BLUNDO, Carlo
 Distribuzione geografica
Continente #
AS - Asia 9.301
NA - Nord America 5.131
EU - Europa 1.821
SA - Sud America 212
AF - Africa 25
OC - Oceania 10
Continente sconosciuto - Info sul continente non disponibili 7
Totale 16.507
Nazione #
HK - Hong Kong 7.982
US - Stati Uniti d'America 5.075
CN - Cina 518
UA - Ucraina 440
SG - Singapore 430
IT - Italia 404
RU - Federazione Russa 260
BR - Brasile 197
DE - Germania 194
VN - Vietnam 176
SE - Svezia 156
IE - Irlanda 139
FI - Finlandia 105
TR - Turchia 75
GB - Regno Unito 45
CA - Canada 39
KR - Corea 34
IN - India 29
IL - Israele 12
PL - Polonia 10
ES - Italia 9
NL - Olanda 9
ZA - Sudafrica 9
AT - Austria 8
MX - Messico 8
EU - Europa 7
BD - Bangladesh 6
JP - Giappone 6
AU - Australia 5
CH - Svizzera 5
FR - Francia 5
HU - Ungheria 5
KE - Kenya 5
MY - Malesia 5
RO - Romania 5
DK - Danimarca 4
IQ - Iraq 4
RS - Serbia 4
CO - Colombia 3
EC - Ecuador 3
ID - Indonesia 3
NZ - Nuova Zelanda 3
SA - Arabia Saudita 3
SI - Slovenia 3
AR - Argentina 2
BE - Belgio 2
EG - Egitto 2
GR - Grecia 2
IR - Iran 2
JO - Giordania 2
MA - Marocco 2
PH - Filippine 2
PK - Pakistan 2
PT - Portogallo 2
PY - Paraguay 2
TH - Thailandia 2
TT - Trinidad e Tobago 2
VE - Venezuela 2
AE - Emirati Arabi Uniti 1
AF - Afghanistan, Repubblica islamica di 1
AL - Albania 1
AM - Armenia 1
BH - Bahrain 1
BS - Bahamas 1
CG - Congo 1
CL - Cile 1
CY - Cipro 1
CZ - Repubblica Ceca 1
DM - Dominica 1
DO - Repubblica Dominicana 1
GF - Guiana Francese 1
GH - Ghana 1
GL - Groenlandia 1
GM - Gambi 1
GT - Guatemala 1
JM - Giamaica 1
KZ - Kazakistan 1
LC - Santa Lucia 1
LT - Lituania 1
LU - Lussemburgo 1
MK - Macedonia 1
ML - Mali 1
MR - Mauritania 1
NP - Nepal 1
PE - Perù 1
PF - Polinesia Francese 1
PS - Palestinian Territory 1
TN - Tunisia 1
TV - Tuvalu 1
UG - Uganda 1
Totale 16.507
Città #
Hong Kong 7.975
Ann Arbor 1.200
Jacksonville 531
Chandler 494
Wilmington 374
Princeton 373
Woodbridge 329
Dallas 317
Houston 239
Dong Ket 166
Singapore 162
Dublin 137
Ashburn 121
Dearborn 92
Beijing 90
Nanjing 88
Andover 87
Salerno 74
Pellezzano 71
Boardman 70
Izmir 68
Munich 60
Moscow 49
New York 41
Shenyang 36
Mestre 35
Fairfield 34
Düsseldorf 33
Nanchang 32
Hebei 26
Changsha 25
Silvi Marina 24
São Paulo 21
Rome 17
The Dalles 17
Tianjin 17
Catania 16
Norwalk 16
Jiaxing 15
Los Angeles 15
Redwood City 15
Seattle 14
Ottawa 13
Guangzhou 12
Pune 12
Rio de Janeiro 12
Turku 11
Cambridge 10
Council Bluffs 10
Des Moines 10
Jinan 9
London 9
Milan 9
San Diego 9
Santa Clara 9
Warsaw 9
Brooklyn 8
Columbus 8
Chicago 7
Naples 7
Rishon LeTsiyyon 7
San Francisco 7
Atlanta 6
Domicella 6
Edinburgh 6
Johannesburg 6
Nuremberg 6
Vienna 6
Amsterdam 5
Boston 5
Fisciano 5
Hangzhou 5
Horia 5
Montreal 5
Nairobi 5
Spinea 5
Stockholm 5
Turin 5
Copenhagen 4
Giugliano In Campania 4
Hefei 4
Ho Chi Minh City 4
Kunming 4
Miami 4
New Delhi 4
San Jose 4
Sarno 4
Toronto 4
Barcelona 3
Belgrade 3
Belo Horizonte 3
Belém 3
Cardiff 3
Chennai 3
Flumeri 3
Fortaleza 3
Frankfurt am Main 3
Fuzhou 3
Kediri 3
Ljubljana 3
Totale 13.966
Nome #
A LIGHTWEIGHT PROTOCOL FOR THE GENERATION AND DISTRIBUTION OF SECURE E-COUPONS 1.572
A Note on Optimal Metering Schemes 926
Improved Schemes for Visual Cryptography 638
Randomness in Multi-Secret Sharing Schemes 578
Predicate Encryption with Partial Public Keys 563
Heuristics for constrained role mining in the post-processing framework 543
Role mining under User-Distribution cardinality constraint 473
Improved Security Notions and Protocols for Non-Transferable Identification 368
Hyppocrates: A New Proactive Password Checker 366
A J2ME transparent middleware to support HTTP connections over Bluetooth 345
An intelligent and private method to profile social network users 338
Sequential Three-Way Decisions for Reducing Uncertainty in Dropout Prediction for Online Courses 335
A time-driven FCA-based approach for identifying students' dropout in MOOCs 331
Web Services Invocation over Bluetooth 308
A Distributed Implementation of the Certified Information Access Service 264
The Randomness Complexity of Private Computation 241
Untraceable Tags based on Mild Assumptions 237
Un Sistema a Garanzia dell’Anonimato su Internet 222
A WEB SERVICE FOR CERTIFIED EMAIL 212
`Perfectly-Secure Conference Key Distribution 153
Private-Key Hidden Vector Encryption with Key Confidentiality 152
Certified Information Access 150
PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining 150
On the Information Rate of Secret Sharing Schemes (Extended Abstract) 135
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity 130
Steganography Using Modern Arts 128
