关注
Andrea Visconti
Andrea Visconti
Associate Professor, CS Dept., University of Milan
在 unimi.it 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS
C Lepore, M Ceria, A Visconti, UP Rao, KA Shah, L Zanolini
Mathematics 8 (10), 1782, 2020
1112020
On the weaknesses of PBKDF2
A Visconti, S Bossi, H Ragab, A Calò
Cryptology and Network Security: 14th International Conference, CANS 2015 …, 2015
402015
Artificial immune system based on interval type-2 fuzzy set paradigm
A Visconti, H Tahayori
Applied Soft Computing 11 (6), 4055-4063, 2011
352011
What users should know about full disk encryption based on LUKS
S Bossi, A Visconti
Cryptology and Network Security: 14th International Conference, CANS 2015 …, 2015
312015
Concave type-2 fuzzy sets: properties and operations
H Tahayori, AGB Tettamanzi, G Degli Antoni, A Visconti, M Moharrer
Soft Computing 14, 749-756, 2010
312010
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2
A Visconti, F Gorla
IEEE Transactions on Dependable and Secure Computing 17 (4), 775-781, 2018
302018
On the calculation of extended max and min operations between convex fuzzy sets of the real line
H Tahayori, AGB Tettamanzi, G Degli Antoni, A Visconti
Fuzzy Sets and Systems 160 (21), 3103-3114, 2009
302009
An iot inventory before deployment: a survey on iot protocols, communication technologies, vulnerabilities, attacks, and future research directions
AO Bang, UP Rao, A Visconti, A Brighente, M Conti
Computers & Security 123, 102914, 2022
292022
An innate immune system for the protection of computer networks
A Pagnoni, A Visconti
Proc. of the 4th International Symposium on Information and Communication …, 2005
282005
Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF (2)
A Visconti, CV Schiavo, R Peralta
Information processing letters 137, 1-5, 2018
232018
The dangers of rooting: data leakage detection in android applications
L Casati, A Visconti
Mobile Information Systems 2018 (1), 6020461, 2018
192018
Examining PBKDF2 security margin—Case study of LUKS
A Visconti, O Mosnáček, M Brož, V Matyáš
Journal of Information Security and Applications 46, 296-306, 2019
182019
Secure electronic bills of lading: blind counts and digital signatures
A Pagnoni, A Visconti
Electronic Commerce Research 10, 363-388, 2010
182010
Discovering varying patterns of Normal and interleaved ADLs in smart homes
M Raeiszadeh, H Tahayori, A Visconti
Applied Intelligence 49 (12), 4175-4188, 2019
142019
Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy sets
A Visconti, H Tahayori
2009 International Conference for Internet Technology and Secured …, 2009
142009
Understanding optimizations and measuring performances of PBKDF2
AF Iuorio, A Visconti
2nd International Conference on Wireless Intelligent and Distributed …, 2019
122019
Operations on type-2 fuzzy sets based on the set of pseudo-highest intersection points of convex fuzzy sets
H Tahayori, A Sadeghian, A Visconti
2010 Annual Meeting of the North American Fuzzy Information Processing …, 2010
112010
Polynomial multiplication over binary finite fields: new upper bounds
A De Piccoli, A Visconti, OG Rizzo
Journal of Cryptographic Engineering 10 (3), 197-210, 2020
102020
Internet of things design, architectures and protocols
I Woungang, SK Dhurandher, A Visconti
Internet of Things 14, 100267, 2021
92021
Preserving cultural heritage: a new approach to increase the life expectancy of optical discs
G Haus, C Polizzi, A Visconti
Journal of Cultural Heritage 29, 67-74, 2018
82018
系统目前无法执行此操作,请稍后再试。
文章 1–20