Publications

Google Scholar Profile
ResearchGate Profile
Papers from DBLP

Journals

  1. A.Visconti, F.Gorla, Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2. IEEE Transactions on Dependable and Secure Computing, 17(4), pg.775-781, ISSN 1545-5971, Jul 2020.

  2. A. De Piccoli, A.Visconti, O.G.Rizzo, Polynomial multiplication over binary finite fields: new upper bounds , Journal of Cryptographic Engineering, 10(3), pg.197-210, ISSN 2190-8508, 2020.

  3. C.Lepore, M.Ceria, A.Visconti, U.P.Rao, K.A.Shah, L.Zanolini, A Survey on Blockchain Consensus with a Performance Comparison of PoW, PoS and Pure PoS, Mathematics, 8(10), 1782, ISSN 2227-7390, 2020.

  4. B.Barkee, M.Ceria, T.Moriarty, A.Visconti, Why you cannot even hope to use Grobner bases in cryptography: an eternal golden braid of failures, Applicable Algebra in Engineering, Communications and Computing, 31(3), pg.235-252, ISSN 0938-1279, 2020.

  5. M. Raeiszadeh, H.Tahayori, A.Visconti, Discovering varying patterns of Normal and interleaved ADLs in smart homes. Applied Intelligence, 49(12), pg.4175-4188, ISSN 0924-669X, Dec 2019.

  6. A.Visconti, O.Mosnáček, M.Brož, V.Matyáš, Examining PBKDF2 security margin --- case study of LUKS, Journal of Information Security and Applications, 46, pg.296-306, ISSN 2214-2126, Jun 2019.

  7. D.G.V.Albricci, M.Ceria, F.Cioschi, N.Fornari, A.Shakiba, A.Visconti, Measuring Performances of a White-Box Approach in the IoT Context. Symmetry, 11(8), Article number 1000, ISSN 2073-8994, Aug 2019.

  8. M.Erfanmanesh, H.Tahayori, A.Visconti, Elderly Action Prediction and Anomalous Activity Detection in Smart Homes through Profiling Residents' Behavior. Modern Care Journal, 16(3), ISSN 2423-787, Aug 2019.

  9. A.Visconti, C.V.Schiavo, R.Peralta, Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2). Information Processing Letters, 137, pg.1-5, ISSN 0020-0190, Sept 2018.

  10. L.Casati, A.Visconti, The Dangers of Rooting: Data Leakage Detection in Android Application. Mobile Information Systems, Article ID 6020461, ISSN 1574-017X, Feb 2018.

  11. G.Haus, C.Polizzi, A.Visconti, Preserving cultural heritage: A new approach to increase the life expectancy of optical disc. Journal of Cultural Heritage, 29, pg.67-74, ISSN 1296-2074, Jan 2018.

  12. A.Visconti, H.Tahayori, Artificial immune system based on interval type-2 fuzzy set paradigm. Applied Soft Computing, 11(6), pg.4055-4063, ISSN 1568-4946, 2011.

  13. A.Pagnoni, A.Visconti, Secure Electronic Bills of Lading: Blind Counts and Digital Signatures. Electronic Commerce Research, 10(3), pg.363-388, ISSN 1389-5753, 2010.

  14. A.Visconti, H.Tahayori, A Biologically-Inspired Type-2 Fuzzy Set Based Algorithm for Detecting Misbehaving Nodes in Ad-Hoc Wireless Networks. International Journal for Infonomics, 3(2), pg.373-382, ISSN 1742-4712, 2010.

  15. H.Tahayori, A.G.B.Tettamanzi, G.Degli Antoni, A.Visconti, M.Moharrer, Concave Type-2 Fuzzy Sets: Properties and Operations. Soft Computing, 14(7), pg.749-756, ISSN 1432-7643, 2010.

  16. H.Tahayori, A.G.B. Tettamanzi, G.Degli Antoni, A.Visconti, On the Calculation of Extended Max and Min Operations between Convex Fuzzy Sets of the Real Line. Fuzzy Sets and Systems, 160(21), pg.3103-3114, ISSN 0165-0114, 2009.

Conferences and book chapters

  1. M.Mazzocut-Mis, A.Visconti, H.Tahayori, M.Ceria, Sublime Experience: New Strategies for Measuring the Aesthetic Impact of the Sublime In proceedings of Imagine Math 7, Conference "Mathematics and Culture", M.Emmer, M.Abate, Eds., ISBN 978-3-030-42652-1, Springer-Verlag, 2020.

