VISCONTI, Ivan
 Distribuzione geografica
Continente #
NA - Nord America 5.013
EU - Europa 1.229
AS - Asia 533
Continente sconosciuto - Info sul continente non disponibili 5
AF - Africa 3
SA - Sud America 2
Totale 6.785
Nazione #
US - Stati Uniti d'America 4.991
IT - Italia 379
UA - Ucraina 352
CN - Cina 312
IE - Irlanda 116
DE - Germania 115
SE - Svezia 104
TR - Turchia 91
VN - Vietnam 82
FI - Finlandia 72
IN - India 27
CA - Canada 22
RU - Federazione Russa 22
GB - Regno Unito 16
FR - Francia 12
PL - Polonia 11
RO - Romania 9
HK - Hong Kong 6
PK - Pakistan 5
EU - Europa 4
IL - Israele 4
BG - Bulgaria 3
CM - Camerun 3
NL - Olanda 3
AR - Argentina 2
BE - Belgio 2
DK - Danimarca 2
ES - Italia 2
GR - Grecia 2
IR - Iran 2
JP - Giappone 2
A2 - ???statistics.table.value.countryCode.A2??? 1
CZ - Repubblica Ceca 1
HR - Croazia 1
KZ - Kazakistan 1
LI - Liechtenstein 1
LT - Lituania 1
ME - Montenegro 1
NO - Norvegia 1
RS - Serbia 1
SG - Singapore 1
Totale 6.785
Città #
Ann Arbor 1.437
Woodbridge 632
Houston 481
Chandler 469
Jacksonville 423
Princeton 340
Wilmington 246
Ashburn 118
Dublin 112
Salerno 93
Izmir 90
Andover 89
Nanjing 87
Dong Ket 82
Beijing 80
Boardman 78
Pellezzano 67
Silvi Marina 58
Mestre 31
Shenyang 29
Fairfield 28
Los Angeles 24
Hebei 22
Jiaxing 22
Nanchang 22
Washington 22
Redwood City 21
Changsha 20
Düsseldorf 20
Norwalk 20
Pune 20
Moscow 18
Ottawa 18
Rome 15
Kraków 10
Romano 10
San Diego 10
Dearborn 9
Macerata Campania 9
Seattle 9
Tianjin 9
Horia 6
Milan 6
Bologna 5
Falls Church 5
Cercola 4
Guangzhou 4
Indore 4
Munich 4
New York 4
Spinea 4
Toronto 4
Zhengzhou 4
Bonnyrigg 3
Dormagen 3
Manchester 3
Old Bridge 3
Prata 3
Sofia 3
Aarhus 2
Atlanta 2
Azzanello 2
Cambridge 2
Des Moines 2
Edinburgh 2
Frankfurt am Main 2
Jinan 2
Kyiv 2
Lappeenranta 2
Lariano 2
Los Alamitos 2
Madrid 2
Moiano 2
Naaldwijk 2
Napoli 2
Nettuno 2
Panchgani 2
Rapolla 2
Redmond 2
San Francisco 2
Secaucus 2
Shanghai 2
Tappahannock 2
Tokyo 2
Torre Del Greco 2
Zárate 2
Antwerp 1
Baltimore 1
Belgrade 1
Brno 1
Brooklyn 1
Brussels 1
Central 1
Chengdu 1
Chicago 1
Chiswick 1
Dallas 1
Denver 1
Falkenstein 1
Ferrara 1
Totale 5.540
Nome #
Concurrent non-malleable commitments (and more) in 3 rounds 159
Executable proofs, input-size hiding secure computation and a new ideal world 136
Security and Cryptography for Networks - 8th International Conference, SCN 2012 130
Anonymizer-Enabled Security and Privacy for RFID 121
Location Privacy in RFID Applications 121
Collusion-Free Multiparty Computation in the Mediated Model 117
On RFID Privacy with Mutual Authentication and Tag Corruption 113
4-Round Resettably-Sound Zero Knowledge 109
Improved OR-Composition of Sigma-Protocols 106
Co-sound Zero-Knowledge with Public Keys 104
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles 104
An Architecture for Kernel-Level Verification of Executables at Run Time 104
Nearly Simultaneously Resettable Black-Box Zero Knowledge 103
On Input Indistinguishable Proof Systems 103
Constructing Non-Malleable Commitments: A Black-Box Approach 102
Statistical Concurrent Non-malleable Zero Knowledge 102
Online/offline or composition of sigma protocols 102
Concurrent Zero Knowledge in the Bounded Player Model 98
Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments 97
Black-box non-black-box zero knowledge 97
User privacy issues regarding certificates and the TLS protocol 96
SmartK: Smart Cards in Operating Systems at Kernel Level 96
Simulation-Based Concurrent Non-malleable Commitments and Decommitments 95
On Non-Interactive Zero-Knowledge Proofs of Knowledge in the Shared Random String Model 93
User Privacy in Transport Systems Based on RFID E-Tickets 93
Impossibility of black-box simulation against leakage attacks 93
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model 92
Reliable Accounting in Grid Economic Transactions 92
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports 92
The design and implementation of a secure CAPTCHA against man-in-the-middle attacks 92
Improved Security Notions and Protocols for Non-Transferable Identification 91
An anonymous credential system and a privacy-awake PKI 91
Hybrid Commitments and their Applications to Zero-Knowledge Proof Systems 90
Secure Database Commitments and Universal Arguments of Quasi Knowledge 90
Reliable Accounting in Grids 89
Securing Operating System Services Based on Smart Cards 88
