FOCARDI, Riccardo
 Distribuzione geografica
Continente #
NA - Nord America 19.459
EU - Europa 11.233
AS - Asia 5.688
SA - Sud America 523
AF - Africa 127
OC - Oceania 29
Continente sconosciuto - Info sul continente non disponibili 26
Totale 37.085
Nazione #
US - Stati Uniti d'America 18.480
CN - Cina 3.218
IT - Italia 2.265
PL - Polonia 2.187
DE - Germania 1.434
SG - Singapore 1.213
GB - Regno Unito 954
CA - Canada 943
UA - Ucraina 824
IE - Irlanda 808
FI - Finlandia 520
SE - Svezia 513
RU - Federazione Russa 498
BR - Brasile 464
HK - Hong Kong 366
AT - Austria 253
FR - Francia 253
TR - Turchia 207
NL - Olanda 142
IN - India 97
DK - Danimarca 73
CH - Svizzera 72
KR - Corea 69
JP - Giappone 61
BE - Belgio 59
PH - Filippine 57
CZ - Repubblica Ceca 55
ES - Italia 55
VN - Vietnam 49
ZA - Sudafrica 48
BG - Bulgaria 47
JO - Giordania 45
ID - Indonesia 44
IR - Iran 36
RO - Romania 35
MY - Malesia 29
RS - Serbia 27
PT - Portogallo 26
MD - Moldavia 25
PK - Pakistan 25
AU - Australia 24
EU - Europa 23
TW - Taiwan 23
IL - Israele 22
SA - Arabia Saudita 22
UZ - Uzbekistan 22
GR - Grecia 21
MX - Messico 18
BD - Bangladesh 14
EG - Egitto 13
MA - Marocco 13
NO - Norvegia 13
SI - Slovenia 13
CL - Cile 12
UY - Uruguay 11
VE - Venezuela 10
BY - Bielorussia 9
LT - Lituania 9
NG - Nigeria 9
AR - Argentina 8
HR - Croazia 8
LB - Libano 8
HU - Ungheria 7
CM - Camerun 6
GE - Georgia 6
IQ - Iraq 6
KE - Kenya 6
TH - Thailandia 6
AE - Emirati Arabi Uniti 5
AZ - Azerbaigian 5
CO - Colombia 5
EC - Ecuador 5
KZ - Kazakistan 5
LU - Lussemburgo 5
NZ - Nuova Zelanda 5
CI - Costa d'Avorio 4
CY - Cipro 4
DO - Repubblica Dominicana 4
GH - Ghana 4
IS - Islanda 4
KH - Cambogia 4
LV - Lettonia 4
MK - Macedonia 4
MU - Mauritius 4
OM - Oman 4
PE - Perù 4
SC - Seychelles 4
TN - Tunisia 4
A2 - ???statistics.table.value.countryCode.A2??? 3
BO - Bolivia 3
CR - Costa Rica 3
DZ - Algeria 3
MQ - Martinica 3
PA - Panama 3
BA - Bosnia-Erzegovina 2
BH - Bahrain 2
EE - Estonia 2
ET - Etiopia 2
LK - Sri Lanka 2
NP - Nepal 2
Totale 37.055
Città #
Woodbridge 2.645
Warsaw 1.937
Fairfield 1.925
Chandler 1.370
Jacksonville 1.302
Ann Arbor 1.120
Ashburn 1.026
Houston 1.026
Seattle 840
Dublin 804
Wilmington 660
Singapore 651
Cambridge 644
Dearborn 540
Munich 478
Montréal 471
Mcallen 423
Nanjing 356
Jinan 328
Hong Kong 325
Mestre 297
Shenyang 287
Venice 283
Boardman 281
Guangzhou 278
New York 269
Venezia 248
Beijing 242
Vienna 220
Council Bluffs 195
Izmir 176
Boston 159
San Mateo 155
Andover 153
Ottawa 150
Hebei 142
Princeton 137
Mülheim 136
Tianjin 136
Montreal 120
The Dalles 115
Parma 113
Changsha 108
San Diego 106
Taiyuan 106
Polska 104
Des Moines 100
Zhengzhou 100
Taizhou 94
Hangzhou 93
Las Vegas 93
Nanchang 93
Toronto 92
Jiaxing 89
Haikou 84
Ningbo 82
El Cajon 81
Berlin 75
Verona 74
Hefei 73
Moscow 69
Milan 68
Saint Petersburg 67
Fuzhou 66
Helsinki 66
Los Angeles 63
Redwood City 61
London 60
Altamura 59
Brandenburg 54
Kraków 54
Lexington 53
Hewlett 51
Denton 48
St Petersburg 44
Philadelphia 42
Brussels 41
San Paolo di Civitate 41
Santa Clara 41
Winnipeg 39
Amsterdam 38
Beauharnois 36
Washington 36
Tokyo 35
Krakow 34
Jakarta 33
Polesovice 33
Rome 33
Zurich 33
Brownsville 32
Dong Ket 32
Nuremberg 32
Chicago 31
Davao City 31
Frankfurt am Main 31
Johannesburg 31
Kunming 31
Strasbourg 29
Flushing 26
Bremen 24
Totale 26.538
Nome #
CookiExt: Patching the browser against session hijacking attacks 4.271
First Italian Conference on Cybersecurity 1.932
Mind Your Keys? A Security Evaluation of Java Keystores 571
Usable Cryptographic QR Codes 484
Run-time analysis of PKCS#11 attacks 463
Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study 445
Surviving the Web: A Journey into Web Session Security 431
Formal methods for web security 428
Gathering of robots in a ring with mobile faults 425
Match It or Die: Proving Integrity by Equality 415
Development of security extensions based on Chrome APIs 412
Shaping the Glitch: Optimizing Voltage Fault Injection Attacks 410
APDU-Level Attacks in PKCS#11 Devices 404
Firewall management with FireWall synthesizer 401
Formal Analysis of Key Integrity in PKCS#11 390
Channel Abstractions for Network Security 356
Postcards from the post-HTTP world: Amplification of HTTPS vulnerabilities in the web ecosystem 353
Localizing Firewall Security Policies 352
Mignis: A semantic based tool for firewall configuration 347
Gathering of robots in a ring with mobile faults 333
Transcompiling Firewalls 326
Language-Independent Synthesis of Firewall Policies 316
Efficient Padding Oracle Attacks on Cryptographic Hardware 309
Mitch: A machine learning approach to the black-box detection of CSRF vulnerabilities 309
