VISCONTI, Ivan
 Distribuzione geografica
Continente #
AS - Asia 14.480
NA - Nord America 5.549
EU - Europa 1.562
SA - Sud America 139
AF - Africa 21
Continente sconosciuto - Info sul continente non disponibili 5
OC - Oceania 2
Totale 21.758
Nazione #
HK - Hong Kong 13.332
US - Stati Uniti d'America 5.491
CN - Cina 463
IT - Italia 436
SG - Singapore 363
UA - Ucraina 353
RU - Federazione Russa 216
DE - Germania 135
BR - Brasile 125
IE - Irlanda 116
SE - Svezia 113
TR - Turchia 99
VN - Vietnam 93
FI - Finlandia 77
KR - Corea 57
CA - Canada 45
IN - India 32
GB - Regno Unito 24
PL - Polonia 16
FR - Francia 15
CZ - Repubblica Ceca 13
MX - Messico 9
RO - Romania 9
ZA - Sudafrica 9
IL - Israele 8
NL - Olanda 6
PK - Pakistan 6
UZ - Uzbekistan 6
ES - Italia 5
JP - Giappone 5
AR - Argentina 4
DK - Danimarca 4
EU - Europa 4
LT - Lituania 4
VE - Venezuela 4
AT - Austria 3
BE - Belgio 3
BG - Bulgaria 3
CH - Svizzera 3
CM - Camerun 3
AE - Emirati Arabi Uniti 2
BD - Bangladesh 2
DZ - Algeria 2
GR - Grecia 2
IQ - Iraq 2
IR - Iran 2
KE - Kenya 2
UY - Uruguay 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AM - Armenia 1
AZ - Azerbaigian 1
BN - Brunei Darussalam 1
CL - Cile 1
CO - Colombia 1
CR - Costa Rica 1
DO - Repubblica Dominicana 1
HR - Croazia 1
JO - Giordania 1
KG - Kirghizistan 1
KZ - Kazakistan 1
LB - Libano 1
LI - Liechtenstein 1
LV - Lettonia 1
MA - Marocco 1
ME - Montenegro 1
MR - Mauritania 1
NE - Niger 1
NI - Nicaragua 1
NO - Norvegia 1
PE - Perù 1
PF - Polinesia Francese 1
PY - Paraguay 1
RS - Serbia 1
SN - Senegal 1
TT - Trinidad e Tobago 1
TW - Taiwan 1
UG - Uganda 1
WS - Samoa 1
Totale 21.758
Città #
Hong Kong 13.318
Ann Arbor 1.437
Woodbridge 632
Houston 481
Chandler 469
Jacksonville 423
Princeton 340
Wilmington 246
Dallas 223
Singapore 155
Ashburn 134
Dublin 112
Salerno 93
Izmir 90
Andover 89
Nanjing 87
Beijing 86
Dong Ket 82
Boardman 78
Moscow 71
Pellezzano 67
Silvi Marina 58
Los Angeles 31
Mestre 31
The Dalles 31
Shenyang 29
Fairfield 28
Washington 24
Jiaxing 23
Rome 23
Hebei 22
Nanchang 22
Columbus 21
Redwood City 21
Changsha 20
Düsseldorf 20
Munich 20
Norwalk 20
Pune 20
New York 18
Ottawa 18
Council Bluffs 17
Guangzhou 14
Santa Clara 14
Brooklyn 13
Milan 13
Seattle 13
Olomouc 12
Chicago 11
Montreal 11
San Francisco 11
São Paulo 11
Kraków 10
Romano 10
San Diego 10
Tianjin 10
Dearborn 9
Macerata Campania 9
Belo Horizonte 8
Stockholm 8
Orta di Atella 7
Toronto 7
Atlanta 6
Boston 6
Ho Chi Minh City 6
Horia 6
Ankara 5
Bologna 5
Falls Church 5
Helsinki 5
Johannesburg 5
Rio de Janeiro 5
Shanghai 5
Tashkent 5
Tokyo 5
Vietri sul Mare 5
Warsaw 5
Cercola 4
Denver 4
Indore 4
Manchester 4
Spinea 4
Zhengzhou 4
Aarhus 3
Amsterdam 3
Anápolis 3
Bonnyrigg 3
Chennai 3
Dormagen 3
Lappeenranta 3
London 3
Mexico City 3
Old Bridge 3
Paris 3
Phoenix 3
Prata 3
San Jose 3
Sofia 3
Yubileyny 3
Aracaju 2
Totale 19.594
Nome #
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles 1.146
On constant-round concurrent non-malleable proof systems 963
Online/offline or composition of sigma protocols 949
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions 893
Non-interactive zero knowledge proofs in the random oracle model 857
Co-sound Zero-Knowledge with Public Keys 636
Concurrent Zero Knowledge in the Bounded Player Model 617
Secure Database Commitments and Universal Arguments of Quasi Knowledge 615
Simultaneous Resettability from One-Way Functions 574
Location Privacy in RFID Applications 567
Publicly Verifiable Proofs from Blockchains 565
Doubly adaptive zero-knowledge proofs 537
Concurrent Zero Knowledge in the Public-Key Model 429
SmartK: Smart Cards in Operating Systems at Kernel Level 422
Proxy Smart Card Systems 410
Secure Blockchain-Based Supply Chain Management with Verifiable Digital Twins 406
Constant-Round Concurrent Non-Malleable Zero Knowledge in the Bare Public-Key Model 377
Revisiting DoS Attacks and Privacy in RFID-Enabled Networks 375
Simulation-Based Concurrent Non-malleable Commitments and Decommitments 371
Improved Security Notions and Protocols for Non-Transferable Identification 367
Anonymizer-Enabled Security and Privacy for RFID 310
An Architecture for Kernel-Level Verification of Executables at Run Time 303
Round-Optimal Secure Two-Party Computation from Trapdoor Permutations 299
On RFID Privacy with Mutual Authentication and Tag Corruption 292
Mercurial Commitments: Minimal Assumptions and Efficient Constructions 282
Reliable Accounting in Grids 279
Concurrent non-malleable commitments (and more) in 3 rounds 276
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code 258
On Input Indistinguishable Proof Systems 243
A Lightweight Security Model for WBEM 239
A secure and private system for subscription-based remote services 229
Black-box constructions of bounded-concurrent secure computation 217