Targeted Advertising That Protects the Privacy of Social Networks Users 125
Dynamic Multi-Threshold Metering Schemes 124
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. 120
Constrained Role Mining 120
A Web Service Based Micro-payment System 118
A private Intelligent Shopping Mall 118
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. 116
HTTP over Bluetooth: a J2ME experience 116
Bounds and Constructions for Metering Schemes 115
Certified Information Access 115
Authenticated Web-Services: A WS-Security Based Implementation 115
Validating Orchestration of Web Services with BPEL and Aggregate Signatures 114
Performance evaluation of Web Services invocation over Bluetooth 112
A Staus-Restricted Key Agreement Scheme 111
An Linear Algebraic Approach to Metering Schemes 110
A Ramp Model for Distributed Key Distribution Schemes 110
New Constructions for Visual Cryptography 108
A New Self-healing Key Distribution Scheme. 108
A t-Private k-Database Private Information Retrieval Scheme 107
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports 107
A Lightweight Approach to Authenticated Web Caching 106
A Ramp Model for Distributed Key Distribution Schemes 106
Secure Metering Schemes 103
A FRAMEWORK FOR AUTHENTICATED WEB SERVICES 101
A Lightweight Framework for Web Services Invocation over Bluetooth 100
A Plataform for Secure E-Gambling 100
Secure Web Metering 100
An AmI-based and privacy-preserving shopping mall model 98
PostProcessing in Constrained Role Mining 98
Un'Architettura Scalabile per Servizi di Time-Stamping 97
A Simple Role Mining Algorithm 97
Randomness recycling in constant-round private computations. 95
A Software Infrastructure for Authenticated Web Metering 94
A T-Restricted Key Agreement Scheme 94
Hyppocrates: A New Proactive Password Checker 93
New Bounds on the Communication Complexity of Metering Schemes 91
EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity 90
Visual cryptography schemes with optimal pixel expansion 88
ncreasing Privacy Threats in the Cyberspace: the Case of Italian E-Passports 87
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios 86
Visual Cryptography for Grey Levels Images 85
Secret Sharing Schemes with Veto Capabilities 85
Design of Self-Healing Key Distribution Schemes 85
Analysis and Design of Distributed Key Distribution Centers 84
Constructions and Bounds for Unconditionally Secure Commitment Schemes 83
MODELING A CERTIFIED EMAIL PROTOCOL USING I/O AUTOMATA 83
A Note on the Randomness in Dynamic Threshold Schemes 79
A Novel Approach to Proactive Password Checking. 79
Contrast Optimal Threshold Visual Cryptography Schemes 79
Secure E-Coupons 78
The Key Establishment Problem 77
Certified Email: Design and Implementation of a New Optimistic Protocol 77
A Flaw in a Self-Healing Key Distribution Scheme 77
On Self-healing Key Distribution Schemes. 76
Randomness in Self-Healing Key Distribution Schemes 76
Hiding Information in Image Mosaics 75
Low-randomness constant-round private XOR computations 74
On Unconditionally Secure Distributed Oblivious Transfer. 74
On the Information Rate of Secret Sharing Schemes 71
Probability of Shares in Secret Sharing Schemes 69
On the Contrast in Visual Cryptography Schemes 68
Fourth Conference on Security in Communication Networks (SCN '04) 66
On a Fallacious Bound for Authentication Codes 63
Metering Schemes with Pricing 62
Definitions and Bounds for Self-Healing Key Distribution Schemes 62
SAWM: A Tool for Secure and Authenticated Web Metering 62
Unconditional Secure Conference Key Distribution Schemes with Disenrollment Capability 62
On Secret Sharing Schemes 60
Perfectly-Secure Key Distribution for Dynamic Conferences 58
Managing key hierarchies for access control enforcement: Heuristic approaches. 52
New results on unconditionally secure distributed oblivious transfer: (Extended abstract) 52
Extended Capabilities for Visual Cryptography 51
Un clinical decision support system basato su realtà aumentata per l’assistenza domiciliare dei pazienti affetti da lesioni da pressione 50
Extended Schemes for Visual Cryptography 49
Totale 16.454
Categoria #
all - tutte 42.423
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 42.423


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021725 0 0 0 0 106 50 92 2 119 5 136 215
2021/2022666 0 0 0 6 27 16 5 31 99 92 94 296
2022/20231.133 114 80 19 143 148 248 3 119 162 2 71 24
2023/2024444 45 75 29 19 26 53 40 48 17 23 14 55
2024/20251.270 72 31 40 81 34 117 213 130 166 63 141 182
2025/20268.616 2.061 3.374 3.105 76 0 0 0 0 0 0 0 0
Totale 16.713