BLUNDO, Carlo
 Distribuzione geografica
Continente #
AS - Asia 9.880
NA - Nord America 5.371
EU - Europa 1.868
SA - Sud America 265
AF - Africa 34
OC - Oceania 10
Continente sconosciuto - Info sul continente non disponibili 7
Totale 17.435
Nazione #
HK - Hong Kong 7.987
US - Stati Uniti d'America 5.289
SG - Singapore 842
CN - Cina 605
UA - Ucraina 440
IT - Italia 407
RU - Federazione Russa 263
BR - Brasile 227
VN - Vietnam 215
DE - Germania 195
SE - Svezia 163
IE - Irlanda 139
FI - Finlandia 105
TR - Turchia 79
GB - Regno Unito 60
CA - Canada 57
IN - India 37
KR - Corea 36
PL - Polonia 17
ZA - Sudafrica 16
IL - Israele 14
MX - Messico 14
AR - Argentina 12
NL - Olanda 12
AT - Austria 11
ES - Italia 11
JP - Giappone 11
BD - Bangladesh 9
IQ - Iraq 8
EU - Europa 7
VE - Venezuela 7
MY - Malesia 6
AU - Australia 5
CH - Svizzera 5
CO - Colombia 5
EC - Ecuador 5
FR - Francia 5
HU - Ungheria 5
ID - Indonesia 5
KE - Kenya 5
RO - Romania 5
DK - Danimarca 4
RS - Serbia 4
EG - Egitto 3
LT - Lituania 3
MA - Marocco 3
NP - Nepal 3
NZ - Nuova Zelanda 3
PK - Pakistan 3
PY - Paraguay 3
SA - Arabia Saudita 3
SI - Slovenia 3
TT - Trinidad e Tobago 3
AE - Emirati Arabi Uniti 2
BE - Belgio 2
GR - Grecia 2
IR - Iran 2
JM - Giamaica 2
JO - Giordania 2
PE - Perù 2
PH - Filippine 2
PT - Portogallo 2
TH - Thailandia 2
UY - Uruguay 2
AF - Afghanistan, Repubblica islamica di 1
AL - Albania 1
AM - Armenia 1
AZ - Azerbaigian 1
BH - Bahrain 1
BS - Bahamas 1
BY - Bielorussia 1
CG - Congo 1
CL - Cile 1
CY - Cipro 1
CZ - Repubblica Ceca 1
DM - Dominica 1
DO - Repubblica Dominicana 1
GF - Guiana Francese 1
GH - Ghana 1
GL - Groenlandia 1
GM - Gambi 1
GT - Guatemala 1
KZ - Kazakistan 1
LC - Santa Lucia 1
LU - Lussemburgo 1
MK - Macedonia 1
ML - Mali 1
MR - Mauritania 1
PF - Polinesia Francese 1
PS - Palestinian Territory 1
TN - Tunisia 1
TV - Tuvalu 1
UG - Uganda 1
Totale 17.435
Città #
Hong Kong 7.980
Ann Arbor 1.200
Jacksonville 531
Chandler 494
Singapore 375
Wilmington 374
Princeton 373
Woodbridge 329
Dallas 320
Houston 246
Ashburn 180
Dong Ket 166
Dublin 137
Beijing 111
Dearborn 92
Nanjing 89
Andover 87
Salerno 74
Pellezzano 71
Boardman 70
Izmir 68
Munich 60
New York 53
Moscow 49
Shenyang 36
Mestre 35
Fairfield 34
São Paulo 34
Düsseldorf 33
Los Angeles 32
Nanchang 32
Hebei 26
Changsha 25
Silvi Marina 24
Rome 18
Ho Chi Minh City 17
Montreal 17
The Dalles 17
Tianjin 17
Catania 16
Norwalk 16
Seattle 16
Jiaxing 15
Redwood City 15
Santa Clara 15
Warsaw 14
Guangzhou 13
Ottawa 13
Johannesburg 12
Poplar 12
Pune 12
Rio de Janeiro 12
Stockholm 12
Atlanta 11
Turku 11
Cambridge 10
Chicago 10
Council Bluffs 10
Des Moines 10
Jinan 10
London 10
Brooklyn 9
Milan 9
San Diego 9
Vienna 9
Amsterdam 8
Columbus 8
Hanoi 8
Toronto 8
Denver 7
Naples 7
Rishon LeTsiyyon 7
San Francisco 7
Turin 7
Ankara 6
Boston 6
Chennai 6
Domicella 6
Edinburgh 6
Mexico City 6
Nuremberg 6
San Jose 6
Tokyo 6
Fisciano 5
Hangzhou 5
Horia 5
Nairobi 5
New Delhi 5
Spinea 5
Baghdad 4
Belo Horizonte 4
Copenhagen 4
Da Nang 4
Frankfurt am Main 4
Giugliano In Campania 4
Hefei 4
Juneau 4
Kunming 4
Manchester 4
Miami 4
Totale 14.432
Nome #
A LIGHTWEIGHT PROTOCOL FOR THE GENERATION AND DISTRIBUTION OF SECURE E-COUPONS 1.583
A Note on Optimal Metering Schemes 934
Improved Schemes for Visual Cryptography 641
Randomness in Multi-Secret Sharing Schemes 583
Predicate Encryption with Partial Public Keys 573
Heuristics for constrained role mining in the post-processing framework 558
Role mining under User-Distribution cardinality constraint 484
Hyppocrates: A New Proactive Password Checker 373
Improved Security Notions and Protocols for Non-Transferable Identification 371
A J2ME transparent middleware to support HTTP connections over Bluetooth 362
Sequential Three-Way Decisions for Reducing Uncertainty in Dropout Prediction for Online Courses 353
A time-driven FCA-based approach for identifying students' dropout in MOOCs 348
An intelligent and private method to profile social network users 346
Web Services Invocation over Bluetooth 314
A Distributed Implementation of the Certified Information Access Service 282
The Randomness Complexity of Private Computation 243
Untraceable Tags based on Mild Assumptions 240
A WEB SERVICE FOR CERTIFIED EMAIL 228
Un Sistema a Garanzia dell’Anonimato su Internet 227
`Perfectly-Secure Conference Key Distribution 167
Private-Key Hidden Vector Encryption with Key Confidentiality 163
Certified Information Access 162
PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining 160
On the Information Rate of Secret Sharing Schemes (Extended Abstract) 138
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity 137
