PELOSI, GERARDO
 Distribuzione geografica
Continente #
NA - Nord America 2467
EU - Europa 1471
AS - Asia 778
AF - Africa 87
SA - Sud America 30
OC - Oceania 17
Continente sconosciuto - Info sul continente non disponibili 1
Totale 4851
Nazione #
US - Stati Uniti d'America 2393
IT - Italia 578
CN - Cina 188
IN - India 148
DE - Germania 135
FR - Francia 129
GB - Regno Unito 119
JP - Giappone 91
RU - Federazione Russa 77
CA - Canada 67
VN - Vietnam 67
CZ - Repubblica Ceca 59
GR - Grecia 59
KR - Corea 56
CH - Svizzera 52
IR - Iran 48
NL - Olanda 48
TW - Taiwan 43
ES - Italia 39
RO - Romania 39
MA - Marocco 30
TR - Turchia 29
UA - Ucraina 24
ZA - Sudafrica 21
BE - Belgio 19
BR - Brasile 19
SG - Singapore 18
HK - Hong Kong 17
AT - Austria 15
AU - Australia 14
IL - Israele 14
PK - Pakistan 14
PL - Polonia 12
MY - Malesia 11
SE - Svezia 11
DZ - Algeria 10
PT - Portogallo 10
TH - Thailandia 9
CL - Cile 8
ID - Indonesia 8
SI - Slovenia 8
EG - Egitto 7
MX - Messico 7
LU - Lussemburgo 6
FI - Finlandia 5
IE - Irlanda 5
LT - Lituania 5
NG - Nigeria 5
AE - Emirati Arabi Uniti 4
BD - Bangladesh 3
DK - Danimarca 3
MG - Madagascar 3
SK - Slovacchia (Repubblica Slovacca) 3
TN - Tunisia 3
BY - Bielorussia 2
GN - Guinea 2
HR - Croazia 2
KE - Kenya 2
NZ - Nuova Zelanda 2
SA - Arabia Saudita 2
SC - Seychelles 2
SN - Senegal 2
UZ - Uzbekistan 2
AR - Argentina 1
AZ - Azerbaigian 1
BA - Bosnia-Erzegovina 1
BG - Bulgaria 1
BH - Bahrain 1
EC - Ecuador 1
EE - Estonia 1
EU - Europa 1
FJ - Figi 1
GE - Georgia 1
HU - Ungheria 1
IQ - Iraq 1
KZ - Kazakistan 1
LK - Sri Lanka 1
MD - Moldavia 1
NO - Norvegia 1
PE - Perù 1
RS - Serbia 1
Totale 4851
Città #
Houston 369
Ann Arbor 238
Fairfield 238
Santa Cruz 150
Milan 134
Seattle 115
Buffalo 90
Woodbridge 90
Ashburn 84
Cambridge 84
Wilmington 79
Beijing 49
Bengaluru 44
San Diego 43
Dong Ket 41
Taipei 38
Rome 31
Toronto 26
Las Vegas 25
Duncan 23
Boardman 21
Shanghai 21
Boca Raton 19
Seoul 19
Muizenberg 18
Ottawa 18
Lausanne 17
Modena 17
Munich 17
Gif-sur-yvette 15
Athens 14
Chiba 14
Chicago 14
Norwalk 14
Tokyo 14
Dallas 13
Hanoi 13
Los Angeles 13
Mountain View 13
Phoenix 13
College Park 12
Changsha 11
Guangzhou 11
Paris 11
Parsippany 11
Singapore 11
Milpitas 10
Wuhan 10
Central District 9
Islamabad 8
Moscow 8
Mumbai 8
Trento 8
Zurich 8
Abergavenny 7
Cairo 7
Clearwater 7
Delhi 7
Eindhoven 7
Hamilton 7
Hebei 7
Kisa 7
Minneapolis 7
Monza 7
Nanchang 7
Nanning 7
Saint Petersburg 7
Aachen 6
Atlanta 6
Boulder 6
Centro 6
Guwahati 6
Hangzhou 6
Ioannina 6
Kraainem 6
Provo 6
Pátrai 6
Redmond 6
Riva 6
San Fernando 6
San Francisco 6
San Jose 6
Taranto 6
University Park 6
Zhengzhou 6
Gaithersburg 5
Helsinki 5
Jakarta 5
Lake Forest 5
Lawrence 5
Madrid 5
Nara 5
Palo Alto 5
Pamparato 5
Parma 5
Piacenza 5
San Giuliano Milanese 5
Scranton 5
São Paulo 5
Turin 5
Totale 2718
Nome #
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks, file e0c31c0d-458d-4599-e053-1705fe0aef77 385
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate, file e0c31c0d-bca8-4599-e053-1705fe0aef77 357
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks, file e0c31c0d-8f49-4599-e053-1705fe0aef77 280
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems, file e0c31c0f-3963-4599-e053-1705fe0aef77 265
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems, file e0c31c0f-7493-4599-e053-1705fe0aef77 263
Side-channel security of superscalar CPUs: Evaluating the Impact of Micro-architectural Features, file e0c31c0d-c03c-4599-e053-1705fe0aef77 257
