CATUOGNO, Luigi
 Distribuzione geografica
Continente #
NA - Nord America 2.528
EU - Europa 394
AS - Asia 314
Continente sconosciuto - Info sul continente non disponibili 3
SA - Sud America 2
AF - Africa 1
Totale 3.242
Nazione #
US - Stati Uniti d'America 2.500
CN - Cina 165
IT - Italia 137
UA - Ucraina 110
TR - Turchia 76
IE - Irlanda 69
VN - Vietnam 60
SE - Svezia 29
CA - Canada 28
DE - Germania 20
FI - Finlandia 15
IN - India 6
RU - Federazione Russa 4
EU - Europa 3
AR - Argentina 2
CZ - Repubblica Ceca 2
FR - Francia 2
GB - Regno Unito 2
GR - Grecia 2
HK - Hong Kong 2
SA - Arabia Saudita 2
DZ - Algeria 1
ID - Indonesia 1
IR - Iran 1
NL - Olanda 1
NP - Nepal 1
PL - Polonia 1
Totale 3.242
Città #
Ann Arbor 815
Woodbridge 332
Wilmington 297
Chandler 200
Princeton 162
Jacksonville 160
Houston 159
Izmir 71
Dublin 69
Dong Ket 60
Nanjing 56
Beijing 42
Salerno 39
Ashburn 38
Pellezzano 36
Boardman 32
Andover 31
Ottawa 27
Fairfield 15
Hebei 12
New York 11
Shenyang 10
Jiaxing 9
Nanchang 9
Norwalk 9
Changsha 7
Guangzhou 6
Redwood City 6
Silvi Marina 6
Dearborn 5
Tianjin 5
Cambridge 4
Mestre 4
Naples 4
San Diego 4
Sanayi 4
Washington 4
Benevento 3
Düsseldorf 3
Los Angeles 3
Redmond 3
Rome 3
Falls Church 2
Hanover 2
Hong Kong 2
Jeddah 2
Jinan 2
Menlo Park 2
Moscow 2
Zárate 2
Amsterdam 1
Bologna 1
Brno 1
Buffalo 1
Columbia 1
Dormagen 1
Ealing 1
Eboli 1
Esslingen am Neckar 1
Indiana 1
Istanbul 1
Jakarta 1
Kathmandu 1
Lanzhou 1
Lappeenranta 1
Marano Di Napoli 1
Milan 1
Moncton 1
Mumbai 1
Napoli 1
Nettuno 1
New Delhi 1
Nuremberg 1
Pagani 1
Plano 1
Potenza 1
Prague 1
Pune 1
Salai 1
Seattle 1
Secaucus 1
Shanghai 1
Simi Valley 1
Spinea 1
Stockholm 1
Taiyuan 1
Tappahannock 1
Tizi Ouzou 1
Torino 1
Vico Equense 1
Warsaw 1
Xian 1
Zhengzhou 1
Totale 2.834
Nome #
A secure file sharing service for distributed computing environments 129
Guaranteeing dependency enforcement in software updates 118
Analysis of a two-factor graphical password scheme 117
An Architecture for Kernel-Level Verification of Executables at Run Time 104
Applying WBEM to heterogeneous TLC Network Management: an evaluation 102
Reliable Voice-Based Transactions over VoIP Communications 97
SmartK: Smart Cards in Operating Systems at Kernel Level 96
A honeypot system with honeyword-driven fake interactive sessions 95
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices 94
The Design and Implementation of a Transparent Cryptographic File System for UNIX 93
Reliable Accounting in Grid Economic Transactions 92
Interoperability between federated authentication systems 92
Achieving interoperability between federated identity management systems: A case of study 90
Ensuring non-repudiation in human conversations over VoIP communications 90
Reliable Accounting in Grids 89
Virtual lab: A concrete experience in building multi-purpose virtualized labs for Computer Science Education 89
Securing Operating System Services Based on Smart Cards 88
A trusted versioning file system for passive mobile storage devices 88
Trusted virtual domains: Color your network 86
Flexible and robust Enterprise Right Management 82
iToken: a Wireless Smart Card Reader which Provides Handhelds with Desk Top Equivalent Security 81
On the security of a two-factor authentication scheme 79
An Implementation of Interoperable Security Features for a Smart Card enabled VoIP Softphone 76
The Dark Side of the Interconnection: Security and Privacy in the Web of Things 76
On asynchronous enforcement of security policies in 'Nomadic' storage facilities 75
PITO: A children-friendly interface for security tools 72
Towards the design of a film-based graphical password scheme 72
A Lightweight Security Model for WBEM 69
Ensuring Application Integrity: A Survey on Techniques and Tools 69
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code 67
On user authentication by means of video events recognition 67
Graphical Passwords 64
TRUST: TRust Unguarded Service Terminals 64
Implementation of Interoperable Security Features for a Smart Card enabled VoIP Softphone 61
An internet role-game for the laboratory of a network security course 60
On the Evaluation of Security Properties of Containerized Systems 50
Trusted virtual domains - Design, implementation and lessons learned 46
Transparent Mobile Storage Protection in Trusted Virtual Domains 46
An Enterprise Rights Management System for On-the-Field Maintenance Facilities 38
Measuring the effectiveness of containerization to prevent power draining attacks 36
Secure Dependency Enforcement in Package Management Systems 34
An Effective Methodology for Measuring Software Resource Usage 33
On Tracking Ransomware on the File System 29
A Fine-grained general purpose secure storage facility for trusted execution environment 28
Improving Interoperability in Multi-domain Enterprise Right Management Applications 28
Off-line enterprise rights management leveraging biometric key binding and secure hardware 26
Totale 3.377
Categoria #
all - tutte 8.324
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 8.324


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/201991 0 0 0 0 0 0 0 0 0 0 90 1
2019/2020340 114 1 37 2 15 7 18 8 23 24 69 22
2020/2021305 7 18 22 0 44 10 33 1 67 8 25 70
2021/2022279 1 1 0 3 1 5 8 12 39 39 50 120
2022/2023475 50 41 9 58 58 106 2 33 83 2 16 17
2023/2024127 20 24 11 8 8 13 16 14 2 8 3 0
Totale 3.377