PELOSI, GERARDO
 Distribuzione geografica
Continente #
NA - Nord America 12.569
EU - Europa 8.173
AS - Asia 6.458
SA - Sud America 1.021
AF - Africa 234
OC - Oceania 31
Continente sconosciuto - Info sul continente non disponibili 11
Totale 28.497
Nazione #
US - Stati Uniti d'America 12.229
IT - Italia 2.818
RU - Federazione Russa 2.402
SG - Singapore 1.985
CN - Cina 1.714
BR - Brasile 875
VN - Vietnam 817
DE - Germania 480
KR - Corea 434
GB - Regno Unito 417
FR - Francia 375
HK - Hong Kong 359
JP - Giappone 319
SE - Svezia 275
FI - Finlandia 268
CA - Canada 251
UA - Ucraina 200
IN - India 196
NL - Olanda 194
ES - Italia 178
IE - Irlanda 123
AT - Austria 102
MA - Marocco 77
TW - Taiwan 76
TR - Turchia 74
ID - Indonesia 72
BD - Bangladesh 64
AR - Argentina 56
IQ - Iraq 56
PL - Polonia 51
JO - Giordania 48
MX - Messico 47
PK - Pakistan 47
BE - Belgio 41
CH - Svizzera 40
CI - Costa d'Avorio 33
ZA - Sudafrica 31
GR - Grecia 29
PH - Filippine 27
AU - Australia 24
CZ - Repubblica Ceca 24
DK - Danimarca 24
PT - Portogallo 23
TN - Tunisia 22
EC - Ecuador 18
MY - Malesia 18
IL - Israele 17
SA - Arabia Saudita 17
IR - Iran 16
UZ - Uzbekistan 16
CO - Colombia 14
EE - Estonia 14
RO - Romania 14
KZ - Kazakistan 13
PY - Paraguay 13
EG - Egitto 12
HU - Ungheria 12
SK - Slovacchia (Repubblica Slovacca) 12
VE - Venezuela 12
CL - Cile 11
KE - Kenya 11
JM - Giamaica 10
NG - Nigeria 10
NP - Nepal 10
TH - Thailandia 10
BG - Bulgaria 9
EU - Europa 9
SI - Slovenia 9
AE - Emirati Arabi Uniti 8
AL - Albania 8
UY - Uruguay 8
LT - Lituania 7
PE - Perù 7
SY - Repubblica araba siriana 7
AZ - Azerbaigian 6
BJ - Benin 6
CY - Cipro 6
ET - Etiopia 6
MU - Mauritius 6
NZ - Nuova Zelanda 6
RS - Serbia 6
BO - Bolivia 5
DO - Repubblica Dominicana 5
DZ - Algeria 5
LB - Libano 5
TT - Trinidad e Tobago 5
BB - Barbados 4
HR - Croazia 4
KH - Cambogia 4
LV - Lettonia 4
PA - Panama 4
QA - Qatar 4
BY - Bielorussia 3
CG - Congo 3
GT - Guatemala 3
LU - Lussemburgo 3
PS - Palestinian Territory 3
BH - Bahrain 2
CR - Costa Rica 2
GA - Gabon 2
Totale 28.461
Città #
Ashburn 1.673
Milan 1.563
Fairfield 1.113
San Jose 1.061
Singapore 1.060
Woodbridge 814
Chandler 682
Houston 621
Wilmington 551
Ann Arbor 529
Seattle 492
Cambridge 416
Seoul 395
Moscow 346
Beijing 308
Council Bluffs 290
Hong Kong 285
Santa Clara 278
Tokyo 277
Hefei 265
The Dalles 251
Los Angeles 214
Boardman 196
Dearborn 183
Ho Chi Minh City 180
Ottawa 163
Lauterbourg 162
Hanoi 151
Lawrence 134
Dong Ket 128
Medford 125
Jacksonville 121
Dublin 119
Dallas 114
Helsinki 111
North Charleston 111
London 101
New York 100
Vienna 87
Amsterdam 77
Frankfurt am Main 73
Des Moines 72
São Paulo 71
Buffalo 66
Rome 65
San Diego 63
Málaga 60
Taipei 55
Las Vegas 53
Jakarta 51
Shanghai 48
Orem 46
Amman 45
Chicago 45
Redwood City 41
Casablanca 38
Lappeenranta 37
Norwalk 37
Paris 37
Chennai 35
Abidjan 33
Montreal 33
Munich 33
Livorno 32
Verona 32
Denver 31
Guangzhou 31
Columbus 30
Da Nang 30
Kent 30
Warsaw 30
Berlin 29
Nuremberg 28
Rio de Janeiro 28
Baghdad 27
Brooklyn 27
Brussels 27
Redmond 27
Mumbai 26
Madrid 25
Atlanta 24
Toronto 24
Washington 24
Haiphong 23
Phoenix 23
Redondo Beach 23
Kenitra 22
Düsseldorf 21
Izmir 21
Monza 21
Turku 21
Zurich 21
Hangzhou 20
Kolkata 20
Turin 20
Zhengzhou 20
Johannesburg 19
Belo Horizonte 18
Boston 18
Chengdu 18
Totale 17.895
Nome #
WorkingAge: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling 426
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure 318
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture 307
Software-only reverse engineering of physical dram mappings for rowhammer attacks 302
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems 287
M2DC-A novel heterogeneous hyperscale microserver platform 274
The M2DC Approach towards Resource-efficient Computing 273
A Complete Quantum Circuit to Solve the Information Set Decoding Problem 265
Fault Sensitivity Analysis at Design Time 263
A comparison of deep learning approaches for power-based side-channel attacks 261
A pairing SW implementation for smart-cards 260
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges 255
A Unified Approach to Canonical Form-based Boolean Matching 254
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design 250
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions 249
Design of a Quantum Walk Circuit to Solve the Subset-Sum Problem 243
Accelerating Automotive Analytics: The M2DC Appliance Approach 242
A Quantum Circuit to Execute a Key-Recovery Attack Against the DES and 3DES Block Ciphers 237
V2I Cooperation for Traffic Management with SafeCOP 235
A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving 229
A Quantum Circuit to Speed-up the Cryptanalysis of Code-based Cryptosystem 229
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes 227
A Novel Regular Format for X.509 Digital Certificates 222
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks 222
A Transform-Parametric Approach to Boolean Matching 221
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation 220
Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks 219
A Fault Induction Technique Based on Voltage Underfeeding with Application to Attacks against AES and RSA 217
A secure and authenticated host-to-memory communication interface 216
Review of Policy-as-code Approaches to Manage Security and Privacy Conditions in Edge and Cloud Computing Ecosystems 215
