FOCARDI, Riccardo
 Distribuzione geografica
Continente #
NA - Nord America 18.807
EU - Europa 10.489
AS - Asia 4.807
AF - Africa 96
SA - Sud America 55
Continente sconosciuto - Info sul continente non disponibili 26
OC - Oceania 24
Totale 34.304
Nazione #
US - Stati Uniti d'America 17.866
CN - Cina 3.111
PL - Polonia 2.168
IT - Italia 2.019
DE - Germania 1.337
GB - Regno Unito 923
CA - Canada 921
SG - Singapore 853
UA - Ucraina 817
IE - Irlanda 805
SE - Svezia 505
FI - Finlandia 491
RU - Federazione Russa 355
AT - Austria 238
FR - Francia 196
TR - Turchia 191
HK - Hong Kong 149
NL - Olanda 114
DK - Danimarca 70
BE - Belgio 58
CZ - Repubblica Ceca 54
PH - Filippine 54
CH - Svizzera 53
IN - India 53
ES - Italia 47
JO - Giordania 44
KR - Corea 44
BG - Bulgaria 43
VN - Vietnam 42
JP - Giappone 41
ZA - Sudafrica 38
RO - Romania 34
IR - Iran 33
ID - Indonesia 29
BR - Brasile 27
MY - Malesia 27
MD - Moldavia 25
RS - Serbia 24
EU - Europa 23
PT - Portogallo 22
AU - Australia 19
UZ - Uzbekistan 19
SA - Arabia Saudita 18
TW - Taiwan 18
GR - Grecia 14
PK - Pakistan 14
SI - Slovenia 13
EG - Egitto 11
UY - Uruguay 11
BD - Bangladesh 10
CL - Cile 10
MA - Marocco 10
NO - Norvegia 10
BY - Bielorussia 9
IL - Israele 9
HR - Croazia 8
LT - Lituania 8
MX - Messico 8
HU - Ungheria 7
LB - Libano 7
NG - Nigeria 7
CM - Camerun 6
LU - Lussemburgo 5
NZ - Nuova Zelanda 5
TH - Thailandia 5
CI - Costa d'Avorio 4
CO - Colombia 4
CY - Cipro 4
GE - Georgia 4
GH - Ghana 4
KH - Cambogia 4
MK - Macedonia 4
SC - Seychelles 4
A2 - ???statistics.table.value.countryCode.A2??? 3
AZ - Azerbaigian 3
CR - Costa Rica 3
IS - Islanda 3
LV - Lettonia 3
MQ - Martinica 3
OM - Oman 3
PA - Panama 3
BA - Bosnia-Erzegovina 2
DO - Repubblica Dominicana 2
DZ - Algeria 2
EE - Estonia 2
ET - Etiopia 2
KZ - Kazakistan 2
LK - Sri Lanka 2
MU - Mauritius 2
NP - Nepal 2
PE - Perù 2
TM - Turkmenistan 2
AE - Emirati Arabi Uniti 1
AF - Afghanistan, Repubblica islamica di 1
AM - Armenia 1
AN - Antille olandesi 1
AR - Argentina 1
BH - Bahrain 1
GI - Gibilterra 1
IM - Isola di Man 1
Totale 34.291
Città #
Woodbridge 2.645
Fairfield 1.925
Warsaw 1.920
Chandler 1.370
Jacksonville 1.302
Ann Arbor 1.120
Houston 1.025
Ashburn 990
Seattle 839
Dublin 801
Wilmington 660
Cambridge 643
Singapore 556
Dearborn 540
Montréal 471
Munich 450
Mcallen 423
Nanjing 356
Jinan 328
Mestre 297
Shenyang 287
Boardman 277
Guangzhou 259
New York 255
Venezia 248
Beijing 219
Vienna 209
Izmir 176
Venice 165
Boston 158
San Mateo 155
Andover 153
Ottawa 150
Hebei 142
Princeton 137
Mülheim 136
Tianjin 136
Hong Kong 116
Changsha 108
Montreal 108
Taiyuan 106
Polska 104
Des Moines 100
San Diego 100
Zhengzhou 100
Taizhou 94
Hangzhou 93
Nanchang 93
Las Vegas 91
Jiaxing 89
Toronto 86
Haikou 84
Ningbo 82
El Cajon 81
Parma 78
Saint Petersburg 67
Fuzhou 66
Milan 63
Berlin 62
Redwood City 61
Altamura 59
Verona 57
Helsinki 56
Kraków 54
London 54
Lexington 53
Hewlett 51
Los Angeles 50
Denton 48
Brandenburg 46
Philadelphia 42
St Petersburg 42
San Paolo di Civitate 41
Brussels 40
Winnipeg 39
Santa Clara 37
Beauharnois 36
Moscow 36
Washington 36
Hefei 35
Krakow 34
Polesovice 33
Brownsville 32
Dong Ket 32
Davao City 31
Kunming 31
Amsterdam 29
Frankfurt am Main 28
Johannesburg 28
Chicago 26
Flushing 26
Tokyo 24
Torino 24
Cuges-les-Pins 23
Bremen 20
Kyiv 20
Madrid 20
Norwalk 20
Jakarta 19
Nuremberg 19
Totale 25.386
Nome #
CookiExt: Patching the browser against session hijacking attacks 3.739
First Italian Conference on Cybersecurity 1.904
Mind Your Keys? A Security Evaluation of Java Keystores 526
Usable Cryptographic QR Codes 474
Run-time analysis of PKCS#11 attacks 442
Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study 432
Gathering of robots in a ring with mobile faults 412
Match It or Die: Proving Integrity by Equality 406
Surviving the Web: A Journey into Web Session Security 406
Formal methods for web security 400
Development of security extensions based on Chrome APIs 387
APDU-Level Attacks in PKCS#11 Devices 377
Formal Analysis of Key Integrity in PKCS#11 376
Firewall management with FireWall synthesizer 370
Localizing Firewall Security Policies 341
Channel Abstractions for Network Security 337
Postcards from the post-HTTP world: Amplification of HTTPS vulnerabilities in the web ecosystem 334
Mignis: A semantic based tool for firewall configuration 331
Transcompiling Firewalls 317
Gathering of robots in a ring with mobile faults 314
Language-Independent Synthesis of Firewall Policies 304
Efficient Padding Oracle Attacks on Cryptographic Hardware 301
Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients 300
Run-Time Attack Detection in Cryptographic APIs 294
