FOCARDI, Riccardo
 Distribuzione geografica
Continente #
NA - Nord America 18.209
EU - Europa 9.946
AS - Asia 3.990
AF - Africa 82
SA - Sud America 29
Continente sconosciuto - Info sul continente non disponibili 26
OC - Oceania 16
Totale 32.298
Nazione #
US - Stati Uniti d'America 17.295
CN - Cina 3.004
PL - Polonia 2.157
IT - Italia 1.898
DE - Germania 1.215
GB - Regno Unito 911
CA - Canada 898
UA - Ucraina 804
IE - Irlanda 775
SE - Svezia 501
FI - Finlandia 473
RU - Federazione Russa 269
SG - Singapore 252
AT - Austria 224
TR - Turchia 187
FR - Francia 170
HK - Hong Kong 141
NL - Olanda 83
DK - Danimarca 68
BE - Belgio 58
CZ - Repubblica Ceca 54
CH - Svizzera 53
PH - Filippine 48
JO - Giordania 44
IN - India 43
BG - Bulgaria 39
JP - Giappone 38
VN - Vietnam 36
ZA - Sudafrica 36
ES - Italia 32
KR - Corea 32
IR - Iran 31
RO - Romania 27
MD - Moldavia 24
MY - Malesia 24
RS - Serbia 24
EU - Europa 23
UZ - Uzbekistan 19
PT - Portogallo 14
SA - Arabia Saudita 14
GR - Grecia 13
PK - Pakistan 13
AU - Australia 12
SI - Slovenia 12
BR - Brasile 11
EG - Egitto 11
TW - Taiwan 11
CL - Cile 10
NO - Norvegia 9
BY - Bielorussia 8
ID - Indonesia 8
HU - Ungheria 7
LB - Libano 7
MX - Messico 7
CM - Camerun 6
HR - Croazia 6
IL - Israele 6
LT - Lituania 6
NG - Nigeria 5
BD - Bangladesh 4
CI - Costa d'Avorio 4
GH - Ghana 4
KH - Cambogia 4
NZ - Nuova Zelanda 4
SC - Seychelles 4
TH - Thailandia 4
A2 - ???statistics.table.value.countryCode.A2??? 3
AZ - Azerbaigian 3
CO - Colombia 3
CR - Costa Rica 3
CY - Cipro 3
GE - Georgia 3
LV - Lettonia 3
MA - Marocco 3
PA - Panama 3
UY - Uruguay 3
DO - Repubblica Dominicana 2
EE - Estonia 2
ET - Etiopia 2
LU - Lussemburgo 2
MU - Mauritius 2
NP - Nepal 2
PE - Perù 2
AF - Afghanistan, Repubblica islamica di 1
AM - Armenia 1
AN - Antille olandesi 1
BH - Bahrain 1
GI - Gibilterra 1
IM - Isola di Man 1
IQ - Iraq 1
IS - Islanda 1
KE - Kenya 1
KG - Kirghizistan 1
KW - Kuwait 1
KZ - Kazakistan 1
LR - Liberia 1
ME - Montenegro 1
MK - Macedonia 1
MN - Mongolia 1
MW - Malawi 1
Totale 32.295
Città #
Woodbridge 2.645
Fairfield 1.925
Warsaw 1.915
Chandler 1.370
Jacksonville 1.301
Ann Arbor 1.120
Houston 1.022
Ashburn 964
Seattle 835
Dublin 772
Wilmington 659
Cambridge 643
Dearborn 540
Montréal 471
Munich 445
Mcallen 423
Nanjing 356
Jinan 328
Mestre 297
Shenyang 286
New York 254
Venezia 248
Guangzhou 244
Beijing 213
Vienna 200
Izmir 176
Boston 158
San Mateo 155
Andover 153
Ottawa 149
Hebei 142
Venice 140
Princeton 137
Mülheim 136
Tianjin 136
Boardman 123
Hong Kong 115
Changsha 107
Taiyuan 105
Polska 104
Des Moines 100
San Diego 100
Zhengzhou 99
Montreal 98
Singapore 96
Taizhou 94
Hangzhou 93
Nanchang 93
Jiaxing 89
Haikou 84
Toronto 83
Ningbo 82
El Cajon 81
Saint Petersburg 67
Fuzhou 66
Redwood City 61
Altamura 59
Milan 58
Kraków 54
London 52
Hewlett 51
Lexington 51
Verona 47
Denton 44
Parma 43
St Petersburg 42
Philadelphia 41
San Paolo di Civitate 41
Brussels 40
Winnipeg 39
Brandenburg 38
Helsinki 38
Beauharnois 35
Hefei 35
Krakow 34
Los Angeles 33
Polesovice 33
Dong Ket 32
Kunming 31
Washington 31
Davao City 30
Johannesburg 27
Moscow 27
Flushing 26
Brownsville 24
Chicago 24
Torino 24
Cuges-les-Pins 23
Tokyo 23
Amsterdam 22
Frankfurt am Main 21
Bremen 20
Norwalk 20
Sofia 18
Kyiv 17
Xian 17
Zurich 17
Berlin 15
Krefeld 15
Latiano 15
Totale 24.325
Nome #
CookiExt: Patching the browser against session hijacking attacks 3.053
First Italian Conference on Cybersecurity 1.864
Mind Your Keys? A Security Evaluation of Java Keystores 472
Usable Cryptographic QR Codes 468
Run-time analysis of PKCS#11 attacks 431
Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study 421
Gathering of robots in a ring with mobile faults 403
Match It or Die: Proving Integrity by Equality 400
Formal methods for web security 387
Surviving the Web: A Journey into Web Session Security 381
Development of security extensions based on Chrome APIs 378
Formal Analysis of Key Integrity in PKCS#11 370
APDU-Level Attacks in PKCS#11 Devices 364
Localizing Firewall Security Policies 338
Firewall management with FireWall synthesizer 335
Channel Abstractions for Network Security 331
Postcards from the post-HTTP world: Amplification of HTTPS vulnerabilities in the web ecosystem 324
Mignis: A semantic based tool for firewall configuration 321
Gathering of robots in a ring with mobile faults 307
Transcompiling Firewalls 306
Language-Independent Synthesis of Firewall Policies 298
Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients 296
Efficient Padding Oracle Attacks on Cryptographic Hardware 293
Run-Time Attack Detection in Cryptographic APIs 286
Provably Sound Browser-Based Enforcement of Web Session Integrity 282