  2. F.Cioschi, N.Fornari, A.Visconti, White-box Cryptography: A Time-security Trade-off for the SPNbox Family. In proceedings of the 2nd International Conference on International Conference on Wireless, Intelligent and Distributed Environment for Communication, WIDECOM 2019, I.Woungang, S.K.Dhurandher, Eds., ISSN 2367-4512, Lecture Notes on Data Engineering and Communications Technologies, Vol.27, Springer-Verlag, 2019.

  3. A.F.Iuorio, A.Visconti, Understanding Optimizations and Measuring Performances of PBKDF2. In proceedings of the 2nd International Conference on International Conference on Wireless, Intelligent and Distributed Environment for Communication, WIDECOM 2019, I.Woungang, S.K.Dhurandher, Eds., ISSN 2367-4512, Lecture Notes on Data Engineering and Communications Technologies, Vol.27, Springer-Verlag, 2019.

  4. M.Ceria, T.Mora, A.Visconti, Efficient Computation of Squarefree Separator Polynomials. In proceedings of the 6th International Conference on Mathematical Software, ICMS 2018, J.H.Davenport et al., Eds., LNCS 10931, ISSN 0302-9743, Springer-Verlag, 2018.

  5. L.Casati, A.Visconti, Exploiting a Bad User Practice to Retrieve Data Leakage on Android Password Managers. In Advances in Intelligent Systems and Computing, 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2017, LNCS 612, ISSN 2194-5357, Springer-Verlag, 2017.

  6. A.Visconti, S.Bossi, H.Ragab, A.Calo', On the Weaknesses of PBKDF2. In Cryptology and Network Security, 14th International Conference on Cryptology and Network Security, CANS 2015, LNCS 9476, ISSN 0302-9743, Springer-Verlag, 2015.

  7. S.Bossi, A.Visconti, What Users Should Know About Full Disk Encryption Based on LUKS. In Cryptology and Network Security, 14th International Conference on Cryptology and Network Security, CANS 2015, LNCS 9476, ISSN 0302-9743, Springer-Verlag, 2015.

  8. S.Mella, F.Melzani, A. Visconti, Differential Fault Attacks against AES tampering with the Instruction Flow. In proceedings of the 11th International Conference on Security and Cryptography, SECRYPT14, ISBN , 2014.

  9. D.D'angella, C.V. Schiavo, A. Visconti, Tight upper bounds for polynomial multiplication. In proceedings of the 6th WSEAS world congress: applied computing conference, ACC '13, ISBN 9789604743544, 2013.

  10. C.V. Schiavo, A. Visconti, An improved public-key tracing scheme with sublinear ciphertext size. In proceedings of the 9th International Conference on Security and Cryptography, SECRYPT12, ISBN 978-989-8565-24-2, 2012.

  11. H.Tahayori, Alireza Sadeghian, Andrea Visconti Operations on Type-2 Fuzzy Sets Based on the Set of Pseudo-Highest Intersection Points of Convex Fuzzy Sets. In IEEE Proceedings of the 2010 Annual Meeting of the North American Fuzzy Information Processing Society, NAFIPS10, ISBN 978-1-4244-7857-6, 2010.

  12. A.Visconti, H.Tahayori, Detecting Misbehaving Nodes in MANET with an Artificial Immune System Based on Type-2 Fuzzy Sets. In IEEE Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, ICITST09, ISBN 978-1-4244-5647-5, 2009.

  13. A.Visconti, H.Tahayori, A Type-2 Fuzzy Set Recognition Algorithm for Artificial Immune Systems. In Hybrid Artificial Intelligence Systems, 3rd International Workshop HAIS 2008, E.Corchado et al., Eds., LNCS 5271 (LNAI), ISSN 0302-9743, Springer-Verlag, 2008.

  14. A.Visconti, N.Fusi, H.Tahayori, Intrusion Detection via Artificial Immune System: a Performance-based Approach. In Biologically-Inspired Collaborative Computing, IFIP 20th World Computer Congress, 2nd IFIP International Conference on Biologically-Inspired Collaborative Computing, M.Hinchey et al., Eds., Vol.268/2008, ISSN 1571-5736, Springer-Verlag, 2008.

