Crispo, Bruno
 Distribuzione geografica
Continente #
NA - Nord America 10.132
EU - Europa 1.944
AS - Asia 614
AF - Africa 9
SA - Sud America 8
OC - Oceania 5
Continente sconosciuto - Info sul continente non disponibili 1
Totale 12.713
Nazione #
US - Stati Uniti d'America 10.111
UA - Ucraina 457
IT - Italia 390
SE - Svezia 365
CN - Cina 280
GB - Regno Unito 220
FI - Finlandia 192
KR - Corea 137
BG - Bulgaria 112
DE - Germania 96
VN - Vietnam 53
SG - Singapore 52
FR - Francia 37
TR - Turchia 32
RU - Federazione Russa 23
CA - Canada 21
JO - Giordania 14
IN - India 13
BE - Belgio 10
LB - Libano 10
NL - Olanda 9
PK - Pakistan 9
IE - Irlanda 8
AT - Austria 5
AU - Australia 5
GR - Grecia 5
AE - Emirati Arabi Uniti 4
CO - Colombia 4
DZ - Algeria 4
PL - Polonia 4
DK - Danimarca 3
HK - Hong Kong 2
ID - Indonesia 2
IR - Iran 2
MA - Marocco 2
MD - Moldavia 2
MY - Malesia 2
PE - Perù 2
PT - Portogallo 2
AR - Argentina 1
BY - Bielorussia 1
CL - Cile 1
CZ - Repubblica Ceca 1
EG - Egitto 1
EU - Europa 1
HU - Ungheria 1
JP - Giappone 1
KZ - Kazakistan 1
MU - Mauritius 1
RO - Romania 1
UG - Uganda 1
Totale 12.713
Città #
Fairfield 1.582
Jacksonville 966
Chandler 910
Woodbridge 754
Ashburn 745
Seattle 703
Wilmington 667
Houston 551
Ann Arbor 498
Cambridge 496
Princeton 293
San Mateo 289
Trento 155
New York 135
Dearborn 122
Beijing 121
Sofia 112
San Diego 92
Boardman 79
Lawrence 73
Falls Church 59
Dong Ket 38
Norwalk 38
Helsinki 37
Izmir 32
London 31
Boydton 22
Nanjing 22
Verona 22
Kunming 21
Hefei 18
Lappeenranta 17
Singapore 17
Washington 17
San Paolo di Civitate 16
Bremen 15
Guangzhou 15
Vicenza 15
Milan 14
Trieste 14
Altamura 12
Kilburn 12
Toronto 11
Des Moines 10
Düsseldorf 9
Nanchang 9
Como 8
Costa Mesa 8
Council Bluffs 8
Prescot 8
Udine 8
Andover 7
Bolzano 7
Gonzaga 6
Jinan 6
Montréal 6
Munich 6
New Bedfont 6
Tappahannock 6
Xian 6
Chiswick 5
Dublin 5
Fuzhou 5
Phoenix 5
Pune 5
Redmond 5
Rome 5
Shanghai 5
Vienna 5
Brussels 4
Casier 4
Chicago 4
Chongqing 4
Fremont 4
Little Attock 4
Los Angeles 4
Ottawa 4
Wuhan 4
Zhengzhou 4
Acton 3
Bologna 3
Brisbane 3
Dallas 3
Frankfurt Am Main 3
Kerken 3
Laurel 3
Leipzig 3
Mcallen 3
Mountain View 3
Nuremberg 3
Ravenna 3
Rovereto 3
Shenyang 3
Solon 3
Southwark 3
Stockholm 3
Alcamo 2
Appignano 2
Atlanta 2
Augusta 2
Totale 10.126
Nome #
SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme 156
null 149
Time in Privacy Preserving LBSs: An Overlooked Dimension 141
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware 136
DriverAuth: Behavioral Biometric-based Driver Authentication Mechanism for On-demand Ride and Ridesharing Infrastructure 132
Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access 126
ANSWERAUTH: A bimodal behavioral biometric-based user authentication scheme for smartphones 123
Internet of Things: A survey on the security of IoT frameworks 114
A chimerical dataset combining physiological and behavioral biometric traits for reliable user authentication on smart devices and ecosystems 112
MOSES: Supporting and Enforcing Security Profiles on Smartphones 111
Providing Source Location Privacy in Wireless Sensor Networks: A Survey 109
Access control via lightweight ontologies 109
AirSign: A Gesture-Based Smartwatch User Authentication 104
Dialerauth: A motion-assisted touch-based smartphone user authentication scheme 104
Privacy and Identity Management for Life 103
VLOC: An Approach To Verify The Physical Location Of A Virtual Machine In Cloud 103
P-CDN: Extending Access Control Capabilities of P2P Systems to provide CDN Services 102
Demonstrating the effectiveness of MOSES for separation of execution modes 102
Design and implementation of a confidentiality and access control solution for publish/subscribe systems 101
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement 101
Censorship-resilient communications through information scattering 101
A Secure and Scalable Grid-Based Content Management System 101
A Perspective Study Towards Biometric-based Rider Authentication Schemes For Driverless Taxis 101
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments 98
Estimating the assessment difficulty of CVSS environmental metrics: An experiment 98
Introducing concurrency in policy-based access control 97
Enforcing UCON Policies on the Enterprise Service Bus 97
Age, gender and operating-hand estimation on smart mobile devices 97
Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps 96
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment. 96
A New Family of Authentication Protocols 94
Strong Authentication and Privacy with Standard Browsers 94
RelBAC: Relation Based Access Control 94
Bait your hook: a novel detection technique for keyloggers 93
Anonymous opinion exchange over untrusted social networks 93
xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement 93
YAASE: Yet Another Android Security Extension 93
MASTER as a Security Management Tool for Policy Compliance 92
Towards Run-Time Verification in Access Control 92
FSquaDRA: Fast Detection of Repackaged Applications 92
Windows Mobile LiveSD Forensics. 91
An efficient weak secrecy scheme for network coding data dissemination in VANET 91
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks 90
An implementation of event and filter confidentiality in pub/sub systems and its application to e-health 90
A Cost-Efficient Counter-Intrusion Scheme for One-Time Sensor Networks 89
Time Warp: How Time Affects Privacy in LBSs 89
Reasoning about Relation Based Access Control 89
Towards a Secure Application-Semantic Aware Policy Enforcement Architecture 89
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System 88
DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms 88
Evaluation of Motion-based Touch-typing Biometrics for online Banking 88
Mobile biometrics: Towards a comprehensive evaluation methodology 88
Events privacy in WSNs: A new model and its application 87
An efficient and scalable algorithm for policy compatibility in service virtualization 87
Virtual private social networks and a facebook implementation 86
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System. 86
Enforcing Multi-user Access Policies to Encrypted Cloud Databases 86
Weak Data Secrecy via Obfuscation in Network Coding Based Content Distribution 86
A Hybrid PKI-IBC Based Ephemerizer System 86
Federated Authorization for Software-as-a-Service Applications. 85
CREPUSCOLO: A collusion resistant privacy preserving location verification system 85
Optimal solutions for pairing services on smartphones: A strategy to minimize energy consumption 85
Delegation Protocols for Electronic Commerce 84
Empirical analysis on the use of dynamic code updates in android and its security implications 84
Touchstroke: Smartphone user authentication based on touch-typing biometrics 84
Providing Confidentiality in Content-based Publish/subscribe Systems 83
High Dictionary Compression for Proactive Password Checking 83
Event handoff unobservability in WSN 82
ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones 82
Supporting complex queries and access policies for multi-user encrypted databases. 81
CRePE: Context-Related Policy Enforcement for Android 81
Chained Stream Authentication 81
Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment 81
A service-based context management framework for cross-enterprise collaboration 81
Combining Enforcement Strategies in Service Oriented Architectures 81
Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones 81
Efficient Integration of Fine-grained Access Control in Large-scale Grid Services 81
Individual Authentication in Multiparty Communications 80
RFID Malware: Design Principles and Examples 79
DLoc: Distributed Auditing for Data Location Compliance in Cloud 79
A DRM security architecture for home networks 78
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks 77
Distributed computer system 77
PIDGIN: privacy-preserving interest and content sharing in opportunistic networks. 76
Reasoning about Accountability within Delegation 76
Design and Implementation of a Secure Wide-Area Object Middleware 76
A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System 75
RelBAC: Relation Based Access Control 74
XACML policy integration algorithms 74
Towards a Theory of White-Box Security 74
Analyzing gateways' impact on caching for micro CDNs based on CCN 74
Taking Sensor Networks from the Lab to the Jungle 73
Efficient integration of fine-grained access control and resource brokering in grid 73
Please hold on: Unobtrusive user authentication using smartphone's built-in sensors 72
RFID Malware: Design Principles and Examples 72
Smarthandle: A novel behavioral biometric-based authentication scheme for smart lock systems 72
CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android 71
Cyber-Physical Security and Privacy [Guest editors' introduction] 71
Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns 71
Symmetric Key Authentication Services Revisited 70
Totale 9.123
Categoria #
all - tutte 57.625
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 377
selected - selezionate 0
volume - volumi 876
Totale 58.878


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/20191.035 0 0 0 0 0 0 0 0 0 0 584 451
2019/20203.315 209 117 259 303 366 260 476 288 406 308 137 186
2020/20212.552 89 257 122 227 281 252 284 243 190 160 247 200
2021/20221.804 66 233 10 83 65 98 68 408 163 153 139 318
2022/20231.972 296 176 21 234 279 322 6 173 275 25 114 51
2023/2024784 68 88 59 57 81 222 69 32 12 56 40 0
Totale 13.092