ATENIESE, GIUSEPPE
 Distribuzione geografica
Continente #
NA - Nord America 3.200
EU - Europa 589
AS - Asia 389
SA - Sud America 12
AF - Africa 4
Totale 4.194
Nazione #
US - Stati Uniti d'America 3.176
IT - Italia 203
SG - Singapore 145
IN - India 136
FI - Finlandia 111
CN - Cina 90
SE - Svezia 85
UA - Ucraina 58
GB - Regno Unito 35
DE - Germania 33
CA - Canada 20
RO - Romania 16
RU - Federazione Russa 12
IE - Irlanda 11
AR - Argentina 8
BG - Bulgaria 8
AT - Austria 7
JP - Giappone 5
MX - Messico 4
CL - Cile 3
ID - Indonesia 3
NL - Olanda 3
AE - Emirati Arabi Uniti 2
CH - Svizzera 2
HK - Hong Kong 2
PT - Portogallo 2
SA - Arabia Saudita 2
SC - Seychelles 2
TR - Turchia 2
AD - Andorra 1
BE - Belgio 1
BR - Brasile 1
FR - Francia 1
MY - Malesia 1
PK - Pakistan 1
TG - Togo 1
ZA - Sudafrica 1
Totale 4.194
Città #
Fairfield 625
Woodbridge 264
Seattle 248
Ashburn 240
Houston 220
Cambridge 193
Wilmington 191
Santa Clara 168
Chandler 158
Princeton 109
Singapore 107
Rome 82
Ann Arbor 77
Beijing 75
Plano 75
San Paolo di Civitate 75
Millbury 44
Helsinki 40
Lawrence 38
San Diego 34
Andover 26
Southend 26
Jacksonville 20
Des Moines 17
Toronto 15
Boston 14
Norwalk 13
Falkenstein 12
San Mateo 12
Dublin 11
Hoboken 11
Moscow 10
Federal 8
New York 8
Sofia 8
Corbetta 6
Klagenfurt 6
Redwood City 6
Dearborn 5
Delhi 5
Indiana 5
Ottawa 5
Bühl 4
Jersey City 4
Mannheim 4
Mexico City 4
Milan 4
San Jose 4
Falls Church 3
Florence 3
Jakarta 3
Phoenix 3
Arlington 2
Berlin 2
Bern 2
Buffalo 2
Dubai 2
Guangzhou 2
Hefei 2
Hounslow 2
Istanbul 2
Las Vegas 2
Laurel 2
London 2
Prescot 2
Pune 2
Redmond 2
San Giorgio a Cremano 2
San Nicola la Strada 2
Sant'antimo 2
Sora 2
Vienna 2
Vila Real 2
White Bear Lake 2
Acton 1
Andorra la Vella 1
Arnsberg 1
Bisignano 1
Bremen 1
Breukelen 1
Brussels 1
Campobasso 1
Canton 1
Central 1
Chengdu 1
Ercolano 1
Frankfurt am Main 1
Fuzhou 1
Guiyang 1
Gurgaon 1
Indianapolis 1
Khobar 1
Lomé 1
Los Angeles 1
Mailsi 1
Mcallen 1
Mong Kok 1
Nanchang 1
Nanjing 1
Nocera Inferiore 1
Totale 3.418
Nome #
No place to hide that bytes won’t reveal: sniffing location-based encrypted traffic to track a user’s position 133
No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone 108
Proofs of Space: When Space Is of the Essence 107
Redactable Blockchain - Or - Rewriting History in Bitcoin and Friends 103
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data 91
"To Share or not to Share" in Client-Side Encrypted Clouds 86
SecFUN: Security framework for underwater acoustic sensor networks 86
Low-cost standard signatures for energy-harvesting wireless sensor networks 82
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers 80
On the Key Exposure Problem in Chameleon Hashes 78
Deep Models under the GAN: Information leakage from collaborative deep learning 78
Oblivious assignment with m slots 77
Subversion-resilient signature schemes 77
Quasi-Efficient Revocation of Group Signatures 75
Provable data possession at untrusted stores 74
Entangled encodings and data entanglement 73
Identity-Based Proxy Re-encryption 72
Scalable and efficient provable data possession 71
Universally anonymous IBE based on the quadratic residuosity assumption 69
A new approach to DNS security (DNSSEC) 67
High-Entropy Visual Identification for Touch Screen Devices 67
Extended capabilities for visual cryptography 66
Remarks on "analysis of one popular group signature scheme" in Asiacrypt 2006 66
(If) size matters: Size-hiding private set intersection 66
