VIGANO', Luca
 Distribuzione geografica
Continente #
NA - Nord America 5.285
EU - Europa 4.892
AS - Asia 3.382
SA - Sud America 415
AF - Africa 50
OC - Oceania 13
Continente sconosciuto - Info sul continente non disponibili 4
Totale 14.041
Nazione #
US - Stati Uniti d'America 5.202
RU - Federazione Russa 1.897
SG - Singapore 1.341
CN - Cina 1.265
GB - Regno Unito 1.113
FR - Francia 347
BR - Brasile 318
SE - Svezia 303
HK - Hong Kong 297
DE - Germania 252
IE - Irlanda 251
FI - Finlandia 242
IT - Italia 239
VN - Vietnam 157
KR - Corea 139
UA - Ucraina 83
BE - Belgio 62
CA - Canada 50
AR - Argentina 42
TR - Turchia 35
IN - India 29
BD - Bangladesh 24
MX - Messico 20
NL - Olanda 20
ES - Italia 17
ID - Indonesia 17
PL - Polonia 15
CM - Camerun 13
AU - Australia 12
ZA - Sudafrica 12
EC - Ecuador 11
JP - Giappone 11
DK - Danimarca 10
CL - Cile 9
IQ - Iraq 8
PE - Perù 8
PY - Paraguay 8
AE - Emirati Arabi Uniti 7
AT - Austria 7
IR - Iran 7
VE - Venezuela 7
CO - Colombia 6
KE - Kenya 6
HN - Honduras 5
LU - Lussemburgo 5
MY - Malesia 5
UZ - Uzbekistan 5
AZ - Azerbaigian 4
IL - Israele 4
JO - Giordania 4
PK - Pakistan 4
SA - Arabia Saudita 4
BO - Bolivia 3
CH - Svizzera 3
DO - Repubblica Dominicana 3
EG - Egitto 3
EU - Europa 3
GR - Grecia 3
LV - Lettonia 3
MA - Marocco 3
PH - Filippine 3
RO - Romania 3
RS - Serbia 3
TN - Tunisia 3
UY - Uruguay 3
AO - Angola 2
BG - Bulgaria 2
BN - Brunei Darussalam 2
DZ - Algeria 2
GA - Gabon 2
HR - Croazia 2
HU - Ungheria 2
LT - Lituania 2
MD - Moldavia 2
NI - Nicaragua 2
NO - Norvegia 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AL - Albania 1
AM - Armenia 1
BB - Barbados 1
BH - Bahrain 1
CR - Costa Rica 1
CY - Cipro 1
EE - Estonia 1
ET - Etiopia 1
KZ - Kazakistan 1
LB - Libano 1
MN - Mongolia 1
MO - Macao, regione amministrativa speciale della Cina 1
MR - Mauritania 1
MU - Mauritius 1
NP - Nepal 1
NZ - Nuova Zelanda 1
OM - Oman 1
SN - Senegal 1
TM - Turkmenistan 1
TT - Trinidad e Tobago 1
Totale 14.041
Città #
Southend 909
Jacksonville 750
Chandler 655
Singapore 637
Woodbridge 581
Moscow 536
Ann Arbor 414
Dallas 370
Houston 349
Ashburn 313
Hong Kong 286
Dublin 251
Beijing 145
Nanjing 139
The Dalles 126
Lawrence 118
Princeton 118
Jinan 109
Wilmington 98
Shenyang 81
Los Angeles 74
Verona 66
Columbus 63
Brussels 60
Ho Chi Minh City 58
Seoul 53
Buffalo 52
Changsha 52
Tianjin 51
Milan 45
Hebei 43
Sindelfingen 43
Zhengzhou 41
Nanchang 40
Boardman 39
Lancaster 38
Ningbo 35
Haikou 32
Hanoi 32
Munich 30
Santa Clara 30
Taizhou 30
Helsinki 28
Hangzhou 26
Guangzhou 24
Redondo Beach 23
Frankfurt am Main 22
New York 22
Taiyuan 21
Des Moines 19
Norwalk 19
São Paulo 19
Cambridge 18
Jiaxing 18
Belo Horizonte 17
Brooklyn 17
San Francisco 17
Lanzhou 16
Toronto 16
Rio de Janeiro 15
Washington 13
Chicago 12
Council Bluffs 12
Montreal 12
Amsterdam 11
Boston 11
Fuzhou 11
London 11
Atlanta 10
Seattle 10
Turku 10
Warsaw 10
Auburn Hills 9
Tokyo 8
Denver 7
Dhaka 7
Dong Ket 7
Groningen 7
Johannesburg 7
Orem 7
Tappahannock 7
Biên Hòa 6
Buenos Aires 6
Elora 6
Jakarta 6
Lima 6
Neubiberg 6
Ottawa 6
Phoenix 6
Porto Alegre 6
Qingdao 6
Berazategui 5
Chennai 5
Copenhagen 5
Edinburgh 5
Fairfield 5
Fort Worth 5
Haiphong 5
Itaquaquecetuba 5
Luxembourg 5
Totale 8.653
Nome #
Quantum State Transformations and Branching Distributed Temporal Logic 219
A Hierarchy of Knowledge for the Formal Analysis of Security-Sensitive Business Processes 218
On the mosaic method for many-dimensional modal logics: a case study combining tense and modal operators 216
Attack Interference in Non-collaborative Scenarios for Security Protocol Analysis 215
Blocking Underhand Attacks by Hidden Coalitions 203
Workflow and Access Control Reloaded: a Declarative Specification Framework for the Automated Analysis of Web Services 200
A labeled deduction system for the logic UB 195
A Deduction System for Meaning Negotiation 192
A Declarative Two-Level Framework to Specify and Verify Workflow and Authorization Policies in Service-Oriented Architectures 189
A History of Until 177
Towards Formal Validation of Trust and Security in the Internet of Services 173
Security protocols as environments: A lesson from non-collaboration 168
Access Controlled Temporal Networks 168
A Qualitative Modal Representation of Quantum Register Transformations 165
WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications 164
An Environmental Paradigm for Defending Security Protocols 160
Distributed Temporal Logic for the Analysis of Security Protocol Models 159
Towards a Logical Framework for Reasoning about Risk 159
A Branching Distributed Temporal Logic for Reasoning about Entanglement-Free Quantum State Transformations 156
Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection 154
Conditional Simple Temporal Networks with Uncertainty and Resources 154
A complete tableau procedure for risk analysis 152
Using interpolation for the verification of security protocols 152
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures 151
Security is Beautiful 150
A Labeled Natural Deduction System for a Fragment of CTL∗ 148
Alice and Bob: Reconciling Formal Models and Implementation 148
Security is Beautiful (Transcript of Discussion) 147
A Modular Presentation of Modal Logics in a Logical Framework 144
