PELOSI, GERARDO
 Distribuzione geografica
Continente #
NA - Nord America 10.636
EU - Europa 6.575
AS - Asia 4.463
SA - Sud America 924
AF - Africa 198
OC - Oceania 26
Continente sconosciuto - Info sul continente non disponibili 11
Totale 22.833
Nazione #
US - Stati Uniti d'America 10.336
RU - Federazione Russa 2.398
SG - Singapore 1.748
IT - Italia 1.656
CN - Cina 1.336
BR - Brasile 816
DE - Germania 431
VN - Vietnam 380
GB - Regno Unito 376
SE - Svezia 264
CA - Canada 232
FI - Finlandia 232
UA - Ucraina 193
HK - Hong Kong 184
FR - Francia 175
NL - Olanda 175
ES - Italia 167
IN - India 139
KR - Corea 138
IE - Irlanda 117
AT - Austria 101
MA - Marocco 68
TR - Turchia 68
ID - Indonesia 65
JP - Giappone 57
AR - Argentina 47
PL - Polonia 46
BD - Bangladesh 45
JO - Giordania 44
TW - Taiwan 43
MX - Messico 39
CH - Svizzera 38
BE - Belgio 37
IQ - Iraq 36
PK - Pakistan 35
CI - Costa d'Avorio 32
ZA - Sudafrica 27
GR - Grecia 26
PT - Portogallo 21
AU - Australia 19
DK - Danimarca 19
CZ - Repubblica Ceca 18
IR - Iran 16
IL - Israele 15
MY - Malesia 15
TN - Tunisia 14
EC - Ecuador 13
EE - Estonia 13
PH - Filippine 13
SK - Slovacchia (Repubblica Slovacca) 12
UZ - Uzbekistan 12
EG - Egitto 11
SA - Arabia Saudita 11
KZ - Kazakistan 10
RO - Romania 10
CL - Cile 9
EU - Europa 9
KE - Kenya 9
AE - Emirati Arabi Uniti 8
NG - Nigeria 8
SI - Slovenia 8
BG - Bulgaria 7
CO - Colombia 7
HU - Ungheria 7
LT - Lituania 7
PY - Paraguay 7
AL - Albania 6
BJ - Benin 6
JM - Giamaica 6
NP - Nepal 6
NZ - Nuova Zelanda 6
PE - Perù 6
UY - Uruguay 6
VE - Venezuela 6
BO - Bolivia 5
DO - Repubblica Dominicana 5
MU - Mauritius 5
RS - Serbia 5
SY - Repubblica araba siriana 5
TH - Thailandia 5
AZ - Azerbaigian 4
BB - Barbados 4
CY - Cipro 4
KH - Cambogia 4
LB - Libano 4
DZ - Algeria 3
ET - Etiopia 3
QA - Qatar 3
BH - Bahrain 2
CG - Congo 2
GA - Gabon 2
GT - Guatemala 2
GY - Guiana 2
HR - Croazia 2
KG - Kirghizistan 2
LU - Lussemburgo 2
LV - Lettonia 2
ML - Mali 2
PA - Panama 2
PS - Palestinian Territory 2
Totale 22.806
Città #
Ashburn 1.315
Fairfield 1.113
Singapore 875
Woodbridge 814
Chandler 682
Houston 618
Milan 570
Wilmington 551
Ann Arbor 529
Seattle 492
Cambridge 414
Moscow 344
San Jose 296
Beijing 278
Hefei 263
Santa Clara 261
Council Bluffs 196
Boardman 193
Dearborn 183
Los Angeles 166
Ottawa 163
Hong Kong 154
Lawrence 134
Dong Ket 128
Medford 125
Jacksonville 121
Dublin 113
Seoul 106
London 94
New York 88
Vienna 86
Dallas 79
Helsinki 76
Amsterdam 68
Des Moines 68
San Diego 63
São Paulo 62
Rome 61
Buffalo 60
Málaga 60
Frankfurt am Main 51
Ho Chi Minh City 50
Jakarta 50
Hanoi 43
Amman 41
Chicago 41
Redwood City 41
The Dalles 41
Shanghai 39
Casablanca 37
Norwalk 37
Lappeenranta 36
Munich 33
Abidjan 32
Livorno 32
Paris 32
Orem 31
Kent 30
Taipei 30
Berlin 27
Columbus 27
Redmond 27
Rio de Janeiro 27
Denver 26
Tokyo 26
Verona 26
Warsaw 26
Brussels 25
Brooklyn 24
Chennai 24
Guangzhou 24
Mumbai 24
Washington 24
Atlanta 23
Montreal 23
Redondo Beach 23
Kenitra 22
Nuremberg 22
Phoenix 22
Baghdad 21
Düsseldorf 21
Toronto 21
Turku 21
Izmir 20
Turin 20
Zurich 20
Belo Horizonte 18
Boston 18
Madrid 18
Zhengzhou 18
Changsha 16
Chengdu 16
Johannesburg 16
Monza 16
Princeton 16
Stockholm 16
Aarhus 15
Leawood 15
Ancona 14
Bresso 14
Totale 13.651
Nome #
WorkingAge: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling 399
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure 273
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture 254
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems 253
The M2DC Approach towards Resource-efficient Computing 247
Fault Sensitivity Analysis at Design Time 232
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges 227
A comparison of deep learning approaches for power-based side-channel attacks 222
Accelerating Automotive Analytics: The M2DC Appliance Approach 222
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design 212
A Unified Approach to Canonical Form-based Boolean Matching 210
V2I Cooperation for Traffic Management with SafeCOP 210
Design of a Quantum Walk Circuit to Solve the Subset-Sum Problem 209
A Complete Quantum Circuit to Solve the Information Set Decoding Problem 208
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation 200
A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving 199
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes 198
A Novel Regular Format for X.509 Digital Certificates 197
A Fault Induction Technique Based on Voltage Underfeeding with Application to Attacks against AES and RSA 196
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks 194
A secure and authenticated host-to-memory communication interface 193
Decision Support Systems to Promote Health and Well-being of People during their Working Age: the Case of the WorkingAge EU Project 193
Programming highly parallel reconfigurable architectures for symmetric and asymmetric cryptographic applications 188
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software 188
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost 188
A Quantum Circuit to Execute a Key-Recovery Attack Against the DES and 3DES Block Ciphers 188
A Code Morphing Methodology to Automate Power Analysis Countermeasures 186
Software-only reverse engineering of physical dram mappings for rowhammer attacks 185
Security Challenges in Building Automation and SCADA 172