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes, file e0c31c0d-e440-4599-e053-1705fe0aef77 212
Efficient Oblivious Substring Search via Architectural Support, file e0c31c10-23e7-4599-e053-1705fe0aef77 208
WorkingAge: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling, file e0c31c0f-7495-4599-e053-1705fe0aef77 199
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives, file e0c31c10-f7c1-4599-e053-1705fe0aef77 195
Decision Support Systems to Promote Health and Well-being of People during their Working Age: the Case of the WorkingAge EU Project, file e0c31c10-5a12-4599-e053-1705fe0aef77 177
Integrating Side Channel Security in the FPGA Hardware Design Flow, file e0c31c0f-7496-4599-e053-1705fe0aef77 171
A Quantum Circuit to Speed-up the Cryptanalysis of Code-based Cryptosystem, file e0c31c12-1fc3-4599-e053-1705fe0aef77 161
A Finite Regime Analysis of Information Set Decoding Algorithms, file e0c31c0e-4069-4599-e053-1705fe0aef77 153
Accelerating Automotive Analytics: The M2DC Appliance Approach, file e0c31c0d-c49e-4599-e053-1705fe0aef77 152
Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems, file e0c31c0f-7702-4599-e053-1705fe0aef77 140
Automated instantiation of side-channel attacks countermeasures for software cipher implementations, file e0c31c0d-c048-4599-e053-1705fe0aef77 132
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions, file e0c31c0e-cc76-4599-e053-1705fe0aef77 129
Exploring Cortex-M Microarchitectural Side Channel Information Leakage, file e0c31c12-03a2-4599-e053-1705fe0aef77 118
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel, file e0c31c0d-c36a-4599-e053-1705fe0aef77 117
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks, file e0c31c0e-b20a-4599-e053-1705fe0aef77 111
Design Space Extension for Secure Implementation of Block Ciphers, file e0c31c0f-0fb7-4599-e053-1705fe0aef77 111
Shuffle Index: Efficient and Private Access to Outsourced Data, file e0c31c0e-b20e-4599-e053-1705fe0aef77 108
Supporting Concurrency and Multiple Indexes in Private Access to Outsourced Data, file e0c31c0f-c7d9-4599-e053-1705fe0aef77 86
Enforcing authorizations while protecting access confidentiality, file e0c31c0b-9e75-4599-e053-1705fe0aef77 84
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation, file e0c31c0c-3246-4599-e053-1705fe0aef77 80
Three-server swapping for access confidentiality, file e0c31c08-72fb-4599-e053-1705fe0aef77 65
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure, file e0c31c11-0738-4599-e053-1705fe0aef77 49
Privacy-aware character pattern matching over outsourced encrypted data, file e0c31c11-7147-4599-e053-1705fe0aef77 46
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks, file e0c31c11-3386-4599-e053-1705fe0aef77 45
Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems, file e0c31c12-774a-4599-e053-1705fe0aef77 44
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers, file e0c31c0a-7223-4599-e053-1705fe0aef77 34
Locating Side Channel Leakage in Time through Matched Filters, file 0f62993c-4dce-4a18-8a4c-38e8208cb896 29
Improving work life conditions via portable knowledge-driven recommender system, file e0c31c11-fed1-4599-e053-1705fe0aef77 28
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture, file e0c31c0d-836c-4599-e053-1705fe0aef77 22
Performance bounds for QC-MDPC codes decoders, file e0c31c12-7ddd-4599-e053-1705fe0aef77 20
