|
Search the dblp DataBase
Carlo Blundo:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Carlo Blundo, Antonella Cresti, Alfredo De Santis, Ugo Vaccaro
Fully Dynamic Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] CRYPTO, 1993, pp:110-125 [Conf]
- Carlo Blundo, Luiz A. Frota Mattos, Douglas R. Stinson
Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution. [Citation Graph (0, 0)][DBLP] CRYPTO, 1996, pp:387-400 [Conf]
- Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia, Ugo Vaccaro
Multi-Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] CRYPTO, 1994, pp:150-163 [Conf]
- Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro
On the Information Rate of Secret Sharing Schemes (Extended Abstract). [Citation Graph (0, 0)][DBLP] CRYPTO, 1992, pp:148-167 [Conf]
- Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung
Perfectly-Secure Key Distribution for Dynamic Conferences. [Citation Graph (0, 0)][DBLP] CRYPTO, 1992, pp:471-486 [Conf]
- Carlo Blundo, Stelvio Cimato
A Framework for Authenticated Web Services. [Citation Graph (0, 0)][DBLP] ECOWS, 2004, pp:61-71 [Conf]
- Carlo Blundo, Antonella Cresti
Space Requirements for Broadcast Encryption. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1994, pp:287-298 [Conf]
- Carlo Blundo, Antonio Giorgio Gaggia, Douglas R. Stinson
On the Dealer's Randomness Required in Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1994, pp:35-46 [Conf]
- Carlo Blundo, Alfredo De Santis, Douglas R. Stinson, Ugo Vaccaro
Graph Decompositions and Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1992, pp:1-24 [Conf]
- Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro
Secret Sharing Schemes with Veto Capabilities. [Citation Graph (0, 0)][DBLP] Algebraic Coding, 1993, pp:82-89 [Conf]
- Carlo Blundo, Paolo D'Arco
The Key Establishment Problem. [Citation Graph (0, 0)][DBLP] FOSAD, 2002, pp:44-90 [Conf]
- Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
Constructions and Bounds for Visual Cryptography. [Citation Graph (0, 0)][DBLP] ICALP, 1996, pp:416-428 [Conf]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis
Definitions and Bounds for Self-Healing Key Distribution Schemes. [Citation Graph (0, 0)][DBLP] ICALP, 2004, pp:234-245 [Conf]
- Carlo Blundo, Alfredo De Santis, Giuseppe Persiano, Ugo Vaccaro
On the Number of Random Bits in Totally Private Computation. [Citation Graph (0, 0)][DBLP] ICALP, 1995, pp:171-182 [Conf]
- Carlo Blundo, Alfredo De Santis, Ugo Vaccaro
Randomness in Distributed Protocols. [Citation Graph (0, 0)][DBLP] ICALP, 1994, pp:568-579 [Conf]
- Vincenzo Auletta, Carlo Blundo, Emiliano De Cristofaro, Guerriero Raimato
A Lightweight Framework forWeb Services Invocation over Bluetooth. [Citation Graph (0, 0)][DBLP] ICWS, 2006, pp:331-338 [Conf]
- Carlo Blundo, Clemente Galdi
Steganography Using Modern Arts. [Citation Graph (0, 0)][DBLP] IFIP TCS, 2000, pp:140-151 [Conf]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
A Novel Approach to Proactive Password Checking. [Citation Graph (0, 0)][DBLP] InfraSec, 2002, pp:30-39 [Conf]
- Vincenzo Auletta, Carlo Blundo, Stelvio Cimato, Guerriero Raimato
A Web Service Based Micro-payment System. [Citation Graph (0, 0)][DBLP] ISCC, 2006, pp:328-333 [Conf]
- Carlo Blundo, Stelvio Cimato, Roberto De Prisco
Certified Email: Design and Implementation of a New Optimistic Protocol.. [Citation Graph (0, 0)][DBLP] ISCC, 2003, pp:828-833 [Conf]
- Carlo Blundo, Paolo D'Arco, Massimiliano Listo
A New Self-Healing Key Distribution Scheme. [Citation Graph (0, 0)][DBLP] ISCC, 2003, pp:803-808 [Conf]
- Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:1-17 [Conf]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
Hyppocrates. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:63-80 [Conf]
- Carlo Blundo, Stelvio Cimato
