A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS C Lepore, M Ceria, A Visconti, UP Rao, KA Shah, L Zanolini Mathematics 8 (10), 1782, 2020 | 111 | 2020 |
On the weaknesses of PBKDF2 A Visconti, S Bossi, H Ragab, A Calò Cryptology and Network Security: 14th International Conference, CANS 2015 …, 2015 | 40 | 2015 |
Artificial immune system based on interval type-2 fuzzy set paradigm A Visconti, H Tahayori Applied Soft Computing 11 (6), 4055-4063, 2011 | 35 | 2011 |
What users should know about full disk encryption based on LUKS S Bossi, A Visconti Cryptology and Network Security: 14th International Conference, CANS 2015 …, 2015 | 31 | 2015 |
Concave type-2 fuzzy sets: properties and operations H Tahayori, AGB Tettamanzi, G Degli Antoni, A Visconti, M Moharrer Soft Computing 14, 749-756, 2010 | 31 | 2010 |
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2 A Visconti, F Gorla IEEE Transactions on Dependable and Secure Computing 17 (4), 775-781, 2018 | 30 | 2018 |
On the calculation of extended max and min operations between convex fuzzy sets of the real line H Tahayori, AGB Tettamanzi, G Degli Antoni, A Visconti Fuzzy Sets and Systems 160 (21), 3103-3114, 2009 | 30 | 2009 |
An iot inventory before deployment: a survey on iot protocols, communication technologies, vulnerabilities, attacks, and future research directions AO Bang, UP Rao, A Visconti, A Brighente, M Conti Computers & Security 123, 102914, 2022 | 29 | 2022 |
An innate immune system for the protection of computer networks A Pagnoni, A Visconti Proc. of the 4th International Symposium on Information and Communication …, 2005 | 28 | 2005 |
Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF (2) A Visconti, CV Schiavo, R Peralta Information processing letters 137, 1-5, 2018 | 23 | 2018 |
The dangers of rooting: data leakage detection in android applications L Casati, A Visconti Mobile Information Systems 2018 (1), 6020461, 2018 | 19 | 2018 |
Examining PBKDF2 security margin—Case study of LUKS A Visconti, O Mosnáček, M Brož, V Matyáš Journal of Information Security and Applications 46, 296-306, 2019 | 18 | 2019 |
Secure electronic bills of lading: blind counts and digital signatures A Pagnoni, A Visconti Electronic Commerce Research 10, 363-388, 2010 | 18 | 2010 |
Discovering varying patterns of Normal and interleaved ADLs in smart homes M Raeiszadeh, H Tahayori, A Visconti Applied Intelligence 49 (12), 4175-4188, 2019 | 14 | 2019 |
Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy sets A Visconti, H Tahayori 2009 International Conference for Internet Technology and Secured …, 2009 | 14 | 2009 |
Understanding optimizations and measuring performances of PBKDF2 AF Iuorio, A Visconti 2nd International Conference on Wireless Intelligent and Distributed …, 2019 | 12 | 2019 |
Operations on type-2 fuzzy sets based on the set of pseudo-highest intersection points of convex fuzzy sets H Tahayori, A Sadeghian, A Visconti 2010 Annual Meeting of the North American Fuzzy Information Processing …, 2010 | 11 | 2010 |
Polynomial multiplication over binary finite fields: new upper bounds A De Piccoli, A Visconti, OG Rizzo Journal of Cryptographic Engineering 10 (3), 197-210, 2020 | 10 | 2020 |
Internet of things design, architectures and protocols I Woungang, SK Dhurandher, A Visconti Internet of Things 14, 100267, 2021 | 9 | 2021 |
Preserving cultural heritage: a new approach to increase the life expectancy of optical discs G Haus, C Polizzi, A Visconti Journal of Cultural Heritage 29, 67-74, 2018 | 8 | 2018 |