D'ARCO, Paolo
 Distribuzione geografica
Continente #
NA - Nord America 2.894
EU - Europa 912
AS - Asia 408
OC - Oceania 5
Continente sconosciuto - Info sul continente non disponibili 4
SA - Sud America 2
Totale 4.225
Nazione #
US - Stati Uniti d'America 2.883
IT - Italia 335
UA - Ucraina 223
CN - Cina 216
VN - Vietnam 120
SE - Svezia 93
IE - Irlanda 83
DE - Germania 73
TR - Turchia 54
FI - Finlandia 48
GB - Regno Unito 11
IN - India 10
CA - Canada 9
RU - Federazione Russa 8
RO - Romania 7
CH - Svizzera 4
EU - Europa 4
FR - Francia 4
LT - Lituania 4
PH - Filippine 4
RS - Serbia 4
AT - Austria 3
DK - Danimarca 3
NZ - Nuova Zelanda 3
AU - Australia 2
BR - Brasile 2
JP - Giappone 2
NL - Olanda 2
PL - Polonia 2
BE - Belgio 1
BG - Bulgaria 1
ES - Italia 1
GL - Groenlandia 1
IL - Israele 1
KZ - Kazakistan 1
LU - Lussemburgo 1
MD - Moldavia 1
MX - Messico 1
Totale 4.225
Città #
Ann Arbor 842
Chandler 337
Jacksonville 284
Woodbridge 259
Princeton 245
Houston 189
Wilmington 153
Dong Ket 120
Salerno 87
Dublin 83
Nanjing 62
Izmir 54
Silvi Marina 53
Andover 47
Ashburn 45
Beijing 45
Boardman 44
Dearborn 40
Pellezzano 37
Nanchang 20
Hebei 16
Shenyang 16
Düsseldorf 14
Fairfield 13
Jiaxing 13
Changsha 12
Rome 12
Norwalk 10
Tianjin 10
Alzate Brianza 9
Giugliano In Campania 9
Pune 9
Battipaglia 8
Chicago 8
San Diego 8
Cambridge 7
New York 7
Ottawa 7
Redwood City 5
Sorrento 5
Acerra 4
Fisciano 4
Horia 4
Naples 4
Seattle 4
Trento 4
Vilnius 4
Zurich 4
Belgrade 3
Des Moines 3
Edinburgh 3
Indiana 3
Jinan 3
Mestre 3
Milan 3
Orange 3
Pisa 3
Torino 3
Vienna 3
Auckland 2
Berlin 2
Dallas 2
Hefei 2
Kunming 2
Miami 2
Moscow 2
Napoli 2
Rho 2
Washington 2
Adelaide 1
Aiello Del Sabato 1
Alvignano 1
Amsterdam 1
Bacoli 1
Barcena de Pie de Concha 1
Beograd 1
Biarritz 1
Brussels 1
Capannori 1
Catania 1
Chaoyang 1
Chisinau 1
Christchurch 1
Copenhagen 1
Dormagen 1
Etobicoke 1
Galdo 1
Guangzhou 1
Guidonia 1
Haikou 1
Hanover 1
Helsinki 1
Honkomagome 1
Lappeenranta 1
London 1
Luxembourg 1
Melbourne 1
Mexico City 1
Munich 1
Naaldwijk 1
Totale 3.360
Nome #
Introduzione alla teoria della computazione 129
Secure group communication schemes for dynamic heterogeneous distributed computing 120
Anonymous protocols: Notions and equivalence 115
Weaknesses in a Recent Ultra-lightweight RFID Authentication Protocol. 106
Semi-Destructive Privacy in RFID Systems. 96
An Information Theoretic Model for Distributed Key Distribution. 95
Variations on a Theme by Akl and Taylor: Security and Tradeoffs 95
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. 93
Security of Public Key Cryptosystems based on Chebyshev Polynomials. 89
Secure Two-Party Computation: A Visual Way 89
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. 88
Optimising SD and LSD in presence of non-uniform probabilities of revocation. 87
A Ramp Model for Distributed Key Distribution Schemes 86
An Almost-Optimal Forward-Private Rfid Mutual Authentication Protocol with Tag Control 86
Revisiting DoS Attacks and Privacy in RFID-Enabled Networks 85
Fighting Pirates 2.0 85
A Staus-Restricted Key Agreement Scheme 84
Security and Tradeoffs of the Akl-Taylor Scheme and its Variants 82
Anonymous Group Communication in Mobile Networks (Extended Abstract) 81
A Ramp Model for Distributed Key Distribution Schemes 79
A New Self-healing Key Distribution Scheme. 78
