andrea visconti
Cited by
Cited by
On the weaknesses of PBKDF2
A Visconti, S Bossi, H Ragab, A Calò
International Conference on Cryptology and Network Security, 119-126, 2015
Artificial immune system based on interval type-2 fuzzy set paradigm
A Visconti, H Tahayori
Applied Soft Computing 11 (6), 4055-4063, 2011
Concave type-2 fuzzy sets: properties and operations
H Tahayori, AGB Tettamanzi, G Degli Antoni, A Visconti, M Moharrer
Soft Computing 14 (7), 749-756, 2010
An innate immune system for the protection of computer networks
A Pagnoni, A Visconti
Proceedings of the 4th international symposium on Information and …, 2005
What users should know about full disk encryption based on LUKS
S Bossi, A Visconti
International Conference on Cryptology and Network Security, 225-237, 2015
On the calculation of extended max and min operations between convex fuzzy sets of the real line
H Tahayori, AGB Tettamanzi, G Degli Antoni, A Visconti
Fuzzy Sets and Systems 160 (21), 3103-3114, 2009
Secure electronic bills of lading: blind counts and digital signatures
A Pagnoni, A Visconti
Electronic Commerce Research 10 (3), 363-388, 2010
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2
A Visconti, F Gorla
IEEE Transactions on Dependable and Secure Computing 17 (4), 775-781, 2018
Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy sets
A Visconti, H Tahayori
2009 International Conference for Internet Technology and Secured …, 2009
Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF (2)
A Visconti, CV Schiavo, R Peralta
Information processing letters 137, 1-5, 2018
Operations on type-2 fuzzy sets based on the set of pseudo-highest intersection points of convex fuzzy sets
H Tahayori, A Sadeghian, A Visconti
2010 Annual Meeting of the North American Fuzzy Information Processing …, 2010
The dangers of rooting: data leakage detection in android applications
L Casati, A Visconti
Mobile Information Systems 2018, 2018
Discovering varying patterns of Normal and interleaved ADLs in smart homes
M Raeiszadeh, H Tahayori, A Visconti
Applied Intelligence 49 (12), 4175-4188, 2019
A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS
C Lepore, M Ceria, A Visconti, UP Rao, KA Shah, L Zanolini
Mathematics 8 (10), 1782, 2020
Examining PBKDF2 security margin—Case study of LUKS
A Visconti, O Mosnáček, M Brož, V Matyáš
Journal of Information Security and Applications 46, 296-306, 2019
Intrusion detection via artificial immune system: A performance-based approach
A Visconti, N Fusi, H Tahayori
IFIP International Conference on Biologically Inspired Collaborative …, 2008
Polynomial multiplication over binary finite fields: new upper bounds
A De Piccoli, A Visconti, OG Rizzo
Journal of Cryptographic Engineering 10 (3), 197-210, 2020
Exploiting a bad user practice to retrieve data leakage on android password managers
L Casati, A Visconti
International Conference on Innovative Mobile and Internet Services in …, 2017
A Biologically–Inspired type-2 fuzzy set based algorithm for detecting misbehaving nodes in ad hoc networks
A Visconti, H Tahayori
International Journal for Infonomics 3 (2), 270-277, 2010
Understanding optimizations and measuring performances of PBKDF2
AF Iuorio, A Visconti
International Conference on Wireless Intelligent and Distributed Environment …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20