A Platform for Secure E-Gambling. [Citation Graph (0, 0)][DBLP] ITCC (2), 2004, pp:768-772 [Conf]
- Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson
Dynamic Multi-threshold Metering Schemes. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2000, pp:130-143 [Conf]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson
New Results on Unconditionally Secure Distributed Oblivious Transfer. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2002, pp:291-309 [Conf]
- Carlo Blundo, Stelvio Cimato, Roberto De Prisco
A Lightweight Approach to Authenticated Web Caching. [Citation Graph (0, 0)][DBLP] SAINT, 2005, pp:157-163 [Conf]
- Carlo Blundo, Stelvio Cimato
SAWM: a tool for secure and authenticated web metering. [Citation Graph (0, 0)][DBLP] SEKE, 2002, pp:641-648 [Conf]
- Carlo Blundo, Alfredo De Santis, Ugo Vaccaro
Efficient Sharing of Many Secrets. [Citation Graph (0, 0)][DBLP] STACS, 1993, pp:692-703 [Conf]
- Carlo Blundo, Annalisa De Bonis, Barbara Masucci
Metering Schemes with Pricing. [Citation Graph (0, 0)][DBLP] DISC, 2000, pp:194-208 [Conf]
- Carlo Blundo, Clemente Galdi, Pino Persiano
Randomness Recycling in Constant-Round Private Computations (extended Abstract). [Citation Graph (0, 0)][DBLP] DISC, 1999, pp:138-150 [Conf]
- Carlo Blundo, Stelvio Cimato, Annalisa De Bonis
A lightweight protocol for the generation and distribution of secure e-coupons. [Citation Graph (0, 0)][DBLP] WWW, 2002, pp:542-552 [Conf]
- Carlo Blundo, Alfredo De Santis, Giuseppe Persiano, Ugo Vaccaro
Randomness Complexity of Private Computation. [Citation Graph (0, 0)][DBLP] Computational Complexity, 1999, v:8, n:2, pp:145-168 [Journal]
- Carlo Blundo, Alfredo De Santis
Visual cryptography schemes with perfect reconstruction of black pixels. [Citation Graph (0, 0)][DBLP] Computers & Graphics, 1998, v:22, n:4, pp:449-455 [Journal]
- Carlo Blundo, Paolo D'Arco, Antonio Giorgio Gaggia
A tau-Restricted Key Agreement Scheme. [Citation Graph (0, 0)][DBLP] Comput. J., 1999, v:42, n:1, pp:51-61 [Journal]
- Carlo Blundo, Clemente Galdi
Hiding Information in Image Mosaics. [Citation Graph (0, 0)][DBLP] Comput. J., 2003, v:46, n:2, pp:202-212 [Journal]
- Carlo Blundo, Stelvio Cimato
A Software Infrastructure for Authenticated Web Metering. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:4, pp:28-33 [Journal]
- Carlo Blundo, Paolo D'Arco, Carles Padró
A Ramp Model for Distributed Key Distribution Schemes. [Citation Graph (0, 0)][DBLP] Discrete Applied Mathematics, 2003, v:128, n:1, pp:47-64 [Journal]
- Carlo Blundo, Douglas R. Stinson
Anonymous Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] Discrete Applied Mathematics, 1997, v:77, n:1, pp:13-28 [Journal]
- Carlo Blundo, Annalisa De Bonis, Alfredo De Santis
Improved Schemes for Visual Cryptography. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2001, v:24, n:3, pp:255-278 [Journal]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Massimiliano Listo
Design of Self-Healing Key Distribution Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2004, v:32, n:1-3, pp:15-44 [Journal]
- Carlo Blundo, Antonio Giorgio Gaggia, Douglas R. Stinson
On the Dealer's Randomness Required in Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1997, v:11, n:3, pp:235-259 [Journal]
- Carlo Blundo, Sebastià Martín Molleví, Barbara Masucci, Carles Padró
A Linear Algebraic Approach to Metering Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2004, v:33, n:3, pp:241-260 [Journal]
- Carlo Blundo, Barbara Masucci, Douglas R. Stinson, Ruizhong Wei
Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2002, v:26, n:1-3, pp:97-110 [Journal]
- Carlo Blundo, Alfredo De Santis, Roberto De Simone, Ugo Vaccaro
Tight Bounds on the Information Rate of Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1997, v:11, n:2, pp:107-122 [Journal]
- Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
Visual Cryptography for General Access Structures [Citation Graph (0, 0)][DBLP] Electronic Colloquium on Computational Complexity (ECCC), 1996, v:3, n:12, pp:- [Journal]
- Carlo Blundo, Stelvio Cimato, Annalisa De Bonis
Secure E-Coupons. [Citation Graph (0, 0)][DBLP] Electronic Commerce Research, 2005, v:5, n:1, pp:117-139 [Journal]
- Carlo Blundo, Stelvio Cimato, Roberto De Prisco, Anna Lisa Ferrara
Modeling A Certified Email Protocol using I/O Automata. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:339-359 [Journal]
- Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
Visual Cryptography for General Access Structures. [Citation Graph (0, 0)][DBLP] Inf. Comput., 1996, v:129, n:2, pp:86-106 [Journal]
- Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung
Perfectly Secure Key Distribution for Dynamic Conferences. [Citation Graph (0, 0)][DBLP] Inf. Comput., 1998, v:146, n:1, pp:1-23 [Journal]
- Carlo Blundo, Alfredo De Santis, Ugo Vaccaro
Randomness in Distribution Protocols. [Citation Graph (0, 0)][DBLP] Inf. Comput., 1996, v:131, n:2, pp:111-139 [Journal]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis
A t-private k-database information retrieval scheme. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2001, v:1, n:1, pp:64-68 [Journal]
- Carlo Blundo, Clemente Galdi, Giuseppe Persiano
Low-randomness constant-round private XOR computations. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2007, v:6, n:1, pp:15-26 [Journal]
- Carlo Blundo
A Note on Dynamic Threshold Schemes. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1995, v:55, n:4, pp:189-193 [Journal]
- Carlo Blundo, Stelvio Cimato, Barbara Masucci
A note on optimal metering schemes. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2002, v:84, n:6, pp:319-326 [Journal]
- Carlo Blundo, Alfredo De Santis
Lower Bounds for Robust Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1997, v:63, n:6, pp:317-321 [Journal]
- Carlo Blundo, Alfredo De Santis, Antonio Giorgio Gaggia
Probability of Shares in Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1999, v:72, n:5-6, pp:169-175 [Journal]
- Carlo Blundo, Alfredo De Santis, Moni Naor
Visual cryptography for grey level images. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2000, v:75, n:6, pp:255-259 [Journal]
- Carlo Blundo, Alfredo De Santis, Ugo Vaccaro
On Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1998, v:65, n:1, pp:25-32 [Journal]
- Carlo Blundo, Antonella Cresti
Unconditional Secure Conference Key Distribution Schemes with Disenrollment Capability. [Citation Graph (0, 0)][DBLP] Inf. Sci., 1999, v:120, n:1-4, pp:113-130 [Journal]
- Carlo Blundo, Barbara Masucci
A Note on the Randomness in Dynamic Threshold Schemes. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1999, v:7, n:1, pp:73-85 [Journal]
- Carlo Blundo, Luiz A. Frota Mattos, Douglas R. Stinson
Multiple Key Distribution Maintaining User Anonymity via Broadcast Channels. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1995, v:3, n:4, pp:309-322 [Journal]
- Carlo Blundo, Paolo D'Arco
Analysis and Design of Distributed Key Distribution Centers. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2005, v:18, n:4, pp:391-414 [Journal]
- Carlo Blundo, Alfredo De Santis, Kaoru Kurosawa, Wakaha Ogata
On a Fallacious Bound for Authentication Codes. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1999, v:12, n:3, pp:155-159 [Journal]
- Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
On the Contrast in Visual Cryptography Schemes. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1999, v:12, n:4, pp:261-289 [Journal]
- Carlo Blundo, Alfredo De Santis, Douglas R. Stinson, Ugo Vaccaro
