BLUNDO, Carlo
 Distribuzione geografica
Continente #
AS - Asia 10.575
NA - Nord America 6.157
EU - Europa 2.044
SA - Sud America 377
AF - Africa 63
OC - Oceania 10
Continente sconosciuto - Info sul continente non disponibili 8
Totale 19.234
Nazione #
HK - Hong Kong 8.056
US - Stati Uniti d'America 6.053
SG - Singapore 1.084
CN - Cina 663
UA - Ucraina 446
IT - Italia 422
VN - Vietnam 361
BR - Brasile 285
RU - Federazione Russa 272
DE - Germania 208
SE - Svezia 165
IE - Irlanda 139
FI - Finlandia 107
FR - Francia 98
TR - Turchia 84
GB - Regno Unito 77
IN - India 73
CA - Canada 67
KR - Corea 58
AR - Argentina 37
BD - Bangladesh 31
IQ - Iraq 25
MX - Messico 24
JP - Giappone 21
ZA - Sudafrica 21
IL - Israele 18
PL - Polonia 18
VE - Venezuela 16
NL - Olanda 15
PK - Pakistan 15
SA - Arabia Saudita 14
ES - Italia 13
MY - Malesia 12
AT - Austria 11
CO - Colombia 11
ID - Indonesia 10
EC - Ecuador 8
KE - Kenya 8
MA - Marocco 8
PY - Paraguay 8
EU - Europa 7
UZ - Uzbekistan 7
HU - Ungheria 6
PH - Filippine 6
AU - Australia 5
CH - Svizzera 5
CL - Cile 5
RO - Romania 5
TN - Tunisia 5
AL - Albania 4
DK - Danimarca 4
EG - Egitto 4
JO - Giordania 4
LT - Lituania 4
NP - Nepal 4
RS - Serbia 4
AE - Emirati Arabi Uniti 3
AZ - Azerbaigian 3
BE - Belgio 3
BH - Bahrain 3
DZ - Algeria 3
ET - Etiopia 3
GR - Grecia 3
KZ - Kazakistan 3
NG - Nigeria 3
NZ - Nuova Zelanda 3
PE - Perù 3
PS - Palestinian Territory 3
SI - Slovenia 3
TH - Thailandia 3
TT - Trinidad e Tobago 3
UY - Uruguay 3
CG - Congo 2
CZ - Repubblica Ceca 2
IR - Iran 2
JM - Giamaica 2
LV - Lettonia 2
MR - Mauritania 2
OM - Oman 2
PA - Panama 2
PT - Portogallo 2
AF - Afghanistan, Repubblica islamica di 1
AM - Armenia 1
BG - Bulgaria 1
BS - Bahamas 1
BY - Bielorussia 1
CY - Cipro 1
DM - Dominica 1
DO - Repubblica Dominicana 1
GF - Guiana Francese 1
GH - Ghana 1
GL - Groenlandia 1
GM - Gambi 1
GT - Guatemala 1
KG - Kirghizistan 1
LC - Santa Lucia 1
LU - Lussemburgo 1
MD - Moldavia 1
MK - Macedonia 1
ML - Mali 1
Totale 19.226
Città #
Hong Kong 8.048
Ann Arbor 1.200
Jacksonville 531
Singapore 530
Chandler 494
San Jose 398
Wilmington 374
Princeton 373
Woodbridge 329
Dallas 322
Ashburn 273
Houston 246
Dong Ket 166
Dublin 137
Council Bluffs 120
Beijing 115
Dearborn 92
Lauterbourg 89
Nanjing 89
Andover 87
Salerno 74
Ho Chi Minh City 72
Pellezzano 71
Boardman 70
Izmir 68
The Dalles 62
Munich 60
New York 59
Moscow 49
Los Angeles 42
São Paulo 39
Hanoi 37
Shenyang 36
Mestre 35
Fairfield 34
Düsseldorf 33
Nanchang 32
Hebei 26
Changsha 25
Silvi Marina 24
Santa Clara 23
Montreal 19
Rome 18
Tianjin 17
Catania 16
Norwalk 16
Seattle 16
Tokyo 16
Jiaxing 15
Orem 15
Redwood City 15
Warsaw 15
Johannesburg 14
Ottawa 14
Stockholm 14
Frankfurt am Main 13
Guangzhou 13
Poplar 13
Pune 13
Rio de Janeiro 12
Amsterdam 11
Atlanta 11
Brooklyn 11
Chicago 11
Da Nang 11
Des Moines 11
London 11
Turku 11
Baghdad 10
Cambridge 10
Jinan 10
San Diego 10
Chennai 9
Columbus 9
Denver 9
Milan 9
Nuremberg 9
Toronto 9
Vienna 9
Haiphong 8
Naples 8
Belo Horizonte 7
Boston 7
Manchester 7
Mexico City 7
Nairobi 7
New Delhi 7
Phoenix 7
Rishon LeTsiyyon 7
San Francisco 7
Tashkent 7
Turin 7
Ankara 6
Dhaka 6
Domicella 6
Edinburgh 6
Fisciano 6
Ancona 5
Asunción 5
Bắc Ninh 5
Totale 15.597
Nome #
A LIGHTWEIGHT PROTOCOL FOR THE GENERATION AND DISTRIBUTION OF SECURE E-COUPONS 1.606
A Note on Optimal Metering Schemes 955
Improved Schemes for Visual Cryptography 661
Predicate Encryption with Partial Public Keys 591
Randomness in Multi-Secret Sharing Schemes 590
Heuristics for constrained role mining in the post-processing framework 577
Role mining under User-Distribution cardinality constraint 507
Improved Security Notions and Protocols for Non-Transferable Identification 387
Hyppocrates: A New Proactive Password Checker 386
A J2ME transparent middleware to support HTTP connections over Bluetooth 381
A time-driven FCA-based approach for identifying students' dropout in MOOCs 375
Sequential Three-Way Decisions for Reducing Uncertainty in Dropout Prediction for Online Courses 370
An intelligent and private method to profile social network users 364
Web Services Invocation over Bluetooth 329
A Distributed Implementation of the Certified Information Access Service 313
The Randomness Complexity of Private Computation 261
Untraceable Tags based on Mild Assumptions 256
Un Sistema a Garanzia dell’Anonimato su Internet 248
A WEB SERVICE FOR CERTIFIED EMAIL 241
Targeted Advertising That Protects the Privacy of Social Networks Users 192
Private-Key Hidden Vector Encryption with Key Confidentiality 191
`Perfectly-Secure Conference Key Distribution 189
Certified Information Access 186
PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining 183
