Crispo, Bruno
 Distribuzione geografica
Continente #
NA - Nord America 10.997
EU - Europa 2.069
AS - Asia 1.342
AF - Africa 10
SA - Sud America 9
OC - Oceania 7
Continente sconosciuto - Info sul continente non disponibili 1
Totale 14.435
Nazione #
US - Stati Uniti d'America 10.973
SG - Singapore 693
UA - Ucraina 457
IT - Italia 401
SE - Svezia 365
CN - Cina 310
GB - Regno Unito 222
FI - Finlandia 198
KR - Corea 142
RU - Federazione Russa 113
BG - Bulgaria 112
DE - Germania 100
VN - Vietnam 54
FR - Francia 37
ID - Indonesia 35
TR - Turchia 32
CA - Canada 24
IN - India 18
NL - Olanda 16
JO - Giordania 14
BE - Belgio 10
LB - Libano 10
PK - Pakistan 9
IE - Irlanda 8
AU - Australia 7
HK - Hong Kong 7
AT - Austria 6
JP - Giappone 6
GR - Grecia 5
AE - Emirati Arabi Uniti 4
CO - Colombia 4
DZ - Algeria 4
MD - Moldavia 4
PL - Polonia 4
DK - Danimarca 3
EG - Egitto 2
IR - Iran 2
MA - Marocco 2
MY - Malesia 2
PE - Perù 2
PT - Portogallo 2
TH - Thailandia 2
AR - Argentina 1
BO - Bolivia 1
BY - Bielorussia 1
CL - Cile 1
CZ - Repubblica Ceca 1
EU - Europa 1
HU - Ungheria 1
KZ - Kazakistan 1
LT - Lituania 1
MU - Mauritius 1
RO - Romania 1
RS - Serbia 1
TW - Taiwan 1
UG - Uganda 1
Totale 14.435
Città #
Fairfield 1.582
Jacksonville 966
Chandler 910
Woodbridge 754
Ashburn 750
Seattle 703
Wilmington 667
Singapore 556
Houston 551
Ann Arbor 498
Cambridge 496
Columbus 373
Santa Clara 368
Princeton 293
San Mateo 289
Trento 155
New York 135
Beijing 122
Dearborn 122
Sofia 112
San Diego 92
Moscow 89
Boardman 79
Lawrence 73
Falls Church 59
Helsinki 41
Dong Ket 38
Norwalk 38
Jakarta 35
Izmir 32
London 32
Boydton 22
Kunming 22
Nanjing 22
Verona 22
Lappeenranta 19
Hefei 18
Washington 17
Guangzhou 16
San Paolo di Civitate 16
Bremen 15
Dallas 15
Milan 15
Vicenza 15
Trieste 14
Toronto 13
Altamura 12
Kilburn 12
Des Moines 10
Nanchang 10
Düsseldorf 9
Como 8
Costa Mesa 8
Council Bluffs 8
Munich 8
Prescot 8
Udine 8
Andover 7
Bolzano 7
Rome 7
Chongqing 6
Gonzaga 6
Jinan 6
Los Angeles 6
Montréal 6
New Bedfont 6
Tappahannock 6
Vienna 6
Xian 6
Chicago 5
Chiswick 5
Dublin 5
Fuzhou 5
Hong Kong 5
Phoenix 5
Pune 5
Redmond 5
Shanghai 5
Zhengzhou 5
Amsterdam 4
Brussels 4
Casier 4
Fremont 4
Little Attock 4
Nuremberg 4
Ottawa 4
Shenyang 4
Wuhan 4
Ōmizo 4
Acton 3
Bellevue 3
Bologna 3
Brisbane 3
Frankfurt Am Main 3
Hangzhou 3
Kerken 3
Laurel 3
Leipzig 3
Mcallen 3
Mountain View 3
Totale 11.570
Nome #
SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme 166
Time in Privacy Preserving LBSs: An Overlooked Dimension 152
null 149
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware 146
Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access 144
DriverAuth: Behavioral Biometric-based Driver Authentication Mechanism for On-demand Ride and Ridesharing Infrastructure 144
ANSWERAUTH: A bimodal behavioral biometric-based user authentication scheme for smartphones 132
A chimerical dataset combining physiological and behavioral biometric traits for reliable user authentication on smart devices and ecosystems 125
Internet of Things: A survey on the security of IoT frameworks 124
Access control via lightweight ontologies 118
MOSES: Supporting and Enforcing Security Profiles on Smartphones 118
Providing Source Location Privacy in Wireless Sensor Networks: A Survey 116
Dialerauth: A motion-assisted touch-based smartphone user authentication scheme 116
AirSign: A Gesture-Based Smartwatch User Authentication 115
VLOC: An Approach To Verify The Physical Location Of A Virtual Machine In Cloud 114
Privacy and Identity Management for Life 112
P-CDN: Extending Access Control Capabilities of P2P Systems to provide CDN Services 112
Design and implementation of a confidentiality and access control solution for publish/subscribe systems 111
A Perspective Study Towards Biometric-based Rider Authentication Schemes For Driverless Taxis 111
Demonstrating the effectiveness of MOSES for separation of execution modes 111
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement 110
A Secure and Scalable Grid-Based Content Management System 109
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments 108
Censorship-resilient communications through information scattering 108
Estimating the assessment difficulty of CVSS environmental metrics: An experiment 108
Enforcing UCON Policies on the Enterprise Service Bus 107
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks 107
Age, gender and operating-hand estimation on smart mobile devices 107
Introducing concurrency in policy-based access control 105
A New Family of Authentication Protocols 105
RelBAC: Relation Based Access Control 105
Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps 105
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment. 105
Strong Authentication and Privacy with Standard Browsers 103
MASTER as a Security Management Tool for Policy Compliance 103
DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms 103
FSquaDRA: Fast Detection of Repackaged Applications 103
Bait your hook: a novel detection technique for keyloggers 102
Towards a Secure Application-Semantic Aware Policy Enforcement Architecture 102
YAASE: Yet Another Android Security Extension 102
An implementation of event and filter confidentiality in pub/sub systems and its application to e-health 101
Reasoning about Relation Based Access Control 101
Mobile biometrics: Towards a comprehensive evaluation methodology 101
An efficient weak secrecy scheme for network coding data dissemination in VANET 100
xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement 100
Windows Mobile LiveSD Forensics. 99
Time Warp: How Time Affects Privacy in LBSs 99
Anonymous opinion exchange over untrusted social networks 99
A Hybrid PKI-IBC Based Ephemerizer System 98
Towards Run-Time Verification in Access Control 98
A Cost-Efficient Counter-Intrusion Scheme for One-Time Sensor Networks 97
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System 97
Evaluation of Motion-based Touch-typing Biometrics for online Banking 97
Events privacy in WSNs: A new model and its application 96
Enforcing Multi-user Access Policies to Encrypted Cloud Databases 95
An efficient and scalable algorithm for policy compatibility in service virtualization 95
Virtual private social networks and a facebook implementation 94
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System. 94
Event handoff unobservability in WSN 94
Federated Authorization for Software-as-a-Service Applications. 93
CREPUSCOLO: A collusion resistant privacy preserving location verification system 93
Weak Data Secrecy via Obfuscation in Network Coding Based Content Distribution 93
Optimal solutions for pairing services on smartphones: A strategy to minimize energy consumption 93
Delegation Protocols for Electronic Commerce 92
A service-based context management framework for cross-enterprise collaboration 92
Providing Confidentiality in Content-based Publish/subscribe Systems 92
Empirical analysis on the use of dynamic code updates in android and its security implications 92
ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones 92
Touchstroke: Smartphone user authentication based on touch-typing biometrics 92
Supporting complex queries and access policies for multi-user encrypted databases. 90
CRePE: Context-Related Policy Enforcement for Android 90
Combining Enforcement Strategies in Service Oriented Architectures 90
High Dictionary Compression for Proactive Password Checking 90
Efficient Integration of Fine-grained Access Control in Large-scale Grid Services 90
Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment 89
Chained Stream Authentication 88
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks 88
PIDGIN: privacy-preserving interest and content sharing in opportunistic networks. 87
Individual Authentication in Multiparty Communications 87
Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones 87
A DRM security architecture for home networks 87
RFID Malware: Design Principles and Examples 86
DLoc: Distributed Auditing for Data Location Compliance in Cloud 86
Analyzing gateways' impact on caching for micro CDNs based on CCN 85
Reasoning about Accountability within Delegation 84
A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System 84
Towards a Theory of White-Box Security 84
A Risk-Driven Model to Minimize the Effects of Human Factors on Smart Devices 84
Design and Implementation of a Secure Wide-Area Object Middleware 84
XACML policy integration algorithms 83
Distributed computer system 83
Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns 83
Taking Sensor Networks from the Lab to the Jungle 82
Smarthandle: A novel behavioral biometric-based authentication scheme for smart lock systems 82
RelBAC: Relation Based Access Control 81
Efficient integration of fine-grained access control and resource brokering in grid 81
Please hold on: Unobtrusive user authentication using smartphone's built-in sensors 81
RFID Malware: Design Principles and Examples 81
Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication 80
CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android 79
Totale 10.058
Categoria #
all - tutte 69.494
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 474
selected - selezionate 0
volume - volumi 1.096
Totale 71.064


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20202.061 0 0 0 0 0 260 476 288 406 308 137 186
2020/20212.552 89 257 122 227 281 252 284 243 190 160 247 200
2021/20221.804 66 233 10 83 65 98 68 408 163 153 139 318
2022/20231.972 296 176 21 234 279 322 6 173 275 25 114 51
2023/2024939 68 88 59 57 81 222 69 32 12 56 52 143
2024/20251.571 20 32 136 702 190 491 0 0 0 0 0 0
Totale 14.818