FOCARDI, Riccardo
 Distribuzione geografica
Continente #
NA - Nord America 18.224
EU - Europa 9.976
AS - Asia 4.160
AF - Africa 84
SA - Sud America 30
Continente sconosciuto - Info sul continente non disponibili 26
OC - Oceania 17
Totale 32.517
Nazione #
US - Stati Uniti d'America 17.310
CN - Cina 3.026
PL - Polonia 2.160
IT - Italia 1.898
DE - Germania 1.224
GB - Regno Unito 911
CA - Canada 898
UA - Ucraina 804
IE - Irlanda 777
SE - Svezia 501
FI - Finlandia 474
SG - Singapore 395
RU - Federazione Russa 269
AT - Austria 224
TR - Turchia 187
FR - Francia 173
HK - Hong Kong 142
NL - Olanda 89
DK - Danimarca 68
BE - Belgio 58
CZ - Repubblica Ceca 54
CH - Svizzera 53
PH - Filippine 48
IN - India 44
JO - Giordania 44
BG - Bulgaria 39
JP - Giappone 38
ES - Italia 37
VN - Vietnam 36
ZA - Sudafrica 36
KR - Corea 32
IR - Iran 31
RO - Romania 27
MD - Moldavia 24
MY - Malesia 24
RS - Serbia 24
EU - Europa 23
UZ - Uzbekistan 19
PT - Portogallo 15
SA - Arabia Saudita 15
AU - Australia 13
GR - Grecia 13
PK - Pakistan 13
BR - Brasile 12
SI - Slovenia 12
EG - Egitto 11
TW - Taiwan 11
CL - Cile 10
NO - Norvegia 9
BY - Bielorussia 8
ID - Indonesia 8
HU - Ungheria 7
IL - Israele 7
LB - Libano 7
MX - Messico 7
CM - Camerun 6
HR - Croazia 6
LT - Lituania 6
BD - Bangladesh 5
MA - Marocco 5
NG - Nigeria 5
CI - Costa d'Avorio 4
GH - Ghana 4
KH - Cambogia 4
NZ - Nuova Zelanda 4
SC - Seychelles 4
TH - Thailandia 4
A2 - ???statistics.table.value.countryCode.A2??? 3
AZ - Azerbaigian 3
CO - Colombia 3
CR - Costa Rica 3
CY - Cipro 3
GE - Georgia 3
LV - Lettonia 3
PA - Panama 3
UY - Uruguay 3
DO - Repubblica Dominicana 2
EE - Estonia 2
ET - Etiopia 2
LU - Lussemburgo 2
MU - Mauritius 2
NP - Nepal 2
PE - Perù 2
AF - Afghanistan, Repubblica islamica di 1
AM - Armenia 1
AN - Antille olandesi 1
BH - Bahrain 1
GI - Gibilterra 1
IM - Isola di Man 1
IQ - Iraq 1
IS - Islanda 1
KE - Kenya 1
KG - Kirghizistan 1
KW - Kuwait 1
KZ - Kazakistan 1
LR - Liberia 1
ME - Montenegro 1
MK - Macedonia 1
MN - Mongolia 1
MW - Malawi 1
Totale 32.514
Città #
Woodbridge 2.645
Fairfield 1.925
Warsaw 1.915
Chandler 1.370
Jacksonville 1.301
Ann Arbor 1.120
Houston 1.022
Ashburn 965
Seattle 835
Dublin 773
Wilmington 659
Cambridge 643
Dearborn 540
Montréal 471
Munich 445
Mcallen 423
Nanjing 356
Jinan 328
Mestre 297
Shenyang 286
Guangzhou 259
New York 254
Venezia 248
Singapore 235
Beijing 215
Vienna 200
Izmir 176
Boston 158
San Mateo 155
Andover 153
Ottawa 149
Hebei 142
Venice 140
Princeton 137
Mülheim 136
Tianjin 136
Boardman 123
Hong Kong 115
Changsha 107
Taiyuan 105
Polska 104
Des Moines 100
San Diego 100
Zhengzhou 99
Montreal 98
Taizhou 94
Hangzhou 93
Nanchang 93
Jiaxing 89
Haikou 84
Toronto 83
Ningbo 82
El Cajon 81
Saint Petersburg 67
Fuzhou 66
Redwood City 61
Altamura 59
Milan 58
Kraków 54
London 52
Hewlett 51
Lexington 51
Verona 47
Denton 46
Parma 43
Philadelphia 42
St Petersburg 42
San Paolo di Civitate 41
Brussels 40
Helsinki 39
Winnipeg 39
Brandenburg 38
Beauharnois 35
Hefei 35
Krakow 34
Los Angeles 33
Polesovice 33
Dong Ket 32
Kunming 31
Washington 31
Davao City 30
Brownsville 28
Johannesburg 27
Moscow 27
Amsterdam 26
Flushing 26
Chicago 24
Torino 24
Cuges-les-Pins 23
Tokyo 23
Frankfurt am Main 21
Bremen 20
Norwalk 20
Sofia 18
Kyiv 17
Xian 17
Zurich 17
Madrid 16
Berlin 15
Krefeld 15
Totale 24.496
Nome #
CookiExt: Patching the browser against session hijacking attacks 3.095
First Italian Conference on Cybersecurity 1.865
Mind Your Keys? A Security Evaluation of Java Keystores 477
Usable Cryptographic QR Codes 469
Run-time analysis of PKCS#11 attacks 432
Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study 422
Gathering of robots in a ring with mobile faults 404
Match It or Die: Proving Integrity by Equality 401
Formal methods for web security 388
Surviving the Web: A Journey into Web Session Security 383
Development of security extensions based on Chrome APIs 380
Formal Analysis of Key Integrity in PKCS#11 371
APDU-Level Attacks in PKCS#11 Devices 365
Localizing Firewall Security Policies 339
Firewall management with FireWall synthesizer 337
Channel Abstractions for Network Security 333
Postcards from the post-HTTP world: Amplification of HTTPS vulnerabilities in the web ecosystem 325
Mignis: A semantic based tool for firewall configuration 323
Transcompiling Firewalls 308
Gathering of robots in a ring with mobile faults 308
Language-Independent Synthesis of Firewall Policies 300
Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients 297
Efficient Padding Oracle Attacks on Cryptographic Hardware 294
Run-Time Attack Detection in Cryptographic APIs 287
Provably Sound Browser-Based Enforcement of Web Session Integrity 283