  15. H.Tahayori, A.Visconti, Distributed-Interval Type-2 Fuzzy Set Based Recognition Algorithm for IDS. In Proceedings of the 2008 IEEE International Conference on Granular Computing, GrC08, ISBN 978-1-4244-2512-9, 2008.

  16. H.Tahayori, A.Visconti, G.Degli Antoni, Spam Filtering Model Based on Interval Type-2 Fuzzy Set Paradigm. In IEEE Proceedings of the 5th International Conference on Information & Communications Technology, ICICT07, ISBN 978-1-4244-1430-7, 2007.

  17. H.Tahayori, A.Visconti, G.Degli Antoni, Email Granulation Based On Distributed-Interval Type-2 Fuzzy Set Methodologies In Proceedings of the 2007 IEEE International Conference on Granular Computing, GrC07, ISBN 0-7695-3032-X, 2007.

  18. H.Tahayori, A.Visconti, G.Degli Antoni, Augmented Interval Type-2 Fuzzy Set Methodologies for Email Granulation. In Proceedings of the 2nd IEEE International Workshop on Soft Computing Applications, SOFA07, ISBN 978-1-4244-1608-0, 2007.

  19. A.Visconti, EZK: A Zero Knowledge Tool For Generating, Handling, And Securing Electronic Bills Of Lading. In Proceedings of the 3rd International Conference on Web Information System and Technologies, WEBIST07, ISBN 978-972-8865-79-5, 2007.

  20. A.Pagnoni, A.Visconti, Electronic Bill of Lading: A Cryptographic Protocol. In Proceedings of IADIS International Conference e-commerce 2006, S. Krishnamurthy and P.Isaías, eds., ISBN 972-8924-23-2, 2006.

  21. A.Pagnoni, A.Visconti, Real-time Detection of Pathological Traffic Situations via AIS. In Proceedings of Entwurf komplexer Automatisierungssysteme, E. Schnieder, ed., EKA06, ISBN 3-9803363-9-5, 2006. (Invited)

  22. A.Pagnoni, A.Visconti, SIGNET: A Tool for Securing Complex Petri-Net Projects. In Proceedings of Entwurf komplexer Automatisierungssysteme, E.Schnieder, ed., EKA06, ISBN 3-9803363-9-5, 2006.

  23. A.Pagnoni, A.Visconti, Profiling Network Attacks via AIS. In Neural Nets, 16th Italian Workshop on Neural Nets, WIRN05, and International Workshop on Natural and Artificial Immune System, NAIS05, B.Apolloni et al., Eds., LNCS 3931, ISSN 0302-9743, Springer-Verlag, 2005.

  24. A.Pagnoni, A.Visconti, An Innate Immune System for the Protection of Computer Networks. In Proceedings of the 4th International Symposium on Information and Communication Technologies, WISICT05, B.R.Baltes et al., eds., ACM International Conference Proceedings Series, ISBN 0-9544145-6-X, 2005.

  25. A.Visconti, Testing of Native Immune System for the Protection of Computer Networks. In Proceedings of IADIS International Conference Applied Computing 2005, N.Guimarães and P.Isaías, eds., Vol. 2, ISBN 972-99353-6-X, 2005.

  26. A.Pagnoni, A.Visconti, Simulation of Error-Prone Biological Systems. In Proceedings of the Winter International Symposium on Information and Communication Technologies, WISICT04, M.Alesky et al., eds., ACM International Conference Proceedings Series, ISBN 0-9544145-3-5, 2004.

  27. A.Pagnoni, S.A.Parisi, A.Visconti, Intrusion Detection via Artificial Immune Networks. In Proceedings of X Convención International y Feria INFORMATICA 2004, La Habana, Cuba, ISBN 959-237-227-2, 2004. (Invited)

  28. A.Pagnoni, A.Visconti, NAIS: Intrusion Detection via Native Immune Systems. In Communications, Information Technologies and Computing, Proceedings of the 10th International Conference on Cybernetics and Information Technologies, Systems and Applications, CITSA04, Hsing-Wei Chu et al., eds., ISBN 980-6560-19-1, 2004.

  29. A.Pagnoni, A.Visconti, Detection and Analysis of Unexpected State Components in Biological Systems. In Computational Methods in Computer Biology, 1st International Workshop, CMSB03, C.Priami, Ed., LNCS 2602, Springer-Verlag, ISSN 0302-9743, Springer-Verlag, 2003.