FERRARA, Anna Lisa
 Distribuzione geografica
Continente #
NA - Nord America 663
EU - Europa 547
AS - Asia 41
Continente sconosciuto - Info sul continente non disponibili 1
OC - Oceania 1
Totale 1.253
Nazione #
US - Stati Uniti d'America 661
IE - Irlanda 213
IT - Italia 104
UA - Ucraina 67
FI - Finlandia 55
DE - Germania 49
SE - Svezia 29
SG - Singapore 15
BE - Belgio 14
CN - Cina 14
GB - Regno Unito 7
TR - Turchia 4
GR - Grecia 3
IN - India 3
CA - Canada 2
IR - Iran 2
NL - Olanda 2
RU - Federazione Russa 2
AE - Emirati Arabi Uniti 1
AU - Australia 1
DK - Danimarca 1
EU - Europa 1
FR - Francia 1
IL - Israele 1
PH - Filippine 1
Totale 1.253
Città #
Chandler 228
Dublin 213
Jacksonville 141
Helsinki 55
Baranello 45
Princeton 22
San Mateo 21
Ann Arbor 20
Woodbridge 16
Brussels 14
Wilmington 13
Rome 9
Hanover 7
Marrùbiu 6
Molise 6
Singapore 6
Beijing 4
Kocaeli 4
Leawood 4
Livorno 4
Mountain View 4
Sarno 4
Southampton 4
Dearborn 3
Monmouth Junction 3
New York 3
Norwalk 3
Pianella 3
Ashburn 2
Augusta 2
Bangalore 2
Bellante 2
Bollebygd 2
Falkenstein 2
Isernia 2
Jinan 2
Ottawa 2
Salerno 2
Aigaleo 1
Ardabil 1
Baotou 1
Bayreuth 1
Canberra 1
Chongqing 1
Clearwater 1
Dubai 1
Frankfurt am Main 1
Groningen 1
Hebei 1
Irakleio 1
Kunming 1
Manila 1
Nanchang 1
Qualiano 1
Saarbrücken 1
Shenyang 1
Stockholm 1
Taiyuan 1
Zhengzhou 1
Totale 906
Nome #
null 87
null 73
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 67
Fuzzy-based approach to assess and prioritize privacy risks 67
Cryptographically enforced RBAC 65
Policy Privacy in Cryptographic Access Control 65
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 64
Preventing unauthorized data flows 64
Toward group-based user-attribute policies in azure-like access control systems 64
Security Analysis of Role-Based Access Control through Program Verification 62
Analyzing temporal role based access control models 61
Analyzing temporal role based access control models 57
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 55
Security analysis for temporal role based access control 54
Enforcing the Security of a Time-bound Hierarchical Key Assignment Scheme 48
Variations on a theme by Akl and Taylor: Security and tradeoffs 48
Efficient provably-secure hierarchical key assignment schemes 47
Practical Short Signature Batch Verification 46
A note on time-bound hierarchical key assignment schemes 45
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants 44
Security Analysis of Role-Based Access Control through Program Verification 40
Verifiable Hierarchical Key Assignment Schemes 34
Security Analysis of Access Control Policies for Smart Homes 24
Cryptographic Key Assignment Schemes for any Access Control Policy 10
Vac - Verifier of administrative role-based access control policies 9
An Attack on a Payment Scheme 7
Efficient Provably-Secure Hierarchical Key Assignment Schemes 6
Policy analysis for self-administrated role-based access control 5
Visual cryptography schemes with reversing 5
Ideal Contrast Visual Cryptography Schemes with Reversing 5
null 1
Totale 1.329
Categoria #
all - tutte 7.086
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 7.086


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020131 0 3 25 0 22 2 23 8 22 3 3 20
2020/2021198 6 22 3 26 26 11 22 7 32 5 37 1
2021/2022103 0 21 2 6 4 12 4 10 14 8 9 13
2022/2023660 67 53 28 77 25 46 0 35 271 25 8 25
2023/2024152 30 33 5 6 8 5 3 5 1 0 47 9
2024/20258 8 0 0 0 0 0 0 0 0 0 0 0
Totale 1.329