Graph Decompositions and Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1995, v:8, n:1, pp:39-64 [Journal]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
HYPPOCRATES: a new proactive password checker. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2004, v:71, n:1-2, pp:163-175 [Journal]
- Carlo Blundo, Barbara Masucci
Randomness in Multi-Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] J. UCS, 1999, v:5, n:7, pp:367-389 [Journal]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson
Contrast Optimal Threshold Visual Cryptography Schemes. [Citation Graph (0, 0)][DBLP] SIAM J. Discrete Math., 2003, v:16, n:2, pp:224-261 [Journal]
- Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
Extended capabilities for visual cryptography. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2001, v:250, n:1-2, pp:143-161 [Journal]
- Carlo Blundo, Antonella Cresti, Alfredo De Santis, Ugo Vaccaro
Fully Dynamic Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 1996, v:165, n:2, pp:407-440 [Journal]
- Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró
Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2004, v:320, n:2-3, pp:269-291 [Journal]
- Carlo Blundo, Luiz A. Frota Mattos, Douglas R. Stinson
Generalized Beimel-Chor Schemes for Broadcast Encryption and Interactive Key Distribution. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 1998, v:200, n:1-2, pp:313-334 [Journal]
- Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro
On the Information Rate of Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 1996, v:154, n:2, pp:283-306 [Journal]
- Carlo Blundo, Stelvio Cimato, Alfredo De Santis
Visual cryptography schemes with optimal pixel expansion. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2006, v:369, n:1-3, pp:169-182 [Journal]
- Carlo Blundo, Roberto De Prisco
New bounds on the expected length of one-to-one codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1996, v:42, n:1, pp:246-250 [Journal]
- Carlo Blundo, Alfredo De Santis, Antonio Giorgio Gaggia, Ugo Vaccaro
New bounds on the information rate of secret sharing schemes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1995, v:41, n:2, pp:549-554 [Journal]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis
On Self-Healing Key Distribution Schemes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2006, v:52, n:12, pp:5455-5467 [Journal]
- Carlo Blundo, Emiliano De Cristofaro
A Bluetooth-Based JXME Infrastructure. [Citation Graph (0, 0)][DBLP] OTM Conferences (1), 2007, pp:667-682 [Conf]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson
On Unconditionally Secure Distributed Oblivious Transfer. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2007, v:20, n:3, pp:323-373 [Journal]
Private-Key Hidden Vector Encryption with Key Confidentiality. [Citation Graph (, )][DBLP]
Validating Orchestration of Web Services with BPEL and Aggregate Signatures. [Citation Graph (, )][DBLP]
A Distributed Implementation of the Certified Information Access Service. [Citation Graph (, )][DBLP]
Improved Security Notions and Protocols for Non-transferable Identification. [Citation Graph (, )][DBLP]
Untraceable Tags Based on Mild Assumptions. [Citation Graph (, )][DBLP]
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports. [Citation Graph (, )][DBLP]
Performance evaluation of web services invocation over Bluetooth. [Citation Graph (, )][DBLP]
A simple role mining algorithm. [Citation Graph (, )][DBLP]
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. [Citation Graph (, )][DBLP]
A J2ME transparent middleware to support HTTP connections over Bluetooth. [Citation Graph (, )][DBLP]
Managing key hierarchies for access control enforcement: Heuristic approaches. [Citation Graph (, )][DBLP]
Search in 0.008secs, Finished in 0.011secs
|