FOCARDI, Riccardo
 Distribuzione geografica
Continente #
NA - Nord America 21.387
EU - Europa 11.726
AS - Asia 8.160
SA - Sud America 672
AF - Africa 221
OC - Oceania 34
Continente sconosciuto - Info sul continente non disponibili 26
AN - Antartide 1
Totale 42.227
Nazione #
US - Stati Uniti d'America 20.345
CN - Cina 4.001
IT - Italia 2.341
PL - Polonia 2.231
SG - Singapore 2.127
DE - Germania 1.530
GB - Regno Unito 995
CA - Canada 978
UA - Ucraina 833
IE - Irlanda 809
RU - Federazione Russa 571
BR - Brasile 561
FI - Finlandia 533
SE - Svezia 527
HK - Hong Kong 456
IN - India 288
FR - Francia 274
AT - Austria 264
TR - Turchia 218
JP - Giappone 203
VN - Vietnam 181
KR - Corea 180
NL - Olanda 170
CH - Svizzera 77
DK - Danimarca 73
ES - Italia 71
BE - Belgio 60
CZ - Repubblica Ceca 60
PH - Filippine 59
ZA - Sudafrica 59
ID - Indonesia 55
MA - Marocco 51
BG - Bulgaria 49
JO - Giordania 48
MY - Malesia 48
MX - Messico 40
RO - Romania 40
IR - Iran 38
AR - Argentina 30
PT - Portogallo 30
AU - Australia 29
RS - Serbia 29
BD - Bangladesh 28
MD - Moldavia 27
PK - Pakistan 27
SA - Arabia Saudita 25
IL - Israele 24
TW - Taiwan 24
EU - Europa 23
UZ - Uzbekistan 23
GR - Grecia 22
EG - Egitto 21
NO - Norvegia 20
CL - Cile 18
IQ - Iraq 17
LT - Lituania 17
VE - Venezuela 16
BJ - Benin 15
UY - Uruguay 14
EC - Ecuador 13
SI - Slovenia 13
KE - Kenya 10
NG - Nigeria 10
BY - Bielorussia 9
HU - Ungheria 9
TH - Thailandia 9
TN - Tunisia 9
AE - Emirati Arabi Uniti 8
CO - Colombia 8
HR - Croazia 8
LB - Libano 8
AZ - Azerbaigian 7
GE - Georgia 7
CM - Camerun 6
KZ - Kazakistan 6
LU - Lussemburgo 6
OM - Oman 6
QA - Qatar 6
CI - Costa d'Avorio 5
DO - Repubblica Dominicana 5
MU - Mauritius 5
NP - Nepal 5
NZ - Nuova Zelanda 5
PE - Perù 5
BA - Bosnia-Erzegovina 4
CR - Costa Rica 4
CY - Cipro 4
DZ - Algeria 4
GH - Ghana 4
IS - Islanda 4
KH - Cambogia 4
LV - Lettonia 4
MK - Macedonia 4
PA - Panama 4
PY - Paraguay 4
SC - Seychelles 4
A2 - ???statistics.table.value.countryCode.A2??? 3
AM - Armenia 3
AO - Angola 3
BO - Bolivia 3
Totale 42.171
Città #
Woodbridge 2.645
Warsaw 1.967
Fairfield 1.925
Ashburn 1.625
Chandler 1.370
Jacksonville 1.303
Singapore 1.163
Ann Arbor 1.120
Houston 1.035
Seattle 845
Dublin 804
Wilmington 662
Cambridge 644
Dearborn 540
Munich 501
Dallas 484
Montréal 471
Mcallen 423
Hong Kong 414
Beijing 362
Nanjing 357
Guangzhou 331
Jinan 330
New York 317
Boardman 305
Mestre 298
Hefei 293
Shenyang 293
Venice 292
Venezia 248
Vienna 226
Council Bluffs 213
Izmir 176
Boston 169
Bengaluru 161
Los Angeles 160
San Mateo 155
Andover 153
Ottawa 150
Hebei 142
Montreal 140
The Dalles 138
Princeton 137
Tianjin 137
Mülheim 136
Parma 117
Changsha 116
Seoul 112
Des Moines 109
Taiyuan 107
San Diego 106
Polska 104
Zhengzhou 104
Buffalo 101
Hangzhou 98
Toronto 97
Taizhou 95
Las Vegas 94
Nanchang 93
Jiaxing 89
Haikou 84
Ningbo 83
Santa Clara 83
El Cajon 81
Moscow 80
Frankfurt am Main 78
Berlin 75
Milan 74
Verona 74
Tokyo 72
London 69
Fuzhou 67
Helsinki 67
Saint Petersburg 67
Redwood City 61
Altamura 59
Ho Chi Minh City 59
Brandenburg 55
Kraków 54
Lexington 53
Chicago 52
Columbus 51
Hewlett 51
Amsterdam 48
Denton 48
St Petersburg 47
Casablanca 44
São Paulo 44
Philadelphia 43
Brussels 41
San Paolo di Civitate 41
Johannesburg 40
Rome 40
Winnipeg 39
Nuremberg 38
Washington 38
Beauharnois 36
Brooklyn 35
Jakarta 35
Krakow 34
Totale 29.542
Nome #
CookiExt: Patching the browser against session hijacking attacks 4.831
First Italian Conference on Cybersecurity 1.963
Mind Your Keys? A Security Evaluation of Java Keystores 645
Usable Cryptographic QR Codes 513
Run-time analysis of PKCS#11 attacks 499
Shaping the Glitch: Optimizing Voltage Fault Injection Attacks 487
Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study 474
APDU-Level Attacks in PKCS#11 Devices 466
Surviving the Web: A Journey into Web Session Security 466
Formal methods for web security 453
Gathering of robots in a ring with mobile faults 450
Match It or Die: Proving Integrity by Equality 444
Firewall management with FireWall synthesizer 441
Development of security extensions based on Chrome APIs 435
Formal Analysis of Key Integrity in PKCS#11 414
Postcards from the post-HTTP world: Amplification of HTTPS vulnerabilities in the web ecosystem 394
Channel Abstractions for Network Security 378
Mignis: A semantic based tool for firewall configuration 377
Localizing Firewall Security Policies 372
Language-Independent Synthesis of Firewall Policies 357
A calculus of challenges and responses 357
Transcompiling Firewalls 355
Gathering of robots in a ring with mobile faults 355
Mitch: A machine learning approach to the black-box detection of CSRF vulnerabilities 354