Decision Support Systems to Promote Health and Well-being of People during their Working Age: the Case of the WorkingAge EU Project 214
A Code Morphing Methodology to Automate Power Analysis Countermeasures 212
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software 212
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks 212
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost 211
Programming highly parallel reconfigurable architectures for symmetric and asymmetric cryptographic applications 208
Post Quantum Cryptography Research Lines in the Italian Center for Security and Rights in Cyberspace 207
Access Privacy in the Cloud 206
Trace-based Schedulability Analysis to Enhance Passive Side-Channel Attack Resilience of Embedded Software 203
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes 203
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions 201
A FPGA coprocessor for the cryptographic Tate pairing over Fp 196
A Flexible ASIC-Oriented Design for a Full NTRU Accelerator 195
Security Challenges in Building Automation and SCADA 195
Authentication Method 195
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? 195
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel 191
A note on fault attacks against deterministic signature schemes 191
A Finite Regime Analysis of Information Set Decoding Algorithms 188
Design Space Extension for Secure Implementation of Block Ciphers 187
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate 186
A dynamic tree-based data structure for access privacy in the cloud 184
Improving work life conditions via portable knowledge-driven recommender system 184
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware 183
Automated instantiation of side-channel attacks countermeasures for software cipher implementations 182
Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems 181
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project 181
Method of Processing Information to be Confidentially Transmitted 180
Improvements in the Use of Bilinear Mappings in Cryptographic Applications 180
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems 178
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives 178
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks 177
Efficient Oblivious Substring Search via Architectural Support 177
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes 176
A Domain Specific Language for Cryptography 175
Use of Bilinear Mappings in Cryptographic Applications 174
Design Time Engineering of Side Channel Resistant Cipher Implementations 171
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives 170
Optimizing Quantum Circuit Synthesis with Dominator Analysis 169
Three-server swapping for access confidentiality 169
Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-Profiled Side Channel Attacks 167
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs 166
Supporting Concurrency and Multiple Indexes in Private Access to Outsourced Data 165
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree 165
A Quantum Method to Match Vector Boolean Functions Using Simon's Solver 164
Data Centres for IoT applications: the M2DC Approach 164
The M2DC Project: Modular Microserver DataCentre 163
Privacy-aware character pattern matching over outsourced encrypted data 162
Towards transparently tackling functionality and performance issues across different OpenCL platforms 162
Bit-flipping Decoder Failure Rate Estimation for (v,w)-regular Codes 160
An Efficient and Unified RTL Accelerator Design for HQC-128, HQC-192, and HQC-256 160
Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques 160
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes 159
A Security Audit of the OpenPGP Format 158
Exploring Cortex-M Microarchitectural Side Channel Information Leakage 158
Quantum Oracle Synthesis from HDL Designs via Multi Level Intermediate Representation 157
Snake: an End-to-End Encrypted Online Social Network 157
Integrating Side Channel Security in the FPGA Hardware Design Flow 157
Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding 156
Countermeasures against branch target buffer attacks 156
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers 155
Oblivious RAM (ORAM) 154
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis 154
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems 153
A High Efficiency Hardware Design for the Post-Quantum KEM HQC 152
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks 152
Secure Audit Logs 151
Threshold Selection for Iterative Decoding of (v,w)-regular Binary Codes 150
Computational intelligence techniques to detect toxic gas presence 150
Differentially Private ORAM 149
Totale 19.951
Categoria #
all - tutte 77.194
article - articoli 16.753
book - libri 0
conference - conferenze 43.807
curatela - curatele 2.145
other - altro 0
patent - brevetti 2.786
selected - selezionate 0
volume - volumi 11.703
Totale 154.388


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021441 0 0 0 0 0 0 0 0 0 0 125 316
2021/20221.419 84 139 111 121 149 59 80 125 89 92 134 236
2022/20231.810 209 116 47 172 213 238 27 183 267 98 200 40
2023/2024934 69 158 61 69 75 88 55 75 42 71 42 129
2024/20253.857 36 84 134 180 544 281 242 425 568 224 515 624
2025/202613.398 1.889 2.128 556 939 702 980 2.382 656 1.525 1.486 155 0
Totale 28.866