D'ARCO, Paolo
 Distribuzione geografica
Continente #
NA - Nord America 3.132
AS - Asia 2.249
EU - Europa 1.173
SA - Sud America 175
OC - Oceania 16
AF - Africa 14
Continente sconosciuto - Info sul continente non disponibili 4
Totale 6.763
Nazione #
US - Stati Uniti d'America 3.106
HK - Hong Kong 1.445
IT - Italia 381
SG - Singapore 281
CN - Cina 258
UA - Ucraina 224
BR - Brasile 164
RU - Federazione Russa 144
VN - Vietnam 123
DE - Germania 111
SE - Svezia 93
IE - Irlanda 83
TR - Turchia 60
FI - Finlandia 59
GB - Regno Unito 22
KR - Corea 22
IN - India 19
CA - Canada 18
AU - Australia 13
AT - Austria 7
JP - Giappone 7
NL - Olanda 7
RO - Romania 7
IQ - Iraq 6
FR - Francia 5
MA - Marocco 5
PL - Polonia 5
BD - Bangladesh 4
CH - Svizzera 4
EC - Ecuador 4
ES - Italia 4
EU - Europa 4
LT - Lituania 4
PH - Filippine 4
PK - Pakistan 4
PY - Paraguay 4
RS - Serbia 4
ZA - Sudafrica 4
AR - Argentina 3
DK - Danimarca 3
MX - Messico 3
NZ - Nuova Zelanda 3
BG - Bulgaria 2
HN - Honduras 2
IL - Israele 2
JO - Giordania 2
KE - Kenya 2
OM - Oman 2
AE - Emirati Arabi Uniti 1
AM - Armenia 1
BE - Belgio 1
BH - Bahrain 1
BM - Bermuda 1
CI - Costa d'Avorio 1
DZ - Algeria 1
GL - Groenlandia 1
KZ - Kazakistan 1
LB - Libano 1
LK - Sri Lanka 1
LU - Lussemburgo 1
MD - Moldavia 1
MN - Mongolia 1
NP - Nepal 1
PT - Portogallo 1
SA - Arabia Saudita 1
TN - Tunisia 1
TT - Trinidad e Tobago 1
UZ - Uzbekistan 1
Totale 6.763
Città #
Hong Kong 1.440
Ann Arbor 842
Chandler 337
Jacksonville 284
Woodbridge 259
Princeton 245
Houston 189
Wilmington 153
Dong Ket 120
Dallas 106
Singapore 98
Salerno 87
Dublin 83
Nanjing 62
Ashburn 59
Izmir 54
Silvi Marina 53
Beijing 52
Andover 47
Boardman 46
Dearborn 40
Pellezzano 37
Moscow 36
Munich 32
Nanchang 20
Fisciano 17
Hebei 16
New York 16
Shenyang 16
Düsseldorf 14
Rome 14
Fairfield 13
Jiaxing 13
Changsha 12
São Paulo 12
Newcastle 10
Norwalk 10
Tianjin 10
Alzate Brianza 9
Chicago 9
Giugliano In Campania 9
Los Angeles 9
Naples 9
Pune 9
Rio de Janeiro 9
Turku 9
Battipaglia 8
San Diego 8
Trento 8
Cambridge 7
Ottawa 7
Santa Clara 6
The Dalles 6
Tokyo 6
Vienna 6
Amsterdam 5
Redwood City 5
Sorrento 5
Acerra 4
Columbus 4
Edinburgh 4
Horia 4
London 4
Nuremberg 4
Porto Alegre 4
San Francisco 4
Sarno 4
Seattle 4
Vilnius 4
Zurich 4
Ankara 3
Baghdad 3
Belgrade 3
Belo Horizonte 3
Charlotte 3
Council Bluffs 3
Curitiba 3
Des Moines 3
Domicella 3
Duque de Caxias 3
Guangzhou 3
Guarulhos 3
Haiphong 3
Indiana 3
Jinan 3
Johannesburg 3
Mestre 3
Miami 3
Milan 3
Monte Urano 3
Orange 3
Pisa 3
São Luís 3
Torino 3
Warsaw 3
Amman 2
Atlanta 2
Auckland 2
Berlin 2
Boston 2
Totale 5.236
Nome #
Variations on a Theme by Akl and Taylor: Security and Tradeoffs 907
Security and Tradeoffs of the Akl-Taylor Scheme and its Variants 278
Revisiting DoS Attacks and Privacy in RFID-Enabled Networks 259
Hyppocrates: A New Proactive Password Checker 253
Secure group communication schemes for dynamic heterogeneous distributed computing 208
Introduzione alla teoria della computazione 148
Anonymous protocols: Notions and equivalence 131
An Information Theoretic Model for Distributed Key Distribution. 128
All or nothing at all 118
Weaknesses in a Recent Ultra-lightweight RFID Authentication Protocol. 112
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. 112
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. 111
Anonymous Group Communication in Mobile Networks (Extended Abstract) 111
Semi-Destructive Privacy in RFID Systems. 108
An Almost-Optimal Forward-Private Rfid Mutual Authentication Protocol with Tag Control 108
A Ramp Model for Distributed Key Distribution Schemes 106
A Staus-Restricted Key Agreement Scheme 105
A Ramp Model for Distributed Key Distribution Schemes 101
Secure Two-Party Computation: A Visual Way 101