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes, file e0c31c0d-ea95-4599-e053-1705fe0aef77 14
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost, file e0c31c0e-71fd-4599-e053-1705fe0aef77 14
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives, file e0c31c0d-93c1-4599-e053-1705fe0aef77 12
Foreword -Proceedings of the Sixth Workshop on Cryptography and Security in Computing Systems - ISBN:978-1-4503-6182-8. In ACM INTERNATIONAL CONFERENCE PROCEEDINGS SERIES, file e0c31c0e-da7f-4599-e053-1705fe0aef77 12
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure, file e0c31c09-4ac5-4599-e053-1705fe0aef77 8
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture, file e0c31c0b-d5e4-4599-e053-1705fe0aef77 7
V2I Cooperation for Traffic Management with SafeCOP, file e0c31c0a-33f0-4599-e053-1705fe0aef77 5
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware, file e0c31c0a-f111-4599-e053-1705fe0aef77 4
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree, file e0c31c0c-1a11-4599-e053-1705fe0aef77 3
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks, file e0c31c08-727c-4599-e053-1705fe0aef77 2
A Fault Induction Technique Based on Voltage Underfeeding with Application to Attacks against AES and RSA, file e0c31c09-10ca-4599-e053-1705fe0aef77 2
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project, file e0c31c09-e740-4599-e053-1705fe0aef77 2
The M2DC Project: Modular Microserver DataCentre, file e0c31c0a-39d0-4599-e053-1705fe0aef77 2
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof?, file e0c31c08-9790-4599-e053-1705fe0aef77 1
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, file e0c31c08-b75c-4599-e053-1705fe0aef77 1
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions, file e0c31c08-ba0f-4599-e053-1705fe0aef77 1
Shuffle Index: Efficient and Private Access to Outsourced Data, file e0c31c08-ba52-4599-e053-1705fe0aef77 1
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution, file e0c31c09-6f3b-4599-e053-1705fe0aef77 1
Foreword - Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, file e0c31c09-984b-4599-e053-1705fe0aef77 1
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design, file e0c31c09-d30e-4599-e053-1705fe0aef77 1
A dynamic tree-based data structure for access privacy in the cloud, file e0c31c09-d752-4599-e053-1705fe0aef77 1
A Novel Regular Format for X.509 Digital Certificates, file e0c31c0a-8755-4599-e053-1705fe0aef77 1
Software-only reverse engineering of physical dram mappings for rowhammer attacks, file e0c31c0c-8456-4599-e053-1705fe0aef77 1
M2DC-A novel heterogeneous hyperscale microserver platform, file e0c31c0c-9437-4599-e053-1705fe0aef77 1
A secure and authenticated host-to-memory communication interface, file e0c31c0d-483a-4599-e053-1705fe0aef77 1
Profiled side channel attacks against the RSA cryptosystem using neural networks, file e0c31c12-63bb-4599-e053-1705fe0aef77 1
Totale 5133
Categoria #
all - tutte 6045
article - articoli 2542
book - libri 0
conference - conferenze 3076
curatela - curatele 20
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 407
Totale 12090


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2017/201817 0002 00 05 6022
2018/201929 0202 22 00 20136
2019/2020662 48432957 6252 5872 76506352
2020/20211424 9410111285 144108 88143 127152121149
2021/20222502 172111172417 290152 206138 142154350198
2022/2023487 1161472240 00 00 0000
Totale 5133