PELOSI, GERARDO
 Distribuzione geografica
Continente #
NA - Nord America 6489
EU - Europa 1970
AS - Asia 476
AF - Africa 11
SA - Sud America 11
Continente sconosciuto - Info sul continente non disponibili 9
OC - Oceania 5
Totale 8971
Nazione #
US - Stati Uniti d'America 6332
IT - Italia 763
SE - Svezia 248
DE - Germania 222
VN - Vietnam 222
UA - Ucraina 187
GB - Regno Unito 164
CA - Canada 157
CN - Cina 120
FI - Finlandia 101
AT - Austria 71
ES - Italia 44
FR - Francia 36
NL - Olanda 34
IN - India 31
TR - Turchia 27
GR - Grecia 23
TW - Taiwan 18
CH - Svizzera 16
PL - Polonia 14
KR - Corea 11
EU - Europa 9
JP - Giappone 9
BR - Brasile 8
SI - Slovenia 8
BE - Belgio 7
ID - Indonesia 7
AU - Australia 5
MU - Mauritius 5
PK - Pakistan 5
PT - Portogallo 5
RU - Federazione Russa 5
SK - Slovacchia (Repubblica Slovacca) 5
MY - Malesia 4
SY - Repubblica araba siriana 4
HU - Ungheria 3
IE - Irlanda 3
IL - Israele 3
IR - Iran 3
MA - Marocco 3
SG - Singapore 3
TH - Thailandia 3
CZ - Repubblica Ceca 2
DK - Danimarca 2
EC - Ecuador 2
HK - Hong Kong 2
QA - Qatar 2
RO - Romania 2
AL - Albania 1
BG - Bulgaria 1
CM - Camerun 1
DZ - Algeria 1
LB - Libano 1
LT - Lituania 1
LU - Lussemburgo 1
NG - Nigeria 1
NO - Norvegia 1
PE - Perù 1
PS - Palestinian Territory 1
Totale 8971
Città #
Fairfield 1113
Woodbridge 812
Houston 606
Wilmington 550
Ann Arbor 529
Seattle 478
Ashburn 473
Cambridge 405
Dearborn 183
Milan 176
Ottawa 151
Chandler 148
Lawrence 134
Dong Ket 128
Medford 125
Jacksonville 120
Vienna 70
Beijing 63
San Diego 63
Des Moines 59
Redwood City 41
Norwalk 37
Livorno 32
Dallas 27
Redmond 27
Izmir 20
Rome 18
Taipei 18
Princeton 16
Amsterdam 15
Leawood 15
Nürnberg 13
Centro 12
Falls Church 11
Fremont 11
Los Angeles 11
Phoenix 11
Auburn Hills 10
Berlin 10
Messina 10
Vecchiano 10
Aachen 9
Hässelby 9
London 9
Monza 9
Mountain View 9
Madrid 8
Boston 7
Brussels 7
Hefei 7
Lausanne 7
Lucca 7
Athens 6
Duncan 6
Gropello Cairoli 6
Jakarta 6
Pamparato 6
Poznan 6
Bratislava 5
Kunming 5
Minden 5
Nanchang 5
Seongnam 5
Atlanta 4
Chengdu 4
Gunzenhausen 4
Indiana 4
Islamabad 4
Nanjing 4
Parma 4
Zurich 4
Besana In Brianza 3
Bologna 3
Bracciano 3
Budapest 3
Changsha 3
Colli Del Tronto 3
Como 3
Hamburg 3
Helsinki 3
Jerusalem 3
Meda 3
Monterotondo 3
Olching 3
Old Bridge 3
Orlando 3
Orsingen-nenzingen 3
Rio De Janeiro 3
San Giuliano Milanese 3
Yurovka 3
Albenga 2
Albinea 2
Angera 2
Augsburg 2
Augusta 2
Bang Lamung 2
Bangalore 2
Brandon 2
Brescia 2
Buffalo 2
Totale 7019
Nome #
WorkingAge: Providing Occupational Safety through Pervasive Sensing and Data Driven Behavior Modeling 197
The M2DC Approach towards Resource-efficient Computing 157
Fault Sensitivity Analysis at Design Time 154
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure 147
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges 139
V2I Cooperation for Traffic Management with SafeCOP 135
A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture 131
Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks 121
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design 117
Three-server swapping for access confidentiality 111
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project 110
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation 107
The M2DC Project: Modular Microserver DataCentre 106
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost 106
Design Space Extension for Secure Implementation of Block Ciphers 104
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware 104
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes 103
Programming highly parallel reconfigurable architectures for symmetric and asymmetric cryptographic applications 102
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel 101
A Unified Approach to Canonical Form-based Boolean Matching 98
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software 98
Countermeasures against branch target buffer attacks 95
Security Integration in Medical Device Design: Extension of an Automated Biomedical Engineering Design Methodology 94
A Novel Regular Format for X.509 Digital Certificates 94
Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks 93
Security Challenges in Building Automation and SCADA 92
Computational intelligence techniques to detect toxic gas presence 91
Accelerating Automotive Analytics: The M2DC Appliance Approach 89
Design Time Engineering of Side Channel Resistant Cipher Implementations 88
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks 88
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems 88
Security and Privacy in Smart Grid Infrastructures 86
Smart metering in power grids: Application scenarios and security 86
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? 86
Parallel hardware architectures for the cryptographic Tate pairing 85
Supporting Concurrency and Multiple Indexes in Private Access to Outsourced Data 85