A New Self-healing Key Distribution Scheme. 100
A t-Private k-Database Private Information Retrieval Scheme 99
Security of Public Key Cryptosystems based on Chebyshev Polynomials. 99
Size-hiding in private set intersection: existential results and constructions 97
Fighting Pirates 2.0 96
Optimising SD and LSD in presence of non-uniform probabilities of revocation. 94
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes 92
A T-Restricted Key Agreement Scheme 89
Secure computation without computers 89
Hyppocrates: A New Proactive Password Checker 88
Neural Network Techniques for Proactive Password Checking. 83
A Unified Model for Unconditionally Secure Key Distribution. 82
Properties and Constraints of Cheating-Immune Secret Sharing Scheme. 81
Key Privacy and Anonymous Protocols 81
Analysis and Design of Distributed Key Distribution Centers 80
Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography 79
Towards tracing and revoking schemes secure against collusion and any form of secret information leakage 78
Contrast Optimal Threshold Visual Cryptography Schemes 78
On Ultralightweight RFID Authentication Protocols 77
The Key Establishment Problem 75
Fault Tolerant and Distributed Broadcast Encryption 74
Generalized Zig-zag Functions and Oblivious Transfer Reductions. 74
On Unconditionally Secure Distributed Oblivious Transfer. 74
On Self-healing Key Distribution Schemes. 73
Measure-independent characterization of contrast optimal visual cryptography schemes 73
Design of Self-Healing Key Distribution Schemes 73
A Flaw in a Self-Healing Key Distribution Scheme 72
A Novel Approach to Proactive Password Checking. 72
On Cheating-Immune Secret Sharing. 69
On Unconditionally Secure Robust Distributed Key Distribution Centers 69
An efficient and reliable two-level lightweight authentication protocol 69
On the Distribution of a Key Distribution Center. 67
Definitions and Bounds for Self-Healing Key Distribution Schemes 61
Visual Cryptography: Models, Issues, Applications and New Directions 58
Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols 55
New results on unconditionally secure distributed oblivious transfer: (Extended abstract) 47
On the equivalence of 2-threshold secret sharing schemes and prefix codes 45
Probabilistic secret sharing 44
Secret Disclosure Attacks on a Recent Ultralightweight Mutual RFID Authentication Protocol for Blockchain-Enabled Supply Chains 44
Blockchain and Applications - 3rd International Congress, BLOCKCHAIN 2021 43
Private set intersection: New generic constructions and feasibility results 42
A New Instance of a Lightweight Authentication Protocol Based on the LPN Problem. 41
On (Multi-stage) Proof-of-Works 41
Secret sharing schemes for infinite sets of participants: A new design technique 40
Ultralightweight Cryptography - Some Thoughts on Ten Years of Efforts 38
Ultra-lightweight Authentication 35
On Pseudorandomness and Deep Learning: A Case Study 30
Security Attacks on Multi-Stage Proof-of-Work 27
Gossamer: weaknesses and performance 27
Efficient and reliable post-quantum authentication 25
Private computations on set intersection 24
Constructions and lower bounds for evolving 2-threshold secret sharing schemes 18
Multi-stage Proof-of-Works: Properties and vulnerabilities 14
Totale 6.900
Categoria #
all - tutte 22.106
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 22.106


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021519 0 49 46 2 52 29 48 3 58 5 76 151
2021/2022464 5 4 3 12 19 10 9 30 54 59 66 193
2022/2023781 77 50 14 101 102 171 8 76 123 2 42 15
2023/2024282 25 43 11 20 12 32 19 10 7 15 23 65
2024/2025797 43 17 18 71 24 66 91 89 153 50 99 76
2025/20261.654 916 738 0 0 0 0 0 0 0 0 0 0
Totale 6.900