BLUNDO, Carlo
 Distribuzione geografica
Continente #
NA - Nord America 4.613
EU - Europa 1.703
AS - Asia 1.109
SA - Sud America 130
AF - Africa 9
OC - Oceania 8
Continente sconosciuto - Info sul continente non disponibili 7
Totale 7.579
Nazione #
US - Stati Uniti d'America 4.590
UA - Ucraina 439
CN - Cina 436
IT - Italia 392
SG - Singapore 331
RU - Federazione Russa 259
VN - Vietnam 168
SE - Svezia 152
DE - Germania 151
IE - Irlanda 138
BR - Brasile 121
FI - Finlandia 92
TR - Turchia 73
KR - Corea 29
GB - Regno Unito 23
IN - India 20
CA - Canada 17
HK - Hong Kong 14
IL - Israele 12
AT - Austria 8
EU - Europa 7
NL - Olanda 7
AU - Australia 5
CH - Svizzera 5
HU - Ungheria 5
MY - Malesia 5
RO - Romania 5
DK - Danimarca 4
FR - Francia 4
JP - Giappone 4
KE - Kenya 4
MX - Messico 4
ES - Italia 3
ID - Indonesia 3
IQ - Iraq 3
NZ - Nuova Zelanda 3
RS - Serbia 3
SI - Slovenia 3
BE - Belgio 2
CO - Colombia 2
EC - Ecuador 2
EG - Egitto 2
GR - Grecia 2
IR - Iran 2
PH - Filippine 2
PL - Polonia 2
VE - Venezuela 2
AE - Emirati Arabi Uniti 1
AM - Armenia 1
AR - Argentina 1
BH - Bahrain 1
CZ - Repubblica Ceca 1
GL - Groenlandia 1
GT - Guatemala 1
JO - Giordania 1
KZ - Kazakistan 1
LT - Lituania 1
LU - Lussemburgo 1
MA - Marocco 1
PE - Perù 1
PK - Pakistan 1
PT - Portogallo 1
PY - Paraguay 1
SA - Arabia Saudita 1
TN - Tunisia 1
ZA - Sudafrica 1
Totale 7.579
Città #
Ann Arbor 1.199
Jacksonville 531
Chandler 494
Wilmington 374
Princeton 373
Woodbridge 329
Houston 239
Dong Ket 166
Dublin 137
Singapore 117
Ashburn 100
Dearborn 92
Nanjing 88
Andover 87
Beijing 84
Salerno 74
Pellezzano 71
Boardman 69
Izmir 68
Moscow 49
Shenyang 36
Mestre 35
Fairfield 34
Düsseldorf 33
Nanchang 32
New York 29
Hebei 26
Changsha 25
Silvi Marina 24
Dallas 18
Munich 18
Tianjin 17
Catania 16
Norwalk 16
Jiaxing 15
Redwood City 15
Hong Kong 14
Ottawa 13
Rome 13
Pune 12
Cambridge 10
Des Moines 10
Seattle 10
São Paulo 10
Guangzhou 9
Jinan 9
Milan 9
San Diego 9
Los Angeles 7
Rio de Janeiro 7
Rishon LeTsiyyon 7
The Dalles 7
Domicella 6
Edinburgh 6
Vienna 6
Hangzhou 5
Horia 5
London 5
Naples 5
Nuremberg 5
Spinea 5
Copenhagen 4
Council Bluffs 4
Fisciano 4
Giugliano In Campania 4
Hefei 4
Kunming 4
Nairobi 4
Sarno 4
Turin 4
Amsterdam 3
Belgrade 3
Cardiff 3
Chicago 3
Flumeri 3
Frankfurt am Main 3
Fuzhou 3
Kediri 3
Ljubljana 3
Melfi 3
Mexico City 3
Osaka 3
San Jose 3
Santa Clara 3
Solofra 3
Taizhou 3
Yubileyny 3
Zhengzhou 3
Assago 2
Athens 2
Baghdad 2
Barcelona 2
Belo Horizonte 2
Belém 2
Braço do Norte 2
Brussels 2
Cagayan de Oro 2
Cairo 2
Castellammare Di Stabia 2
Duque de Caxias 2
Totale 5.448
Nome #
Certified Information Access 123
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity 119
`Perfectly-Secure Conference Key Distribution 116
A Distributed Implementation of the Certified Information Access Service 107
Validating Orchestration of Web Services with BPEL and Aggregate Signatures 105
A Web Service Based Micro-payment System 104
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. 103
A private Intelligent Shopping Mall 102
Targeted Advertising That Protects the Privacy of Social Networks Users 101
A J2ME transparent middleware to support HTTP connections over Bluetooth 100
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. 99
New Constructions for Visual Cryptography 99
Un Sistema a Garanzia dell’Anonimato su Internet 98
A Staus-Restricted Key Agreement Scheme 98
HTTP over Bluetooth: a J2ME experience 98
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports 98
Dynamic Multi-Threshold Metering Schemes 98
Improved Security Notions and Protocols for Non-Transferable Identification 97
Certified Information Access 97
A Ramp Model for Distributed Key Distribution Schemes 97
Secure Metering Schemes 96
A Ramp Model for Distributed Key Distribution Schemes 94
A Simple Role Mining Algorithm 93
An Linear Algebraic Approach to Metering Schemes 90
A New Self-healing Key Distribution Scheme. 90
Private-Key Hidden Vector Encryption with Key Confidentiality 90
Authenticated Web-Services: A WS-Security Based Implementation 90
A Lightweight Approach to Authenticated Web Caching 89
A Plataform for Secure E-Gambling 89
A FRAMEWORK FOR AUTHENTICATED WEB SERVICES 88
Untraceable Tags based on Mild Assumptions 88
A t-Private k-Database Private Information Retrieval Scheme 87