A modular approach to Sprouts 348
Provably Sound Browser-Based Enforcement of Web Session Integrity 346
A Classification of Security Properties for Process Algebras 344
Efficient Padding Oracle Attacks on Cryptographic Hardware 334
Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients 333
Run-Time Attack Detection in Cryptographic APIs 330
Micro-Policies for Web Session Security 328
Automatic and robust client-side protection for cookie-based sessions 322
Gran: model checking grsecurity RBAC policies 321
Fast SQL Blind Injections in High Latency Networks. 314
A Survey of Name-Passing Calculi and Crypto-Primitives 310
Usable security for QR code 309
Practical Padding Oracle Attacks on RSA 294
BANANA: A tool for Boundary Ambients Nesting ANAlysis 293
Authenticity by tagging and typing 291
Secure your PKCS#11 token against API attacks! 289
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring 289
An Introduction to Security API Analysis 286
Analysing Sprouts 284
Analysis of Typed Analyses of Authentication Protocols 282
A Proof System for Information Flow Security 277
Getting to know your card: Reverse-engineering the smart-card application protocol data unit 277
A hard lesson: Assessing the HTTPS deployment of Italian university websites 274
Fixing PKCS#11 by key-diversification 269
Automated Analysis of PUF-based Protocols 268
Localizing Security for Distributed Firewalls 267
A semantic based tool for firewall configuration 266
A Comparison of Three Authentication Properties 260
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties 259
A new analysis technique for the Sprouts Game 258
Bisimulation and Unwinding for Verifying Possibilistic Security Properties 257
Complexity of Nesting Analysis in Mobile Ambients 257
Type-Based Analysis of PIN Processing APIs 256
FWS: Analyzing, maintaining and transcompiling firewalls 256
Type-Based Analysis of PKCS#11 Key Management 254
Boundary Inference for Enforcing Security Policies in Mobile Ambients 254
Feedback Vertex Set in Hypercubes 253
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery 249
Authentication primitives for secure protocol specifications 246
Refinement Operators and Information Flow Security 245
Guessing Bank PINs by Winning a Mastermind Game 245
Type-Based Analysis of Generic Key Management APIs 244
Information Leakage Detection in Boundary Ambients 241
Blunting Differential Attacks on PIN Processing APIs 241
Types for security protocols 241
Unwinding in Information Flow Security 240
Information Flow Security in Mobile Ambients 239
Authentication Primitives for Protocol Specifications 238
Computer Languages and Security 236
A Compiler for Analysing Cryptographic Protocols Using Non-Interference 236
Non Interference for the Analysis of Cryptographic Protocols 235
Nesting analysis of mobile ambients 234
Analysis and development of Security APIs for disposable RFID tickets 231
Type-based Analysis of Key Management in PKCS#11 cryptographic devices 231
Information flow security of multi-threaded distributed programs 229
A Security Property for Processes in Dynamic Contexts 225
Primitives for Authentication in Process Algebras 225
Real-Time Information Flow Analysis 224
Language-Based Web Session Integrity 224
Control Flow Analysis of Mobile Ambients with Security Boundaries 222
Language Based Secure Communication 221
Principles for Entity Authentication 219
Compositional Analysis of Authentication Protocols 217
Attacking and Fixing PKCS#11 Security Tokens. 213
Static Analysis of Authentication 212
Bridging Language-Based and Process Calculi Security 210
Cracking Bank PINs by Playing Mastermind 208
A New Definition of Multilevel Security 207
Information Flow Security in Dynamic Contexts 206
Transforming processes to check and ensure Information Flow Security 204
Secure upgrade of hardware security modules in bank networks 200
Security Abstractions and Intruder Models 198
Verifying Persistent Security Properties. 197
A formally verified configuration for Hardware Security Modules in the cloud 197
Dynamic Types for Authentication 195
The ro-spi Calculus at Work: Authentication Case Studies 194
Totale 35.708
Categoria #
all - tutte 131.368
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 131.368


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20213.557 0 0 0 0 0 712 360 374 287 641 664 519
2021/20224.405 506 653 381 555 310 74 178 112 79 508 666 383
2022/20235.111 277 363 86 527 665 1.191 236 409 573 137 426 221
2023/20243.199 255 235 171 238 354 504 242 170 192 223 340 275
2024/20254.374 232 216 353 368 310 236 443 492 473 463 431 357
2025/20264.988 789 879 978 966 1.277 99 0 0 0 0 0 0
Totale 42.895