Provably Sound Browser-Based Enforcement of Web Session Integrity 288
A Classification of Security Properties for Process Algebras 286
A modular approach to Sprouts 286
Mitch: A machine learning approach to the black-box detection of CSRF vulnerabilities 283
A calculus of challenges and responses 282
Fast SQL Blind Injections in High Latency Networks. 278
Shaping the Glitch: Optimizing Voltage Fault Injection Attacks 276
Micro-Policies for Web Session Security 275
Gran: model checking grsecurity RBAC policies 274
BANANA: A tool for Boundary Ambients Nesting ANAlysis 269
Automatic and robust client-side protection for cookie-based sessions 267
Secure your PKCS#11 token against API attacks! 264
A Survey of Name-Passing Calculi and Crypto-Primitives 256
Usable security for QR code 252
Practical Padding Oracle Attacks on RSA 245
Localizing Security for Distributed Firewalls 240
Automated Analysis of PUF-based Protocols 238
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring 236
Fixing PKCS#11 by key-diversification 231
Analysing Sprouts 230
Type-Based Analysis of PIN Processing APIs 229
Analysis of Typed Analyses of Authentication Protocols 228
Authentication primitives for secure protocol specifications 226
Complexity of Nesting Analysis in Mobile Ambients 225
Type-Based Analysis of Generic Key Management APIs 225
Boundary Inference for Enforcing Security Policies in Mobile Ambients 224
Authenticity by tagging and typing 222
Type-Based Analysis of PKCS#11 Key Management 220
Getting to know your card: Reverse-engineering the smart-card application protocol data unit 220
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties 218
Blunting Differential Attacks on PIN Processing APIs 212
A Proof System for Information Flow Security 211
A Comparison of Three Authentication Properties 211
An Introduction to Security API Analysis 210
A semantic based tool for firewall configuration 209
A hard lesson: Assessing the HTTPS deployment of Italian university websites 209
Refinement Operators and Information Flow Security 208
Guessing Bank PINs by Winning a Mastermind Game 206
Information Leakage Detection in Boundary Ambients 204
Types for security protocols 204
FWS: Analyzing, maintaining and transcompiling firewalls 203
Unwinding in Information Flow Security 202
Primitives for Authentication in Process Algebras 201
Bisimulation and Unwinding for Verifying Possibilistic Security Properties 200
Nesting analysis of mobile ambients 200
Feedback Vertex Set in Hypercubes 200
Information Flow Security in Mobile Ambients 199
Computer Languages and Security 198
Authentication Primitives for Protocol Specifications 197
A new analysis technique for the Sprouts Game 196
Language Based Secure Communication 194
Principles for Entity Authentication 192
Information flow security of multi-threaded distributed programs 192
Non Interference for the Analysis of Cryptographic Protocols 190
Type-based Analysis of Key Management in PKCS#11 cryptographic devices 190
Attacking and Fixing PKCS#11 Security Tokens. 185
Control Flow Analysis of Mobile Ambients with Security Boundaries 184
Cracking Bank PINs by Playing Mastermind 184
Compositional Analysis of Authentication Protocols 183
Transforming processes to check and ensure Information Flow Security 179
A Compiler for Analysing Cryptographic Protocols Using Non-Interference 177
Static Analysis of Authentication 177
Analysis and development of Security APIs for disposable RFID tickets 177
Secure upgrade of hardware security modules in bank networks 172
Real-Time Information Flow Analysis 171
Information Flow Security in Dynamic Contexts 171
A Security Property for Processes in Dynamic Contexts 165
Information Flow Security in Dynamic Contexts 165
The ro-spi Calculus at Work: Authentication Case Studies 164
Bridging Language-Based and Process Calculi Security 162
Security Abstractions and Intruder Models 162
Language-Based Web Session Integrity 162
Verifying Persistent Security Properties. 161
Minumum Feedback Vertex Set in k-Dimensional Hypercubes 161
Dynamic Types for Authentication 156
Proceedings of 16th IEEE Computer Security Foundations Workshop (CSFW16) 154
Totale 29.927
Categoria #
all - tutte 102.428
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 102.428


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20203.910 0 0 0 0 501 731 491 685 484 458 350 210
2020/20215.690 335 413 372 259 754 712 360 374 287 641 664 519
2021/20224.405 506 653 381 555 310 74 178 112 79 508 666 383
2022/20235.111 277 363 86 527 665 1.191 236 409 573 137 426 221
2023/20243.199 255 235 171 238 354 504 242 170 192 223 340 275
2024/20251.411 232 216 353 368 242 0 0 0 0 0 0 0
Totale 34.944