Efficient Group Signatures without Trapdoors 65
Survivable Monitoring in Dynamic Networks 63
Efficient query integrity for outsourced dynamic databases 63
MR-PDP: Multiple-replica provable data possession 61
On the performance and analysis of DNS security extensions 60
Identity-Based Chameleon Hash and Applications 59
Authenticated group key agreement and friends 58
Efficient verifiable encryption (and fair exchange) of digital signatures 58
Constructions and bounds for visual cryptography 58
Key-private proxy re-encryption 58
Verifiable encryption of digital signatures and applications 57
Some Open Issues and New Directions in Group Signatures 57
A note on time-bound hierarchical key assignment schemes 57
Anonymous E-prescriptions 57
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 57
Proofs of storage from homomorphic identification protocols 57
Survivable monitoring in dynamic networks 55
New multiparty authentication services and key agreement protocols 55
Remote data checking for network coding-based distributed storage systems 55
Distributed Key Secret for Rewritable Blockchain 54
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme 51
Improved proxy re-encryption schemes with applications to secure distributed storage 50
Verifiable audit trails for a versioning file system 49
Untraceable RFID tags via insubvertible encryption 49
Remote Data Checking Using Provable Data Possession 48
Certified bitcoins 48
Interpretable Probabilistic Password Strength Meters via Deep Learning 48
Secure group communication in asynchronous networks with failures: integration and experiments 45
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage 43
FastAD: An authenticated directory for billions of objects 42
The design of a group key agreement API 42
Design and Implementation of Verifiable Audit Trails for a Versioning File System 41
Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption 41
Fault-tolerant oblivious assignment with m slots in synchronous systems 41
Multiple-Link Blockchain 41
Untraceable mobility or how to travel incognito 39
Provably-secure time-bound hierarchical key assignment schemes 39
Medical Information Privacy Assurance: Cryptographic and System Aspects 38
FastAD: An Authenticated Directory for Billions of Objects 35
Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques? 35
Visual Cryptography for General Access Structures 33
Proxy re-signatures: New definitions, algorithms, and applications 30
Google Faculty Research Award 30
Deniable cloud storage: Sharing files via public-key deniability 29
Sanitizable signatures 28
Unidirectional proxy re-encryption 23
Secret Handshakes with Dynamic and Fuzzy Matching 22
IBM Faculty Award 17
National Science Foundation Career Award 15
Group signatures a la carte 14
On the Difficulty of Coalition-Resistance in Group Signature Schemes 14
TRICERT: A distributed certified E-mail scheme 13
Watermarks in the Sand: Impossibility of Strong Watermarking for Language Models 2
Totale 4.251
Categoria #
all - tutte 11.077
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 360
selected - selezionate 0
volume - volumi 0
Totale 11.437


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020730 0 0 0 0 0 115 144 129 138 94 82 28
2020/2021342 35 39 20 33 5 3 16 69 55 29 29 9
2021/2022760 3 55 80 25 105 24 15 80 45 56 107 165
2022/2023603 186 156 13 43 47 52 0 24 57 6 13 6
2023/2024239 19 27 2 31 10 14 2 28 0 32 24 50
2024/2025320 14 26 33 35 101 111 0 0 0 0 0 0
Totale 4.251