Mercurial Commitments: Minimal Assumptions and Efficient Constructions 88
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions 87
6th International Conference on Security and Cryptography for Networks, SCN 2008 87
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model 86
Simultaneous Resettability from One-Way Functions 86
Collusion-Free Protocols in the Mediated Model 85
Revisiting DoS Attacks and Privacy in RFID-Enabled Networks 85
Resettable Statistical Zero Knowledge 85
Special issue: Advances in security for communication networks 84
Four-round concurrent non-malleable commitments from one-way functions 84
Constant-Round Concurrent Non-Malleable Zero Knowledge in the Bare Public-Key Model 84
On Selective-Opening Attacks against Encryption Schemes 83
Single-Prover Concurrent Zero Knowledge in Almost Constant Rounds 82
Anonymous Group Communication in Mobile Networks (Extended Abstract) 81
An Efficient and Usable Multi-Show Non-Transferable Anonymous Credential System 79
Efficient Zero Knowledge on the Internet 78
Impossibility Results for RFID Privacy Notions 78
On constant-round concurrent non-malleable proof systems 78
Completely Non-Malleable Encryption Revisited 77
Delayed-input cryptographic protocols 76
Revisiting Lower and Upper Bounds for Selective Decommitments 75
Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge 75
Simultaneously Resettable Arguments of Knowledge 73
Secure Set Intersection with Untrusted Hardware Tokens 71
Concurrent Zero Knowledge in the Public-Key Model 69
A Lightweight Security Model for WBEM 69
Unconditional UC-secure computation with (Stronger-malicious) PUFs 69
A Distributed and Secure Architecture for Signature and Decryption Delegation Through Remote Smart Cards 68
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code 67
On Round-Optimal Zero Knowledge in the Bare Public-Key Model 64
Enhancing RFID Security and Privacy by Physically Unclonable Functions 58
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge 57
A secure and private system for subscription-based remote services 56
Controlled homomorphic encryption: Definition and construction 56
Hybrid Trapdoor Commitments and their Applications 55
Black-box constructions of bounded-concurrent secure computation 55
Impossibility Results for Static Input Secure Computation 52
Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds 52
Impossibility and Feasibility Results for Zero Knowledge with Public Keys 48
Proxy Smart Card Systems 47
On Defining Proofs of Knowledge in the Bare Public Key Model 46
Continuously non-malleable codes in the split-state model from minimal assumptions 39
Non-interactive zero knowledge proofs in the random oracle model 39
Resettably-sound resettable zero knowledge in constant rounds 38
Round-Optimal Secure Two-Party Computation from Trapdoor Permutations 38
The Blockchain Quadrilemma: When Also Computational Effectiveness Matters 38
Publicly Verifiable Proofs from Blockchains 35
Non-interactive secure computation from one-way functions 32
How to extract useful randomness from unreliable sources 32
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System 32
UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens 30
Efficient NIZK Arguments with Straight-Line Simulation and Extraction 27
Universally Composable Secure Computation with Corrupted Tokens 22
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains 21
Shielded Computations in Smart Contracts Overcoming Forks 17
Efficient Proofs of Knowledge for Threshold Relations 14
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems 13
Cryptographic Tools for Blockchains 9
Privacy and Integrity Threats in Contact Tracing Systems and Their Mitigations 8
Doubly adaptive zero-knowledge proofs 7
Towards Data Redaction in Bitcoin 7
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges 5
Zero-Knowledge Proofs 5
Totale 7.144
Categoria #
all - tutte 16.872
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 16.872


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019160 0 0 0 0 0 0 0 0 0 30 118 12
2019/2020740 196 4 79 12 63 23 76 11 73 34 149 20
2020/2021755 6 67 97 0 77 49 85 0 165 15 88 106
2021/2022685 16 0 1 52 6 14 13 30 87 94 86 286
2022/20231.087 111 83 7 133 155 226 2 109 173 3 63 22
2023/2024384 52 68 39 19 34 87 28 12 4 41 0 0
Totale 7.144