PELOSI, GERARDO
 Distribuzione geografica
Continente #
NA - Nord America 7.772
EU - Europa 2.650
AS - Asia 649
AF - Africa 27
SA - Sud America 19
OC - Oceania 11
Continente sconosciuto - Info sul continente non disponibili 9
Totale 11.137
Nazione #
US - Stati Uniti d'America 7.581
IT - Italia 979
DE - Germania 272
SE - Svezia 249
VN - Vietnam 227
GB - Regno Unito 214
CA - Canada 191
UA - Ucraina 188
FI - Finlandia 160
CN - Cina 151
ES - Italia 114
IE - Irlanda 109
AT - Austria 76
FR - Francia 55
NL - Olanda 45
IN - India 41
SG - Singapore 41
JO - Giordania 36
CH - Svizzera 32
TR - Turchia 31
GR - Grecia 24
BE - Belgio 22
HK - Hong Kong 21
TW - Taiwan 20
PL - Polonia 18
DK - Danimarca 17
PT - Portogallo 17
BR - Brasile 15
KR - Corea 15
JP - Giappone 13
IR - Iran 11
CI - Costa d'Avorio 10
EU - Europa 9
EE - Estonia 8
RU - Federazione Russa 8
SI - Slovenia 8
AU - Australia 7
CZ - Repubblica Ceca 7
HU - Ungheria 7
ID - Indonesia 7
PK - Pakistan 7
MY - Malesia 6
RO - Romania 6
MU - Mauritius 5
SK - Slovacchia (Repubblica Slovacca) 5
TN - Tunisia 5
IL - Israele 4
NZ - Nuova Zelanda 4
SY - Repubblica araba siriana 4
MA - Marocco 3
TH - Thailandia 3
AE - Emirati Arabi Uniti 2
AL - Albania 2
BG - Bulgaria 2
EC - Ecuador 2
LB - Libano 2
QA - Qatar 2
BD - Bangladesh 1
BO - Bolivia 1
CM - Camerun 1
DZ - Algeria 1
HR - Croazia 1
IS - Islanda 1
KH - Cambogia 1
KZ - Kazakistan 1
LT - Lituania 1
LU - Lussemburgo 1
ME - Montenegro 1
MN - Mongolia 1
NG - Nigeria 1
NO - Norvegia 1
PE - Perù 1
PS - Palestinian Territory 1
ZA - Sudafrica 1
Totale 11.137
Città #
Fairfield 1.113
Woodbridge 812
Chandler 682
Houston 607
Ashburn 567
Wilmington 550
Ann Arbor 529
Seattle 487
Cambridge 405
Milan 273
Dearborn 183
Ottawa 163
Lawrence 134
Dong Ket 128
Medford 125
Jacksonville 120
Dublin 108
Vienna 75
Beijing 63
San Diego 63
Helsinki 61
Málaga 60
Des Moines 59
Redwood City 41
Norwalk 37
Amman 36
Rome 35
Dallas 32
Livorno 32
Redmond 27
New York 25
London 24
Boardman 22
Brussels 22
Amsterdam 21
Washington 21
Izmir 20
Taipei 20
Berlin 18
Los Angeles 16
Madrid 16
Princeton 16
Shanghai 16
Aarhus 15
Leawood 15
Zurich 15
Bresso 14
Fremont 13
Nürnberg 13
Vedano al Lambro 13
Centro 12
Monza 12
Edinburgh 11
Falls Church 11
Paris 11
Phoenix 11
Toronto 11
Abidjan 10
Auburn Hills 10
Messina 10
Vecchiano 10
Aachen 9
Hässelby 9
Lausanne 9
Mountain View 9
Central 8
Frankfurt am Main 8
Munich 8
Athens 7
Boston 7
Budapest 7
Hefei 7
Lucca 7
Columbus 6
Duncan 6
Gropello Cairoli 6
Hong Kong 6
Islamabad 6
Jakarta 6
Pamparato 6
Parma 6
Poznan 6
Prague 6
Tallinn 6
Bologna 5
Bratislava 5
Chicago 5
Gunzenhausen 5
Kunming 5
Minden 5
Nanchang 5
Porto 5
Seongnam 5
Tokyo 5
Zhengzhou 5
Atlanta 4
Augsburg 4
Chengdu 4
Hanoi 4
Indiana 4
Totale 8.317
Nome #
WorkingAge: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling 273
The M2DC Approach towards Resource-efficient Computing 175
Fault Sensitivity Analysis at Design Time 165
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure 159
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges 157
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture 150
V2I Cooperation for Traffic Management with SafeCOP 143
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems 136
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design 134
Design Space Extension for Secure Implementation of Block Ciphers 126
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks 125
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes 125
A Unified Approach to Canonical Form-based Boolean Matching 124
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost 124
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation 122
A Novel Regular Format for X.509 Digital Certificates 121
Accelerating Automotive Analytics: The M2DC Appliance Approach 120
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software 119
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project 118
Programming highly parallel reconfigurable architectures for symmetric and asymmetric cryptographic applications 115
The M2DC Project: Modular Microserver DataCentre 115
Three-server swapping for access confidentiality 111
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware 111
Decision Support Systems to Promote Health and Well-being of People during their Working Age: the Case of the WorkingAge EU Project 109
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks 108
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel 108
Data Centres for IoT applications: the M2DC Approach 108
Security Challenges in Building Automation and SCADA 106
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? 106
Trace-based Schedulability Analysis to Enhance Passive Side-Channel Attack Resilience of Embedded Software 105
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions 104
Countermeasures against branch target buffer attacks 103
Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks 102
Design Time Engineering of Side Channel Resistant Cipher Implementations 100
