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports 98
Reliable Accounting in Grids 98
The design and implementation of a secure CAPTCHA against man-in-the-middle attacks 98
Hybrid Commitments and their Applications to Zero-Knowledge Proof Systems 97
Improved Security Notions and Protocols for Non-Transferable Identification 97
Collusion-Free Protocols in the Mediated Model 97
Constant-Round Concurrent Non-Malleable Zero Knowledge in the Bare Public-Key Model 97
Reliable Accounting in Grid Economic Transactions 96
An Efficient and Usable Multi-Show Non-Transferable Anonymous Credential System 96
On Non-Interactive Zero-Knowledge Proofs of Knowledge in the Shared Random String Model 95
Secure Database Commitments and Universal Arguments of Quasi Knowledge 95
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model 95
On Selective-Opening Attacks against Encryption Schemes 94
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions 93
Anonymous Group Communication in Mobile Networks (Extended Abstract) 92
Securing Operating System Services Based on Smart Cards 92
Mercurial Commitments: Minimal Assumptions and Efficient Constructions 92
Revisiting DoS Attacks and Privacy in RFID-Enabled Networks 92
Resettable Statistical Zero Knowledge 92
Special issue: Advances in security for communication networks 92
Simultaneous Resettability from One-Way Functions 91
Single-Prover Concurrent Zero Knowledge in Almost Constant Rounds 87
Delayed-input cryptographic protocols 87
Completely Non-Malleable Encryption Revisited 85
On constant-round concurrent non-malleable proof systems 85
Impossibility Results for RFID Privacy Notions 83
A Lightweight Security Model for WBEM 83
Unconditional UC-secure computation with (Stronger-malicious) PUFs 83
Revisiting Lower and Upper Bounds for Selective Decommitments 81
Efficient Zero Knowledge on the Internet 80
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code 80
Simultaneously Resettable Arguments of Knowledge 80
Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge 79
Secure Set Intersection with Untrusted Hardware Tokens 78
A Distributed and Secure Architecture for Signature and Decryption Delegation Through Remote Smart Cards 78
Concurrent Zero Knowledge in the Public-Key Model 73
A secure and private system for subscription-based remote services 70
On Round-Optimal Zero Knowledge in the Bare Public-Key Model 69
Controlled homomorphic encryption: Definition and construction 68
Enhancing RFID Security and Privacy by Physically Unclonable Functions 64
Resettably-sound resettable zero knowledge in constant rounds 64
Black-box constructions of bounded-concurrent secure computation 64
Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds 63
Impossibility Results for Static Input Secure Computation 60
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge 59
Hybrid Trapdoor Commitments and their Applications 59
Impossibility and Feasibility Results for Zero Knowledge with Public Keys 54
Proxy Smart Card Systems 52
Round-Optimal Secure Two-Party Computation from Trapdoor Permutations 52
The Blockchain Quadrilemma: When Also Computational Effectiveness Matters 52
On Defining Proofs of Knowledge in the Bare Public Key Model 50
How to extract useful randomness from unreliable sources 49
Efficient NIZK Arguments with Straight-Line Simulation and Extraction 47
Continuously non-malleable codes in the split-state model from minimal assumptions 47
Non-interactive zero knowledge proofs in the random oracle model 45
Publicly Verifiable Proofs from Blockchains 44
UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens 42
Non-interactive secure computation from one-way functions 40
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System 39
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains 35
Shielded Computations in Smart Contracts Overcoming Forks 29
Universally Composable Secure Computation with Corrupted Tokens 25
Doubly adaptive zero-knowledge proofs 23
Efficient Proofs of Knowledge for Threshold Relations 22
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems 20
Privacy and Integrity Threats in Contact Tracing Systems and Their Mitigations 18
Towards Data Redaction in Bitcoin 18
Cryptographic Tools for Blockchains 17
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges 15
Secure Blockchain-Based Supply Chain Management with Verifiable Digital Twins 14
Preventing Content Cloning in NFT Collections 11
Totale 8.046
Categoria #
all - tutte 25.900
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 25.900


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020169 0 0 0 0 0 0 0 0 0 0 149 20
2020/2021755 6 67 97 0 77 49 85 0 165 15 88 106
2021/2022685 16 0 1 52 6 14 13 30 87 94 86 286
2022/20231.087 111 83 7 133 155 226 2 109 173 3 63 22
2023/2024521 52 68 39 19 34 87 28 12 4 43 25 110
2024/2025782 50 31 20 74 30 115 157 128 128 44 5 0
Totale 8.063