Efficient Proofs of Knowledge for Threshold Relations 213
Security and Cryptography for Networks - 8th International Conference, SCN 2012 213
4-Round Resettably-Sound Zero Knowledge 212
Secure Set Intersection with Untrusted Hardware Tokens 169
Securing Operating System Services Based on Smart Cards 167
6th International Conference on Security and Cryptography for Networks, SCN 2008 150
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model 146
Collusion-Free Multiparty Computation in the Mediated Model 146
Executable proofs, input-size hiding secure computation and a new ideal world 144
Impossibility of black-box simulation against leakage attacks 142
Hybrid Commitments and their Applications to Zero-Knowledge Proof Systems 139
Constructing Non-Malleable Commitments: A Black-Box Approach 133
Anonymous Group Communication in Mobile Networks (Extended Abstract) 131
Improved OR-Composition of Sigma-Protocols 130
An anonymous credential system and a privacy-awake PKI 127
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model 124
Black-box non-black-box zero knowledge 120
User Privacy in Transport Systems Based on RFID E-Tickets 118
Statistical Concurrent Non-malleable Zero Knowledge 118
Nearly Simultaneously Resettable Black-Box Zero Knowledge 117
Resettably-sound resettable zero knowledge in constant rounds 116
Four-round concurrent non-malleable commitments from one-way functions 113
Collusion-Free Protocols in the Mediated Model 112
Special issue: Advances in security for communication networks 112
Continuously non-malleable codes in the split-state model from minimal assumptions 112
Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments 109
User privacy issues regarding certificates and the TLS protocol 107
Resettable Statistical Zero Knowledge 107
The design and implementation of a secure CAPTCHA against man-in-the-middle attacks 106
Unconditional UC-secure computation with (Stronger-malicious) PUFs 105
On Non-Interactive Zero-Knowledge Proofs of Knowledge in the Shared Random String Model 104
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports 103
Reliable Accounting in Grid Economic Transactions 102
An Efficient and Usable Multi-Show Non-Transferable Anonymous Credential System 101
On Selective-Opening Attacks against Encryption Schemes 100
Delayed-input cryptographic protocols 98
Completely Non-Malleable Encryption Revisited 96
Single-Prover Concurrent Zero Knowledge in Almost Constant Rounds 95
A Distributed and Secure Architecture for Signature and Decryption Delegation Through Remote Smart Cards 93
Efficient Zero Knowledge on the Internet 90
Simultaneously Resettable Arguments of Knowledge 90
Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge 90
Impossibility Results for RFID Privacy Notions 88
Revisiting Lower and Upper Bounds for Selective Decommitments 87
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge 85
UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens 85
Controlled homomorphic encryption: Definition and construction 84
Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds 77
On Round-Optimal Zero Knowledge in the Bare Public-Key Model 75
Enhancing RFID Security and Privacy by Physically Unclonable Functions 70
Cryptographic Tools for Blockchains 69
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains 68
Impossibility Results for Static Input Secure Computation 65
Hybrid Trapdoor Commitments and their Applications 65
On Defining Proofs of Knowledge in the Bare Public Key Model 64
The Blockchain Quadrilemma: When Also Computational Effectiveness Matters 64
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems 63
Efficient NIZK Arguments with Straight-Line Simulation and Extraction 60
Impossibility and Feasibility Results for Zero Knowledge with Public Keys 60
How to extract useful randomness from unreliable sources 57
Non-interactive secure computation from one-way functions 55
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System 48
Shielded Computations in Smart Contracts Overcoming Forks 36
Universally Composable Secure Computation with Corrupted Tokens 35
Privacy and Integrity Threats in Contact Tracing Systems and Their Mitigations 30
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges 28
Towards Data Redaction in Bitcoin 27
Preventing Content Cloning in NFT Collections 24
Totale 22.092
Categoria #
all - tutte 44.529
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 44.529


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021682 0 0 97 0 77 49 85 0 165 15 88 106
2021/2022685 16 0 1 52 6 14 13 30 87 94 86 286
2022/20231.087 111 83 7 133 155 226 2 109 173 3 63 22
2023/2024521 52 68 39 19 34 87 28 12 4 43 25 110
2024/20251.186 50 31 20 74 30 115 157 128 128 44 150 259
2025/202613.655 4.319 5.889 3.447 0 0 0 0 0 0 0 0 0
Totale 22.122