A New Method for Bounding the Complexity of Modal Logics 144
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures 144
A Formal Approach to Analyzing Cyber-Forensics Evidence 143
A Recipe for the Complexity Analysis of Non-Classical Logics 140
A Formalization of Off-Line Guessing for Security Protocol Analysis 139
Automated Validation of Security-sensitive Web Services specified in BPEL and RBAC 139
Back from the future 136
A Formal Data-Model of the CORBA Security Service 134
A Topography of Labelled Model Logics 134
A labeled tableaux system for the Distributed Temporal Logic DTL 134
Attack Interference: A Path to Defending Security Protocols 133
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version) 133
An automated approach for testing the security of web applications against chained attacks 129
Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA 126
Weak, Strong and Dynamic Controllability of Access-Controlled Workflows Under Conditional Uncertainty 126
A Formal Analysis of the CORBA Security Service 125
Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment 125
Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities 124
Constraint Networks Under Conditional Uncertainty 123
Hybrid SAT-Based Consistency Checking Algorithms for Simple Temporal Networks with Decisions 123
Labelled natural deduction for a bundled branching temporal logic 119
Labelled quantified modal logics 117
Modal Deduction Systems for Quantum State Transformations 116
An O(n log n)-Space Decision Procedure for the Relevance Logic B+ 115
A Topological Categorization of Agents for the Definition of Attack States in Multi-agent Systems 112
Labelled Propositional Modal Logics: Theory and Practice 111
An On-The-Fly Model-Checker for Security Protocol Analysis 111
Consistency checking of STNs with decisions: Managing temporal and access-control constraints in a seamless way 110
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications 109
SEL Compiler and Abstract Analyzers 108
Natural Deduction for Non-Classical Logics 107
Labelled Non-Classical Logics 107
Conditional Uncertainty in Constraint Networks 107
OFMC: A Symbolic Model-Checker for Security Protocols 106
Modal Specifications of Trace-Based Security Properties 106
Labeled natural deduction systems for a family of tense logics 106
Modal Sequent Calculi Labelled with Truth-values: Completeness, Duality and Analyticity 104
Labelled Modal Logics: Quantifiers 104
Last man standing: Static, decremental and dynamic resiliency via controller synthesis 104
Building and executing proof strategies in a formal metatheory 103
Modal logics K, T, K4, S4: labelled proof systems and new complexity results 102
Towards an awareness-based semantics for security protocol analysis 102
Deconstructing Alice and Bob 102
SecTest 2011, the Second International Workshop on Security Testing 102
Automated Security Protocol Analysis With the AVISPA Tool 101
Algebraic Intruder Deductions 100
Constraint Differentiation: Search-Space Reduction for the Constraint-Based Analysis of Security Protocols 100
Automated Validation of Trust and Security of Service-Oriented Architectures with the AVANTSSAR Platform (Extended Abstract) 100
Labelled Deduction 99
Secure Pseudonymous Channels 97
Truth-values as labels: a general recipe for labelled deduction 96
Conditional simple temporal networks with uncertainty and decisions 96
Security Constraints in Temporal Role-Based Access-Controlled Workflows 96
Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols 95
Resource Controllability of Workflows Under Conditional Uncertainty 94
Fibring Labelled Deduction Systems 93
Formalizing and Analyzing Sender Invariance 93
My Galois 93
Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis 92
Towards a Metalogic for Security Protocol Analysis 92
Tableau systems for reasoning about risk 92
Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols (Extended Abstract) 91
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols 91
On the semantics of Alice&Bob specifications of security protocols 89
Symbolic and Cryptographic Analysis of the Secure WS-Reliable Messaging Scenario 88
Implementing modal and relevance logics in a logical framework 88
Galois 88
The AVISS Security Protocol Analysis Tool 87
Automated reasoning for security protocol analysis (Preface of the Special Issue of the Journal of Automated Reasoning on Computer Security: Foundations and Automated Reasoning) 87
Preface of the "Proceedings of the ICALP 2005 Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA’05)" 86
Labelled Deduction over Algebras of Truth-Values 85
Totale 12.749
Categoria #
all - tutte 46.790
article - articoli 15.619
book - libri 673
conference - conferenze 27.919
curatela - curatele 1.194
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 1.385
Totale 93.580


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021448 0 0 0 0 0 110 16 89 68 14 107 44
2021/2022989 58 312 14 22 79 29 22 52 27 32 77 265
2022/20231.922 156 160 178 329 182 422 17 138 235 16 65 24
2023/2024757 50 79 61 92 89 66 48 67 5 72 87 41
2024/20252.159 107 219 50 413 67 54 82 140 307 124 208 388
2025/20263.858 508 318 419 868 1.394 351 0 0 0 0 0 0
Totale 14.152