A Classification of Security Properties for Process Algebras 277
A modular approach to Sprouts 275
Fast SQL Blind Injections in High Latency Networks. 271
A calculus of challenges and responses 269
Mitch: A machine learning approach to the black-box detection of CSRF vulnerabilities 268
Gran: model checking grsecurity RBAC policies 265
Micro-Policies for Web Session Security 265
BANANA: A tool for Boundary Ambients Nesting ANAlysis 264
Secure your PKCS#11 token against API attacks! 258
Automatic and robust client-side protection for cookie-based sessions 256
A Survey of Name-Passing Calculi and Crypto-Primitives 246
Usable security for QR code 242
Practical Padding Oracle Attacks on RSA 240
Localizing Security for Distributed Firewalls 236
Automated Analysis of PUF-based Protocols 224
Analysing Sprouts 223
Fixing PKCS#11 by key-diversification 223
Type-Based Analysis of PIN Processing APIs 222
Authentication primitives for secure protocol specifications 221
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring 220
Analysis of Typed Analyses of Authentication Protocols 219
Complexity of Nesting Analysis in Mobile Ambients 219
Boundary Inference for Enforcing Security Policies in Mobile Ambients 219
Type-Based Analysis of Generic Key Management APIs 218
Authenticity by tagging and typing 214
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties 213
Type-Based Analysis of PKCS#11 Key Management 212
Blunting Differential Attacks on PIN Processing APIs 207
Getting to know your card: Reverse-engineering the smart-card application protocol data unit 201
A Proof System for Information Flow Security 200
A Comparison of Three Authentication Properties 200
Refinement Operators and Information Flow Security 200
Guessing Bank PINs by Winning a Mastermind Game 200
Information Leakage Detection in Boundary Ambients 198
An Introduction to Security API Analysis 198
Primitives for Authentication in Process Algebras 198
Information Flow Security in Mobile Ambients 195
Unwinding in Information Flow Security 195
Computer Languages and Security 194
A semantic based tool for firewall configuration 194
Types for security protocols 194
Authentication Primitives for Protocol Specifications 193
Nesting analysis of mobile ambients 193
Feedback Vertex Set in Hypercubes 193
Bisimulation and Unwinding for Verifying Possibilistic Security Properties 190
Information flow security of multi-threaded distributed programs 190
Language Based Secure Communication 189
Principles for Entity Authentication 188
A new analysis technique for the Sprouts Game 187
Non Interference for the Analysis of Cryptographic Protocols 185
A hard lesson: Assessing the HTTPS deployment of Italian university websites 185
FWS: Analyzing, maintaining and transcompiling firewalls 185
Attacking and Fixing PKCS#11 Security Tokens. 182
Control Flow Analysis of Mobile Ambients with Security Boundaries 180
Type-based Analysis of Key Management in PKCS#11 cryptographic devices 180
Compositional Analysis of Authentication Protocols 178
Cracking Bank PINs by Playing Mastermind 177
Shaping the Glitch: Optimizing Voltage Fault Injection Attacks 176
Static Analysis of Authentication 172
Transforming processes to check and ensure Information Flow Security 171
Analysis and development of Security APIs for disposable RFID tickets 169
A Compiler for Analysing Cryptographic Protocols Using Non-Interference 168
Secure upgrade of hardware security modules in bank networks 168
Real-Time Information Flow Analysis 167
Information Flow Security in Dynamic Contexts 163
The ro-spi Calculus at Work: Authentication Case Studies 160
Security Abstractions and Intruder Models 159
A Security Property for Processes in Dynamic Contexts 157
Information Flow Security in Dynamic Contexts 157
Bridging Language-Based and Process Calculi Security 156
Minumum Feedback Vertex Set in k-Dimensional Hypercubes 154
Verifying Persistent Security Properties. 153
Proceedings of 16th IEEE Computer Security Foundations Workshop (CSFW16) 151
Dynamic Types for Authentication 151
Inferring Authentication Tags 150
Totale 28.239
Categoria #
all - tutte 87.965
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 87.965


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/20191.383 0 0 0 0 0 0 0 0 0 0 555 828
2019/20206.954 648 435 483 1.478 501 731 491 685 484 458 350 210
2020/20215.690 335 413 372 259 754 712 360 374 287 641 664 519
2021/20224.405 506 653 381 555 310 74 178 112 79 508 666 383
2022/20235.111 277 363 86 527 665 1.191 236 409 573 137 426 221
2023/20242.602 255 235 171 238 354 504 242 170 192 223 18 0
Totale 32.936