VIGANO', Luca
 Distribuzione geografica
Continente #
NA - Nord America 5.173
EU - Europa 4.735
AS - Asia 3.143
SA - Sud America 402
AF - Africa 45
OC - Oceania 13
Continente sconosciuto - Info sul continente non disponibili 4
Totale 13.515
Nazione #
US - Stati Uniti d'America 5.094
RU - Federazione Russa 1.744
CN - Cina 1.245
SG - Singapore 1.183
GB - Regno Unito 1.113
FR - Francia 346
BR - Brasile 310
SE - Svezia 303
HK - Hong Kong 297
DE - Germania 252
IE - Irlanda 251
FI - Finlandia 242
IT - Italia 238
VN - Vietnam 132
KR - Corea 110
UA - Ucraina 82
BE - Belgio 62
CA - Canada 50
AR - Argentina 41
TR - Turchia 35
IN - India 29
BD - Bangladesh 21
NL - Olanda 20
MX - Messico 18
ES - Italia 17
ID - Indonesia 17
PL - Polonia 15
CM - Camerun 13
AU - Australia 12
ZA - Sudafrica 12
EC - Ecuador 11
DK - Danimarca 10
JP - Giappone 10
CL - Cile 9
PY - Paraguay 8
AE - Emirati Arabi Uniti 7
AT - Austria 7
IR - Iran 7
PE - Perù 7
IQ - Iraq 6
CO - Colombia 5
KE - Kenya 5
LU - Lussemburgo 5
MY - Malesia 5
UZ - Uzbekistan 5
VE - Venezuela 5
AZ - Azerbaigian 4
IL - Israele 4
JO - Giordania 4
PK - Pakistan 4
SA - Arabia Saudita 4
BO - Bolivia 3
CH - Svizzera 3
DO - Repubblica Dominicana 3
EU - Europa 3
GR - Grecia 3
HN - Honduras 3
LV - Lettonia 3
MA - Marocco 3
PH - Filippine 3
RO - Romania 3
RS - Serbia 3
TN - Tunisia 3
UY - Uruguay 3
AO - Angola 2
BN - Brunei Darussalam 2
HR - Croazia 2
HU - Ungheria 2
LT - Lituania 2
MD - Moldavia 2
NI - Nicaragua 2
NO - Norvegia 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AL - Albania 1
AM - Armenia 1
BB - Barbados 1
BG - Bulgaria 1
BH - Bahrain 1
CR - Costa Rica 1
CY - Cipro 1
DZ - Algeria 1
EE - Estonia 1
EG - Egitto 1
ET - Etiopia 1
GA - Gabon 1
KZ - Kazakistan 1
MN - Mongolia 1
MO - Macao, regione amministrativa speciale della Cina 1
MR - Mauritania 1
MU - Mauritius 1
NP - Nepal 1
NZ - Nuova Zelanda 1
OM - Oman 1
SN - Senegal 1
TM - Turkmenistan 1
TT - Trinidad e Tobago 1
Totale 13.515
Città #
Southend 909
Jacksonville 750
Chandler 655
Woodbridge 581
Moscow 490
Singapore 479
Ann Arbor 414
Dallas 370
Houston 348
Hong Kong 286
Ashburn 276
Dublin 251
Beijing 145
Nanjing 139
Lawrence 118
Princeton 118
Jinan 109
Wilmington 98
Shenyang 81
Los Angeles 74
The Dalles 68
Verona 66
Columbus 63
Brussels 60
Seoul 53
Buffalo 52
Changsha 52
Tianjin 51
Ho Chi Minh City 49
Milan 45
Hebei 43
Sindelfingen 43
Zhengzhou 41
Nanchang 40
Boardman 39
Lancaster 38
Ningbo 35
Haikou 32
Munich 30
Taizhou 30
Hanoi 29
Santa Clara 29
Helsinki 28
Hangzhou 26
Guangzhou 24
Redondo Beach 23
Frankfurt am Main 22
Taiyuan 21
New York 20
Des Moines 19
Norwalk 19
Cambridge 18
Jiaxing 18
São Paulo 18
Belo Horizonte 17
Brooklyn 17
San Francisco 17
Lanzhou 16
Toronto 16
Rio de Janeiro 15
Washington 13
Chicago 12
Council Bluffs 12
Montreal 12
Amsterdam 11
Boston 11
Fuzhou 11
London 11
Seattle 10
Turku 10
Warsaw 10
Auburn Hills 9
Atlanta 8
Tokyo 8
Denver 7
Dhaka 7
Dong Ket 7
Groningen 7
Johannesburg 7
Tappahannock 7
Buenos Aires 6
Elora 6
Jakarta 6
Lima 6
Neubiberg 6
Ottawa 6
Phoenix 6
Porto Alegre 6
Qingdao 6
Berazategui 5
Biên Hòa 5
Chennai 5
Copenhagen 5
Edinburgh 5
Fairfield 5
Fort Worth 5
Itaquaquecetuba 5
Luxembourg 5
Orem 5
Redwood City 5
Totale 8.332
Nome #
A Hierarchy of Knowledge for the Formal Analysis of Security-Sensitive Business Processes 210
Quantum State Transformations and Branching Distributed Temporal Logic 208
Attack Interference in Non-collaborative Scenarios for Security Protocol Analysis 207
On the mosaic method for many-dimensional modal logics: a case study combining tense and modal operators 202
Blocking Underhand Attacks by Hidden Coalitions 195
Workflow and Access Control Reloaded: a Declarative Specification Framework for the Automated Analysis of Web Services 191
A labeled deduction system for the logic UB 188
A Deduction System for Meaning Negotiation 186
A Declarative Two-Level Framework to Specify and Verify Workflow and Authorization Policies in Service-Oriented Architectures 184
A History of Until 172
Towards Formal Validation of Trust and Security in the Internet of Services 167
Security protocols as environments: A lesson from non-collaboration 164
Access Controlled Temporal Networks 159
A Qualitative Modal Representation of Quantum Register Transformations 158
WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications 158
Towards a Logical Framework for Reasoning about Risk 155
An Environmental Paradigm for Defending Security Protocols 154
Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection 153
Distributed Temporal Logic for the Analysis of Security Protocol Models 152
A Branching Distributed Temporal Logic for Reasoning about Entanglement-Free Quantum State Transformations 151
Conditional Simple Temporal Networks with Uncertainty and Resources 148
Using interpolation for the verification of security protocols 147
Alice and Bob: Reconciling Formal Models and Implementation 147
Security is Beautiful 146
Security is Beautiful (Transcript of Discussion) 145
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures 143
A Labeled Natural Deduction System for a Fragment of CTL∗ 142
A New Method for Bounding the Complexity of Modal Logics 138