Constrained Role Mining 86
An AmI-based and privacy-preserving shopping mall model 86
EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity 85
Hyppocrates: A New Proactive Password Checker 84
Performance evaluation of Web Services invocation over Bluetooth 83
Improved Schemes for Visual Cryptography 82
A Software Infrastructure for Authenticated Web Metering 82
On the Information Rate of Secret Sharing Schemes (Extended Abstract) 82
Visual Cryptography for Grey Levels Images 81
A T-Restricted Key Agreement Scheme 81
A LIGHTWEIGHT PROTOCOL FOR THE GENERATION AND DISTRIBUTION OF SECURE E-COUPONS 80
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios 80
A Lightweight Framework for Web Services Invocation over Bluetooth 78
Steganography Using Modern Arts 78
ncreasing Privacy Threats in the Cyberspace: the Case of Italian E-Passports 77
Web Services Invocation over Bluetooth 77
PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining 77
Visual cryptography schemes with optimal pixel expansion 76
Randomness recycling in constant-round private computations. 76
Analysis and Design of Distributed Key Distribution Centers 73
The Key Establishment Problem 73
Contrast Optimal Threshold Visual Cryptography Schemes 73
Bounds and Constructions for Metering Schemes 72
A Note on Optimal Metering Schemes 71
Un'Architettura Scalabile per Servizi di Time-Stamping 71
Secret Sharing Schemes with Veto Capabilities 71
Randomness in Self-Healing Key Distribution Schemes 70
Constructions and Bounds for Unconditionally Secure Commitment Schemes 70
The Randomness Complexity of Private Computation 70
Predicate Encryption with Partial Public Keys 70
Certified Email: Design and Implementation of a New Optimistic Protocol 69
Randomness in Multi-Secret Sharing Schemes 69
On Unconditionally Secure Distributed Oblivious Transfer. 69
On Self-healing Key Distribution Schemes. 68
Design of Self-Healing Key Distribution Schemes 68
Low-randomness constant-round private XOR computations 67
Secure E-Coupons 65
A Flaw in a Self-Healing Key Distribution Scheme 65
Hiding Information in Image Mosaics 65
A Novel Approach to Proactive Password Checking. 65
Probability of Shares in Secret Sharing Schemes 63
A Note on the Randomness in Dynamic Threshold Schemes 63
MODELING A CERTIFIED EMAIL PROTOCOL USING I/O AUTOMATA 63
Hyppocrates: A New Proactive Password Checker 62
On the Information Rate of Secret Sharing Schemes 61
On a Fallacious Bound for Authentication Codes 60
Definitions and Bounds for Self-Healing Key Distribution Schemes 59
Fourth Conference on Security in Communication Networks (SCN '04) 59
Secure Web Metering 59
A time-driven FCA-based approach for identifying students' dropout in MOOCs 59
New Bounds on the Communication Complexity of Metering Schemes 58
SAWM: A Tool for Secure and Authenticated Web Metering 57
Unconditional Secure Conference Key Distribution Schemes with Disenrollment Capability 57
On the Contrast in Visual Cryptography Schemes 57
Perfectly-Secure Key Distribution for Dynamic Conferences 57
On Secret Sharing Schemes 56
Metering Schemes with Pricing 56
An intelligent and private method to profile social network users 54
A WEB SERVICE FOR CERTIFIED EMAIL 52
PostProcessing in Constrained Role Mining 51
Extended Capabilities for Visual Cryptography 48
Managing key hierarchies for access control enforcement: Heuristic approaches. 47
Extended Schemes for Visual Cryptography 46
Innovative approaches for security of small artefacts 45
Un clinical decision support system basato su realtà aumentata per l’assistenza domiciliare dei pazienti affetti da lesioni da pressione 41
Italian Conference on Theoretical Computer Science 38
New results on unconditionally secure distributed oblivious transfer: (Extended abstract) 38
Role mining under User-Distribution cardinality constraint 35
Totale 7.629
Categoria #
all - tutte 27.337
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 27.337


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020142 0 0 0 0 0 0 0 0 0 0 127 15
2020/2021913 7 88 93 0 106 50 92 2 119 5 136 215
2021/2022666 0 0 0 6 27 16 5 31 99 92 94 296
2022/20231.133 114 80 19 143 148 248 3 119 162 2 71 24
2023/2024444 45 75 29 19 26 53 40 48 17 23 14 55
2024/2025957 72 31 40 81 34 117 213 130 166 63 10 0
Totale 7.784