A Classification of Security Properties for Process Algebras 279
A modular approach to Sprouts 276
Fast SQL Blind Injections in High Latency Networks. 272
A calculus of challenges and responses 271
Mitch: A machine learning approach to the black-box detection of CSRF vulnerabilities 270
Gran: model checking grsecurity RBAC policies 266
Micro-Policies for Web Session Security 266
BANANA: A tool for Boundary Ambients Nesting ANAlysis 265
Secure your PKCS#11 token against API attacks! 259
Automatic and robust client-side protection for cookie-based sessions 258
A Survey of Name-Passing Calculi and Crypto-Primitives 248
Usable security for QR code 243
Practical Padding Oracle Attacks on RSA 241
Localizing Security for Distributed Firewalls 237
Automated Analysis of PUF-based Protocols 225
Analysing Sprouts 224
Type-Based Analysis of PIN Processing APIs 224
Fixing PKCS#11 by key-diversification 224
Authentication primitives for secure protocol specifications 222
Analysis of Typed Analyses of Authentication Protocols 221
Complexity of Nesting Analysis in Mobile Ambients 221
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring 221
Boundary Inference for Enforcing Security Policies in Mobile Ambients 220
Type-Based Analysis of Generic Key Management APIs 219
Authenticity by tagging and typing 215
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties 214
Type-Based Analysis of PKCS#11 Key Management 213
Blunting Differential Attacks on PIN Processing APIs 208
A Proof System for Information Flow Security 202
Getting to know your card: Reverse-engineering the smart-card application protocol data unit 202
A Comparison of Three Authentication Properties 201
Refinement Operators and Information Flow Security 201
Guessing Bank PINs by Winning a Mastermind Game 201
Information Leakage Detection in Boundary Ambients 199
An Introduction to Security API Analysis 199
Primitives for Authentication in Process Algebras 199
A semantic based tool for firewall configuration 198
Information Flow Security in Mobile Ambients 196
Unwinding in Information Flow Security 196
Feedback Vertex Set in Hypercubes 196
Types for security protocols 196
Computer Languages and Security 195
Authentication Primitives for Protocol Specifications 194
Nesting analysis of mobile ambients 194
Bisimulation and Unwinding for Verifying Possibilistic Security Properties 192
Information flow security of multi-threaded distributed programs 191
Language Based Secure Communication 190
Principles for Entity Authentication 189
A hard lesson: Assessing the HTTPS deployment of Italian university websites 189
A new analysis technique for the Sprouts Game 188
FWS: Analyzing, maintaining and transcompiling firewalls 187
Non Interference for the Analysis of Cryptographic Protocols 186
Attacking and Fixing PKCS#11 Security Tokens. 183
Control Flow Analysis of Mobile Ambients with Security Boundaries 181
Type-based Analysis of Key Management in PKCS#11 cryptographic devices 181
Compositional Analysis of Authentication Protocols 179
Cracking Bank PINs by Playing Mastermind 178
Shaping the Glitch: Optimizing Voltage Fault Injection Attacks 178
Static Analysis of Authentication 173
Transforming processes to check and ensure Information Flow Security 172
Analysis and development of Security APIs for disposable RFID tickets 170
A Compiler for Analysing Cryptographic Protocols Using Non-Interference 169
Secure upgrade of hardware security modules in bank networks 169
Real-Time Information Flow Analysis 168
Information Flow Security in Dynamic Contexts 164
The ro-spi Calculus at Work: Authentication Case Studies 161
Security Abstractions and Intruder Models 159
A Security Property for Processes in Dynamic Contexts 158
Information Flow Security in Dynamic Contexts 158
Bridging Language-Based and Process Calculi Security 157
Minumum Feedback Vertex Set in k-Dimensional Hypercubes 157
Verifying Persistent Security Properties. 154
Proceedings of 16th IEEE Computer Security Foundations Workshop (CSFW16) 152
Dynamic Types for Authentication 152
Inferring Authentication Tags 151
Totale 28.413
Categoria #
all - tutte 88.834
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 88.834


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/20191.383 0 0 0 0 0 0 0 0 0 0 555 828
2019/20206.954 648 435 483 1.478 501 731 491 685 484 458 350 210
2020/20215.690 335 413 372 259 754 712 360 374 287 641 664 519
2021/20224.405 506 653 381 555 310 74 178 112 79 508 666 383
2022/20235.111 277 363 86 527 665 1.191 236 409 573 137 426 221
2023/20242.821 255 235 171 238 354 504 242 170 192 223 237 0
Totale 33.155