Run-Time Attack Detection in Cryptographic APIs 309
Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients 308
Provably Sound Browser-Based Enforcement of Web Session Integrity 303
A calculus of challenges and responses 303
A Classification of Security Properties for Process Algebras 298
A modular approach to Sprouts 297
Micro-Policies for Web Session Security 288
Gran: model checking grsecurity RBAC policies 286
Fast SQL Blind Injections in High Latency Networks. 285
BANANA: A tool for Boundary Ambients Nesting ANAlysis 277
Automatic and robust client-side protection for cookie-based sessions 276
Secure your PKCS#11 token against API attacks! 272
A Survey of Name-Passing Calculi and Crypto-Primitives 271
Practical Padding Oracle Attacks on RSA 268
Usable security for QR code 262
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring 259
Automated Analysis of PUF-based Protocols 251
Localizing Security for Distributed Firewalls 246
Analysis of Typed Analyses of Authentication Protocols 241
Analysing Sprouts 241
Getting to know your card: Reverse-engineering the smart-card application protocol data unit 241
Type-Based Analysis of PIN Processing APIs 238
Fixing PKCS#11 by key-diversification 237
Authentication primitives for secure protocol specifications 236
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties 235
Authenticity by tagging and typing 234
Complexity of Nesting Analysis in Mobile Ambients 233
Type-Based Analysis of Generic Key Management APIs 233
Boundary Inference for Enforcing Security Policies in Mobile Ambients 233
An Introduction to Security API Analysis 232
A Proof System for Information Flow Security 230
Type-Based Analysis of PKCS#11 Key Management 230
A hard lesson: Assessing the HTTPS deployment of Italian university websites 228
FWS: Analyzing, maintaining and transcompiling firewalls 228
A semantic based tool for firewall configuration 226
A Comparison of Three Authentication Properties 222
Unwinding in Information Flow Security 220
Feedback Vertex Set in Hypercubes 219
Blunting Differential Attacks on PIN Processing APIs 218
Refinement Operators and Information Flow Security 217
A new analysis technique for the Sprouts Game 216
Guessing Bank PINs by Winning a Mastermind Game 216
Information Leakage Detection in Boundary Ambients 213
Types for security protocols 210
Primitives for Authentication in Process Algebras 210
Information Flow Security in Mobile Ambients 209
Nesting analysis of mobile ambients 209
Bisimulation and Unwinding for Verifying Possibilistic Security Properties 208
Computer Languages and Security 207
Authentication Primitives for Protocol Specifications 207
Language Based Secure Communication 205
Information flow security of multi-threaded distributed programs 204
Non Interference for the Analysis of Cryptographic Protocols 203
Type-based Analysis of Key Management in PKCS#11 cryptographic devices 202
Principles for Entity Authentication 201
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery 201
Real-Time Information Flow Analysis 197
Language-Based Web Session Integrity 196
Control Flow Analysis of Mobile Ambients with Security Boundaries 195
Attacking and Fixing PKCS#11 Security Tokens. 193
Analysis and development of Security APIs for disposable RFID tickets 193
Compositional Analysis of Authentication Protocols 192
Transforming processes to check and ensure Information Flow Security 191
Static Analysis of Authentication 189
Cracking Bank PINs by Playing Mastermind 188
A Compiler for Analysing Cryptographic Protocols Using Non-Interference 187
Bridging Language-Based and Process Calculi Security 183
Secure upgrade of hardware security modules in bank networks 182
Information Flow Security in Dynamic Contexts 180
Security Abstractions and Intruder Models 178
A Security Property for Processes in Dynamic Contexts 176
Information Flow Security in Dynamic Contexts 174
Verifying Persistent Security Properties. 171
The ro-spi Calculus at Work: Authentication Case Studies 171
Minumum Feedback Vertex Set in k-Dimensional Hypercubes 169
Dynamic Types for Authentication 168
Totale 32.008
Categoria #
all - tutte 115.539
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 115.539


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020210 0 0 0 0 0 0 0 0 0 0 0 210
2020/20215.690 335 413 372 259 754 712 360 374 287 641 664 519
2021/20224.405 506 653 381 555 310 74 178 112 79 508 666 383
2022/20235.111 277 363 86 527 665 1.191 236 409 573 137 426 221
2023/20243.199 255 235 171 238 354 504 242 170 192 223 340 275
2024/20254.218 232 216 353 368 310 236 443 492 473 463 431 201
Totale 37.751