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity 171
An AmI-based and privacy-preserving shopping mall model 171
On the Information Rate of Secret Sharing Schemes (Extended Abstract) 158
Authenticated Web-Services: A WS-Security Based Implementation 156
A private Intelligent Shopping Mall 153
A New Self-healing Key Distribution Scheme. 152
Constrained Role Mining 149
Dynamic Multi-Threshold Metering Schemes 149
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. 148
Steganography Using Modern Arts 147
Bounds and Constructions for Metering Schemes 145
A t-Private k-Database Private Information Retrieval Scheme 144
A Ramp Model for Distributed Key Distribution Schemes 142
A Web Service Based Micro-payment System 141
A Ramp Model for Distributed Key Distribution Schemes 140
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. 139
A Staus-Restricted Key Agreement Scheme 139
Validating Orchestration of Web Services with BPEL and Aggregate Signatures 137
A Lightweight Approach to Authenticated Web Caching 135
A Lightweight Framework for Web Services Invocation over Bluetooth 134
Certified Information Access 134
Performance evaluation of Web Services invocation over Bluetooth 133
A Plataform for Secure E-Gambling 130
An Linear Algebraic Approach to Metering Schemes 130
A T-Restricted Key Agreement Scheme 128
HTTP over Bluetooth: a J2ME experience 127
PostProcessing in Constrained Role Mining 127
New Constructions for Visual Cryptography 126
A FRAMEWORK FOR AUTHENTICATED WEB SERVICES 125
A Note on the Randomness in Dynamic Threshold Schemes 124
A Simple Role Mining Algorithm 123
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports 123
Randomness recycling in constant-round private computations. 119
Un'Architettura Scalabile per Servizi di Time-Stamping 119
Secure Metering Schemes 118
A Flaw in a Self-Healing Key Distribution Scheme 116
Secure Web Metering 116
A Software Infrastructure for Authenticated Web Metering 114
Constructions and Bounds for Unconditionally Secure Commitment Schemes 112
A Novel Approach to Proactive Password Checking. 112
ncreasing Privacy Threats in the Cyberspace: the Case of Italian E-Passports 112
MODELING A CERTIFIED EMAIL PROTOCOL USING I/O AUTOMATA 112
Design of Self-Healing Key Distribution Schemes 112
Analysis and Design of Distributed Key Distribution Centers 109
Hyppocrates: A New Proactive Password Checker 109
EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity 108
New Bounds on the Communication Complexity of Metering Schemes 108
Visual Cryptography for Grey Levels Images 103
Secret Sharing Schemes with Veto Capabilities 103
Visual cryptography schemes with optimal pixel expansion 102
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios 100
Contrast Optimal Threshold Visual Cryptography Schemes 98
Low-randomness constant-round private XOR computations 96
Certified Email: Design and Implementation of a New Optimistic Protocol 96
Secure E-Coupons 93
On Self-healing Key Distribution Schemes. 92
Hiding Information in Image Mosaics 92
On the Information Rate of Secret Sharing Schemes 92
The Key Establishment Problem 90
Randomness in Self-Healing Key Distribution Schemes 87
Un clinical decision support system basato su realtà aumentata per l’assistenza domiciliare dei pazienti affetti da lesioni da pressione 87
On Unconditionally Secure Distributed Oblivious Transfer. 86
Probability of Shares in Secret Sharing Schemes 85
Fourth Conference on Security in Communication Networks (SCN '04) 85
Metering Schemes with Pricing 83
On the Contrast in Visual Cryptography Schemes 83
New results on unconditionally secure distributed oblivious transfer: (Extended abstract) 83
On a Fallacious Bound for Authentication Codes 81
Definitions and Bounds for Self-Healing Key Distribution Schemes 80
Perfectly-Secure Key Distribution for Dynamic Conferences 78
On Secret Sharing Schemes 75
SAWM: A Tool for Secure and Authenticated Web Metering 75
Unconditional Secure Conference Key Distribution Schemes with Disenrollment Capability 74
Managing key hierarchies for access control enforcement: Heuristic approaches. 70
Extended Schemes for Visual Cryptography 66
Extended Capabilities for Visual Cryptography 65
Totale 19.015
Categoria #
all - tutte 48.243
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 48.243


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021356 0 0 0 0 0 0 0 0 0 5 136 215
2021/2022666 0 0 0 6 27 16 5 31 99 92 94 296
2022/20231.133 114 80 19 143 148 248 3 119 162 2 71 24
2023/2024444 45 75 29 19 26 53 40 48 17 23 14 55
2024/20251.270 72 31 40 81 34 117 213 130 166 63 141 182
2025/202611.344 2.061 3.374 3.105 303 640 269 676 148 278 490 0 0
Totale 19.441