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures 138
A Formal Approach to Analyzing Cyber-Forensics Evidence 137
A Formalization of Off-Line Guessing for Security Protocol Analysis 136
Automated Validation of Security-sensitive Web Services specified in BPEL and RBAC 135
A Recipe for the Complexity Analysis of Non-Classical Logics 133
A Modular Presentation of Modal Logics in a Logical Framework 133
A labeled tableaux system for the Distributed Temporal Logic DTL 133
A complete tableau procedure for risk analysis 130
A Formal Data-Model of the CORBA Security Service 128
Attack Interference: A Path to Defending Security Protocols 128
An automated approach for testing the security of web applications against chained attacks 128
Back from the future 126
A Topography of Labelled Model Logics 125
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version) 125
Weak, Strong and Dynamic Controllability of Access-Controlled Workflows Under Conditional Uncertainty 123
A Formal Analysis of the CORBA Security Service 122
Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment 122
Constraint Networks Under Conditional Uncertainty 121
Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA 119
Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities 119
Hybrid SAT-Based Consistency Checking Algorithms for Simple Temporal Networks with Decisions 118
Labelled natural deduction for a bundled branching temporal logic 116
An O(n log n)-Space Decision Procedure for the Relevance Logic B+ 114
Labelled quantified modal logics 114
Modal Deduction Systems for Quantum State Transformations 112
Labelled Propositional Modal Logics: Theory and Practice 108
A Topological Categorization of Agents for the Definition of Attack States in Multi-agent Systems 108
An On-The-Fly Model-Checker for Security Protocol Analysis 107
Consistency checking of STNs with decisions: Managing temporal and access-control constraints in a seamless way 106
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications 105
SEL Compiler and Abstract Analyzers 105
OFMC: A Symbolic Model-Checker for Security Protocols 104
Labelled Non-Classical Logics 104
Natural Deduction for Non-Classical Logics 103
Modal Specifications of Trace-Based Security Properties 103
Labeled natural deduction systems for a family of tense logics 103
Conditional Uncertainty in Constraint Networks 103
Labelled Modal Logics: Quantifiers 102
Modal Sequent Calculi Labelled with Truth-values: Completeness, Duality and Analyticity 101
Modal logics K, T, K4, S4: labelled proof systems and new complexity results 100
Last man standing: Static, decremental and dynamic resiliency via controller synthesis 100
Building and executing proof strategies in a formal metatheory 99
Towards an awareness-based semantics for security protocol analysis 98
Algebraic Intruder Deductions 97
Labelled Deduction 97
Deconstructing Alice and Bob 97
SecTest 2011, the Second International Workshop on Security Testing 97
Constraint Differentiation: Search-Space Reduction for the Constraint-Based Analysis of Security Protocols 96
Truth-values as labels: a general recipe for labelled deduction 95
Secure Pseudonymous Channels 95
Automated Validation of Trust and Security of Service-Oriented Architectures with the AVANTSSAR Platform (Extended Abstract) 95
Automated Security Protocol Analysis With the AVISPA Tool 95
Security Constraints in Temporal Role-Based Access-Controlled Workflows 94
Conditional simple temporal networks with uncertainty and decisions 93
Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis 91
Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols 91
Resource Controllability of Workflows Under Conditional Uncertainty 91
Formalizing and Analyzing Sender Invariance 90
Fibring Labelled Deduction Systems 89
My Galois 89
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols 88
On the semantics of Alice&Bob specifications of security protocols 87
Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols (Extended Abstract) 87
Towards a Metalogic for Security Protocol Analysis 86
Tableau systems for reasoning about risk 86
Symbolic and Cryptographic Analysis of the Secure WS-Reliable Messaging Scenario 85
The AVISS Security Protocol Analysis Tool 84
Implementing modal and relevance logics in a logical framework 84
Galois 84
Automated reasoning for security protocol analysis (Preface of the Special Issue of the Journal of Automated Reasoning on Computer Security: Foundations and Automated Reasoning) 84
Labelled Deduction over Algebras of Truth-Values 83
Metareasoning about Security Protocols using Distributed Temporal Logic 83
Totale 12.277
Categoria #
all - tutte 45.497
article - articoli 15.158
book - libri 656
conference - conferenze 27.175
curatela - curatele 1.161
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 1.347
Totale 90.994


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021554 0 0 0 0 106 110 16 89 68 14 107 44
2021/2022989 58 312 14 22 79 29 22 52 27 32 77 265
2022/20231.922 156 160 178 329 182 422 17 138 235 16 65 24
2023/2024757 50 79 61 92 89 66 48 67 5 72 87 41
2024/20252.159 107 219 50 413 67 54 82 140 307 124 208 388
2025/20263.332 508 318 419 868 1.219 0 0 0 0 0 0 0
Totale 13.626