Data Centres for IoT applications: the M2DC Approach 85
Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application 83
Snake: an End-to-End Encrypted Online Social Network 83
Automated instantiation of side-channel attacks countermeasures for software cipher implementations 83
Trace-based Schedulability Analysis to Enhance Passive Side-Channel Attack Resilience of Embedded Software 82
A dynamic tree-based data structure for access privacy in the cloud 81
Compiler-based Techniques to Secure Cryptographic Embedded Software against Side Channel Attacks 80
M2DC-A novel heterogeneous hyperscale microserver platform 78
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions 78
Side-channel security of superscalar CPUs: Evaluating the Impact of Micro-architectural Features 77
A pairing SW implementation for smart-cards 75
Efficient and Private Access to Outsourced Data 75
On the Security of Partially Masked Software Implementations 75
A Fault Induction Technique Based on Voltage Underfeeding with Application to Attacks against AES and RSA 74
Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes 74
Decision Support Systems to Promote Health and Well-being of People during their Working Age: the Case of the WorkingAge EU Project 74
Software-only reverse engineering of physical dram mappings for rowhammer attacks 73
Fault attack on AES with single-bit induced faults 71
A note on fault attacks against deterministic signature schemes 71
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes 71
A secure and authenticated host-to-memory communication interface 71
A Code Morphing Methodology to Automate Power Analysis Countermeasures 70
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions 70
Fast Disk Encryption Through GPGPU Acceleration 69
Record Setting Software Implementation of DES Using CUDA 69
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate 69
OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives 69
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs 68
Systematic Parsing of X.509: Eradicating Security Issues with a Parse Tree 68
Supporting Concurrency in Private Data Outsourcing 67
A FPGA coprocessor for the cryptographic Tate pairing over Fp 67
Encryption-based Policy Enforcement for Cloud Storage 67
A Transform-Parametric Approach to Boolean Matching 66
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives 65
A Security Audit of the OpenPGP Format 65
Towards transparently tackling functionality and performance issues across different OpenCL platforms 65
Access control for the shuffle index 63
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers 63
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution 62
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults 61
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems 60
Improving first order differential power attacks through Digital Signal Processing 60
Selective Exchange of Confidential Data in the Outsourcing Scenario 60
Injection Technologies for Fault Attacks on Microprocessors 60
Parallel hardware architectures for the cryptographic Tate pairing 60
Shuffle Index: Efficient and Private Access to Outsourced Data 60
On Task Assignment in Data Intensive Scalable Computing 60
Low Voltage Fault Attacks on the RSA Cryptosystem 59
Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception 59
Design of a Parallel AES for Graphics Hardware using the CUDA framework 59
Efficient Oblivious Substring Search via Architectural Support 59
A Domain Specific Language for Cryptography 58
Low voltage fault attacks to AES 58
Information Leakage Discovery Techniques to Enhance Secure Chip Design 58
Enforcing authorizations while protecting access confidentiality 57
Distributed Shuffling for Preserving Access Confidentiality 56
A Finite Regime Analysis of Information Set Decoding Algorithms 55
Protecting access confidentiality with data distribution and swapping 55
Software implementation of Tate pairing over GF(2m) 51
Access Privacy in the Cloud 51
Symmetric key encryption acceleration on heterogeneous many-core architectures 50
Secure and Efficient Design of Block Cipher Implementations on Microcontrollers 49
Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques 49
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis 48
Totale 8116
Categoria #
all - tutte 11596
article - articoli 2701
book - libri 0
conference - conferenze 6599
curatela - curatele 301
other - altro 0
patent - brevetti 368
selected - selezionate 0
volume - volumi 1627
Totale 23192


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2017/20181122 005917 2234 129634 552512819
2018/20191181 622758 3749 3117 31221375327
2019/20202839 20819390220 350362 332253 290143241157
2020/20211792 13211214499 151114 87144 144224125316
2021/20221419 84139111121 14959 80125 8992134236
2022/2023370 209116450 00 00 0000
Totale 9237