Automated instantiation of side-channel attacks countermeasures for software cipher implementations 100
Smart metering in power grids: Application scenarios and security 98
A secure and authenticated host-to-memory communication interface 98
Security Integration in Medical Device Design: Extension of an Automated Biomedical Engineering Design Methodology 96
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes 96
Computational intelligence techniques to detect toxic gas presence 95
Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application 95
Software-only reverse engineering of physical dram mappings for rowhammer attacks 95
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate 95
Security and Privacy in Smart Grid Infrastructures 94
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks 93
A Fault Induction Technique Based on Voltage Underfeeding with Application to Attacks against AES and RSA 92
A dynamic tree-based data structure for access privacy in the cloud 92
M2DC-A novel heterogeneous hyperscale microserver platform 92
Parallel hardware architectures for the cryptographic Tate pairing 90
A Code Morphing Methodology to Automate Power Analysis Countermeasures 90
Supporting Concurrency and Multiple Indexes in Private Access to Outsourced Data 89
Snake: an End-to-End Encrypted Online Social Network 89
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes 88
A pairing SW implementation for smart-cards 87
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives 87
A Transform-Parametric Approach to Boolean Matching 87
Record Setting Software Implementation of DES Using CUDA 86
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives 86
Low Voltage Fault Attacks on the RSA Cryptosystem 85
Towards transparently tackling functionality and performance issues across different OpenCL platforms 85
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions 84
Efficient and Private Access to Outsourced Data 82
A Security Audit of the OpenPGP Format 82
A note on fault attacks against deterministic signature schemes 81
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree 81
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs 80
Side-channel security of superscalar CPUs: Evaluating the Impact of Micro-architectural Features 80
A FPGA coprocessor for the cryptographic Tate pairing over Fp 79
Supporting Concurrency in Private Data Outsourcing 78
On the Security of Partially Masked Software Implementations 78
Improving first order differential power attacks through Digital Signal Processing 77
Design of a Parallel AES for Graphics Hardware using the CUDA framework 77
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers 76
Encryption-based Policy Enforcement for Cloud Storage 76
Fault attack on AES with single-bit induced faults 75
A Domain Specific Language for Cryptography 74
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults 74
Access control for the shuffle index 74
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution 73
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems 73
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis 72
Low voltage fault attacks to AES 72
Enforcing authorizations while protecting access confidentiality 72
Improving work life conditions via portable knowledge-driven recommender system 71
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems 70
Efficient Oblivious Substring Search via Architectural Support 70
Fast Disk Encryption Through GPGPU Acceleration 69
A Finite Regime Analysis of Information Set Decoding Algorithms 69
Symmetric key encryption acceleration on heterogeneous many-core architectures 69
Distributed Shuffling for Preserving Access Confidentiality 68
Injection Technologies for Fault Attacks on Microprocessors 67
Access Privacy in the Cloud 67
Parallel hardware architectures for the cryptographic Tate pairing 66
Selective Exchange of Confidential Data in the Outsourcing Scenario 65
Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems 65
Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques 64
A Quantum Circuit to Speed-up the Cryptanalysis of Code-based Cryptosystem 64
Information Leakage Discovery Techniques to Enhance Secure Chip Design 63
On Task Assignment in Data Intensive Scalable Computing 63
Shuffle Index: Efficient and Private Access to Outsourced Data 62
Totale 9.609
Categoria #
all - tutte 33.445
article - articoli 7.753
book - libri 0
conference - conferenze 19.542
curatela - curatele 964
other - altro 0
patent - brevetti 952
selected - selezionate 0
volume - volumi 4.234
Totale 66.890


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019923 0 0 0 0 0 0 0 0 0 221 375 327
2019/20202.839 208 193 90 220 350 362 332 253 290 143 241 157
2020/20211.792 132 112 144 99 151 114 87 144 144 224 125 316
2021/20221.419 84 139 111 121 149 59 80 125 89 92 134 236
2022/20231.810 209 116 47 172 213 238 27 183 267 98 200 40
2023/2024739 69 158 61 69 75 88 55 75 42 47 0 0
Totale 11.416