关注
Andrea Visconti
Andrea Visconti
Associate Professor, CS Dept., University of Milan
在 unimi.it 的电子邮件经过验证 - 首页
标题
引用次数
年份
A biologically-inspired type-2 fuzzy set based algorithm for detecting misbehaving nodes in ad-hoc wireless networks
A Visconti, H Tahayori
International journal for infonomics 3 (2), 373-82, 2010
52010
A Biologically–Inspired type-2 fuzzy set based algorithm for detecting misbehaving nodes in ad hoc networks
A Visconti, H Tahayori
International Journal for Infonomics 3 (2), 270-277, 2010
52010
A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium
R La Scala, F Pintore, SK Tiwari, A Visconti
Finite Fields and Their Applications 98, 102452, 2024
2024
A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS
C Lepore, M Ceria, A Visconti, UP Rao, KA Shah, L Zanolini
Mathematics 8 (10), 1782, 2020
1122020
A troyan Diffie-Hellman-like protocol based on proof of gullibility
M Ceria, A De Piccoli, T Moriarty, A Visconti
2024 International Conference on Artificial Intelligence, Computer, Data …, 2024
2024
A type-2 fuzzy set recognition algorithm for artificial immune systems
A Visconti, H Tahayori
International Workshop on Hybrid Artificial Intelligence Systems, 491-498, 2008
12008
An algebraic attack to the Bluetooth stream cipher E0
R La Scala, S Polese, SK Tiwari, A Visconti
Finite Fields and Their Applications 84, 102102, 2022
52022
An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size.
CV Schiavo, A Visconti
SECRYPT, 302-307, 2012
2012
An innate immune system for the protection of computer networks
A Pagnoni, A Visconti
Proc. of the 4th International Symposium on Information and Communication …, 2005
282005
An iot inventory before deployment: a survey on iot protocols, communication technologies, vulnerabilities, attacks, and future research directions
AO Bang, UP Rao, A Visconti, A Brighente, M Conti
Computers & Security 123, 102914, 2022
302022
Artificial immune system based on interval type-2 fuzzy set paradigm
A Visconti, H Tahayori
Applied Soft Computing 11 (6), 4055-4063, 2011
352011
Augmented interval type-2 fuzzy set methodologies for email granulation
H Tahayori, A Visconti, G Degli Antoni
2007 2nd International Workshop on Soft Computing Applications, 193-198, 2007
22007
Blockchain-based patient-driven Inter-OperableModel for healthcare 5.0 system
K Shah, L Garg, D Kachoria, V Shah, S Darbar, A Visconti, C Bhatt, ...
2023
Blockchain, Web 3.0 e NFTs: i profili tecnici
A Visconti, L Pelizzola
IL MERCATO DEI NON FUNGIBLE TOKENS TRA ARTE, MODA E GAMIFICATION, 11, 0
Computation of $ H\rightarrow gg $ in $\scriptsize {DRED} $ and $\scriptsize {FDH} $: renormalization, operator mixing, and explicit two-loop results
A Broggio, C Gnendiger, A Signer, D Stöckinger, A Visconti
Eur. Phys. JC 75 (arXiv: 1503.09103), 418, 2015
22015
Concave type-2 fuzzy sets: properties and operations
H Tahayori, AGB Tettamanzi, G Degli Antoni, A Visconti, M Moharrer
Soft Computing 14, 749-756, 2010
312010
Content Popularity in Named Data Networking: Prediction Models And Security Applications
M Conti, A Visconti, F Berto
Crittografia: tra successi e fallimenti
A Visconti
@ DIGITCULT 4 (3), 9-14, 2019
2019
De Cifris Cryptanalysis: selected papers from the ITASEC2020 workshop" Cryptanalysis: a key tool in securing and breaking ciphers"
R LA SCALA, M Pedicini, A Visconti
COLLECTIO CIPHRARUM 2, 2022
2022
Degröbnerization and its applications: a new approach for data modelling
M Ceria, T Mora, A Visconti
preprint, 2022
32022
系统目前无法执行此操作,请稍后再试。
文章 1–20