A New Self-healing Key Distribution Scheme. 136
Targeted Advertising That Protects the Privacy of Social Networks Users 136
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. 135
Constrained Role Mining 135
Dynamic Multi-Threshold Metering Schemes 135
Authenticated Web-Services: A WS-Security Based Implementation 134
Steganography Using Modern Arts 134
A private Intelligent Shopping Mall 133
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. 128
A t-Private k-Database Private Information Retrieval Scheme 128
A Ramp Model for Distributed Key Distribution Schemes 127
A Web Service Based Micro-payment System 127
Bounds and Constructions for Metering Schemes 125
A Staus-Restricted Key Agreement Scheme 125
Certified Information Access 122
A Lightweight Approach to Authenticated Web Caching 120
Validating Orchestration of Web Services with BPEL and Aggregate Signatures 120
A Plataform for Secure E-Gambling 119
An Linear Algebraic Approach to Metering Schemes 119
Performance evaluation of Web Services invocation over Bluetooth 119
HTTP over Bluetooth: a J2ME experience 118
A Ramp Model for Distributed Key Distribution Schemes 118
A Lightweight Framework for Web Services Invocation over Bluetooth 117
New Constructions for Visual Cryptography 115
A FRAMEWORK FOR AUTHENTICATED WEB SERVICES 115
PostProcessing in Constrained Role Mining 115
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports 112
A T-Restricted Key Agreement Scheme 110
A Simple Role Mining Algorithm 108
Secure Metering Schemes 107
An AmI-based and privacy-preserving shopping mall model 107
A Note on the Randomness in Dynamic Threshold Schemes 102
A Software Infrastructure for Authenticated Web Metering 102
Un'Architettura Scalabile per Servizi di Time-Stamping 101
Secure Web Metering 101
A Flaw in a Self-Healing Key Distribution Scheme 99
Randomness recycling in constant-round private computations. 98
Hyppocrates: A New Proactive Password Checker 97
Analysis and Design of Distributed Key Distribution Centers 96
MODELING A CERTIFIED EMAIL PROTOCOL USING I/O AUTOMATA 96
New Bounds on the Communication Complexity of Metering Schemes 96
EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity 95
Constructions and Bounds for Unconditionally Secure Commitment Schemes 93
Design of Self-Healing Key Distribution Schemes 93
Visual cryptography schemes with optimal pixel expansion 92
ncreasing Privacy Threats in the Cyberspace: the Case of Italian E-Passports 92
Visual Cryptography for Grey Levels Images 90
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios 88
A Novel Approach to Proactive Password Checking. 88
Secret Sharing Schemes with Veto Capabilities 88
Contrast Optimal Threshold Visual Cryptography Schemes 86
The Key Establishment Problem 82
Secure E-Coupons 81
On Self-healing Key Distribution Schemes. 80
Certified Email: Design and Implementation of a New Optimistic Protocol 80
Hiding Information in Image Mosaics 80
Randomness in Self-Healing Key Distribution Schemes 79
Low-randomness constant-round private XOR computations 79
On Unconditionally Secure Distributed Oblivious Transfer. 76
On the Information Rate of Secret Sharing Schemes 75
Probability of Shares in Secret Sharing Schemes 74
On a Fallacious Bound for Authentication Codes 72
On the Contrast in Visual Cryptography Schemes 70
Metering Schemes with Pricing 68
Fourth Conference on Security in Communication Networks (SCN '04) 68
Definitions and Bounds for Self-Healing Key Distribution Schemes 66
SAWM: A Tool for Secure and Authenticated Web Metering 66
Unconditional Secure Conference Key Distribution Schemes with Disenrollment Capability 65
Perfectly-Secure Key Distribution for Dynamic Conferences 63
On Secret Sharing Schemes 62
Un clinical decision support system basato su realtà aumentata per l’assistenza domiciliare dei pazienti affetti da lesioni da pressione 61
New results on unconditionally secure distributed oblivious transfer: (Extended abstract) 58
Managing key hierarchies for access control enforcement: Heuristic approaches. 55
Extended Schemes for Visual Cryptography 54
Extended Capabilities for Visual Cryptography 54
Totale 17.330
Categoria #
all - tutte 45.295
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 45.295


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021619 0 0 0 0 0 50 92 2 119 5 136 215
2021/2022666 0 0 0 6 27 16 5 31 99 92 94 296
2022/20231.133 114 80 19 143 148 248 3 119 162 2 71 24
2023/2024444 45 75 29 19 26 53 40 48 17 23 14 55
2024/20251.270 72 31 40 81 34 117 213 130 166 63 141 182
2025/20269.544 2.061 3.374 3.105 303 640 61 0 0 0 0 0 0
Totale 17.641