Size-hiding in private set intersection: existential results and constructions 78
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes 78
Hyppocrates: A New Proactive Password Checker 74
Secure computation without computers 74
A t-Private k-Database Private Information Retrieval Scheme 73
Neural Network Techniques for Proactive Password Checking. 73
Key Privacy and Anonymous Protocols 73
On Ultralightweight RFID Authentication Protocols 72
The Key Establishment Problem 69
Properties and Constraints of Cheating-Immune Secret Sharing Scheme. 67
Generalized Zig-zag Functions and Oblivious Transfer Reductions. 67
Contrast Optimal Threshold Visual Cryptography Schemes 67
A T-Restricted Key Agreement Scheme 66
Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography 66
Towards tracing and revoking schemes secure against collusion and any form of secret information leakage 65
Fault Tolerant and Distributed Broadcast Encryption 64
On Cheating-Immune Secret Sharing. 64
A Unified Model for Unconditionally Secure Key Distribution. 63
On Unconditionally Secure Distributed Oblivious Transfer. 63
Design of Self-Healing Key Distribution Schemes 63
All or nothing at all 62
Analysis and Design of Distributed Key Distribution Centers 61
On Self-healing Key Distribution Schemes. 58
Measure-independent characterization of contrast optimal visual cryptography schemes 57
On Unconditionally Secure Robust Distributed Key Distribution Centers 56
On the Distribution of a Key Distribution Center. 55
Hyppocrates: A New Proactive Password Checker 55
Definitions and Bounds for Self-Healing Key Distribution Schemes 53
A Flaw in a Self-Healing Key Distribution Scheme 53
A Novel Approach to Proactive Password Checking. 50
Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols 47
Visual Cryptography: Models, Issues, Applications and New Directions 46
An efficient and reliable two-level lightweight authentication protocol 41
Secret Disclosure Attacks on a Recent Ultralightweight Mutual RFID Authentication Protocol for Blockchain-Enabled Supply Chains 34
Probabilistic secret sharing 32
On the equivalence of 2-threshold secret sharing schemes and prefix codes 31
Ultralightweight Cryptography - Some Thoughts on Ten Years of Efforts 30
On (Multi-stage) Proof-of-Works 30
New results on unconditionally secure distributed oblivious transfer: (Extended abstract) 29
Secret sharing schemes for infinite sets of participants: A new design technique 28
Private set intersection: New generic constructions and feasibility results 23
Ultra-lightweight Authentication 23
Blockchain and Applications - 3rd International Congress, BLOCKCHAIN 2021 21
A New Instance of a Lightweight Authentication Protocol Based on the LPN Problem. 18
On Pseudorandomness and Deep Learning: A Case Study 15
Gossamer: weaknesses and performance 14
Security Attacks on Multi-Stage Proof-of-Work 9
Multi-stage Proof-of-Works: Properties and vulnerabilities 1
Totale 4.359
Categoria #
all - tutte 11.363
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 11.363


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/201995 0 0 0 0 0 0 0 0 0 18 72 5
2019/2020526 148 12 61 13 52 13 64 6 48 22 76 11
2020/2021526 7 49 46 2 52 29 48 3 58 5 76 151
2021/2022464 5 4 3 12 19 10 9 30 54 59 66 193
2022/2023781 77 50 14 101 102 171 8 76 123 2 42 15
2023/2024192 25 43 11 20 12 32 19 10 7 13 0 0
Totale 4.359