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? 171
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes 169
A note on fault attacks against deterministic signature schemes 168
Trace-based Schedulability Analysis to Enhance Passive Side-Channel Attack Resilience of Embedded Software 168
A FPGA coprocessor for the cryptographic Tate pairing over Fp 166
A Transform-Parametric Approach to Boolean Matching 164
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions 164
Design Space Extension for Secure Implementation of Block Ciphers 163
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks 163
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware 162
Post Quantum Cryptography Research Lines in the Italian Center for Security and Rights in Cyberspace 161
A Domain Specific Language for Cryptography 161
A dynamic tree-based data structure for access privacy in the cloud 161
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel 160
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project 159
A Quantum Circuit to Speed-up the Cryptanalysis of Code-based Cryptosystem 159
A Finite Regime Analysis of Information Set Decoding Algorithms 156
Improving work life conditions via portable knowledge-driven recommender system 156
Review of Policy-as-code Approaches to Manage Security and Privacy Conditions in Edge and Cloud Computing Ecosystems 154
M2DC-A novel heterogeneous hyperscale microserver platform 154
Automated instantiation of side-channel attacks countermeasures for software cipher implementations 154
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives 153
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions 150
Three-server swapping for access confidentiality 149
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives 149
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems 147
A pairing SW implementation for smart-cards 146
Design Time Engineering of Side Channel Resistant Cipher Implementations 146
Data Centres for IoT applications: the M2DC Approach 146
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree 146
The M2DC Project: Modular Microserver DataCentre 145
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks 145
Countermeasures against branch target buffer attacks 144
Snake: an End-to-End Encrypted Online Social Network 144
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate 144
Towards transparently tackling functionality and performance issues across different OpenCL platforms 144
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes 142
Efficient Oblivious Substring Search via Architectural Support 140
Supporting Concurrency and Multiple Indexes in Private Access to Outsourced Data 138
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs 137
A Security Audit of the OpenPGP Format 136
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems 135
Computational intelligence techniques to detect toxic gas presence 135
Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks 135
Smart metering in power grids: Application scenarios and security 134
A Flexible ASIC-Oriented Design for a Full NTRU Accelerator 133
Exploring Cortex-M Microarchitectural Side Channel Information Leakage 133
Differentially Private ORAM 132
Security and Privacy in Smart Grid Infrastructures 131
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers 131
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes 130
Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application 130
Secure Audit Logs 127
Parallel hardware architectures for the cryptographic Tate pairing 127
Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques 127
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis 127
Optimizing Quantum Circuit Synthesis with Dominator Analysis 126
Bit-flipping Decoder Failure Rate Estimation for (v,w)-regular Codes 126
Privacy-aware character pattern matching over outsourced encrypted data 125
Injection Technologies for Fault Attacks on Microprocessors 124
Private Boolean Queries on Encrypted Data 123
Record Setting Software Implementation of DES Using CUDA 122
Low Voltage Fault Attacks on the RSA Cryptosystem 122
Side-channel security of superscalar CPUs: Evaluating the Impact of Micro-architectural Features 122
Shuffle Index 121
Quantum Circuit Design for the Lee-Brickell Based Information Set Decoding 121
Performance and Efficiency Exploration of Hardware Polynomial Multipliers for Post-Quantum Lattice-Based Cryptosystems 121
Security Integration in Medical Device Design: Extension of an Automated Biomedical Engineering Design Methodology 121
Integrating Side Channel Security in the FPGA Hardware Design Flow 120
Privacy-Preserving Joins over Encrypted Data 119
Low voltage fault attacks to AES 119
Totale 16.326
Categoria #
all - tutte 68.994
article - articoli 14.958
book - libri 0
conference - conferenze 39.669
curatela - curatele 1.973
other - altro 0
patent - brevetti 2.155
selected - selezionate 0
volume - volumi 10.239
Totale 137.988


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.040 0 0 0 0 0 0 87 144 144 224 125 316
2021/20221.419 84 139 111 121 149 59 80 125 89 92 134 236
2022/20231.810 209 116 47 172 213 238 27 183 267 98 200 40
2023/2024934 69 158 61 69 75 88 55 75 42 71 42 129
2024/20253.857 36 84 134 180 544 281 242 425 568 224 515 624
2025/20267.726 1.889 2.128 556 939 702 980 532 0 0 0 0 0
Totale 23.194