The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Carlo Blundo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Carlo Blundo, Antonella Cresti, Alfredo De Santis, Ugo Vaccaro
    Fully Dynamic Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:110-125 [Conf]
  2. Carlo Blundo, Luiz A. Frota Mattos, Douglas R. Stinson
    Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:387-400 [Conf]
  3. Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia, Ugo Vaccaro
    Multi-Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:150-163 [Conf]
  4. Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro
    On the Information Rate of Secret Sharing Schemes (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:148-167 [Conf]
  5. Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung
    Perfectly-Secure Key Distribution for Dynamic Conferences. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:471-486 [Conf]
  6. Carlo Blundo, Stelvio Cimato
    A Framework for Authenticated Web Services. [Citation Graph (0, 0)][DBLP]
    ECOWS, 2004, pp:61-71 [Conf]
  7. Carlo Blundo, Antonella Cresti
    Space Requirements for Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:287-298 [Conf]
  8. Carlo Blundo, Antonio Giorgio Gaggia, Douglas R. Stinson
    On the Dealer's Randomness Required in Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:35-46 [Conf]
  9. Carlo Blundo, Alfredo De Santis, Douglas R. Stinson, Ugo Vaccaro
    Graph Decompositions and Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:1-24 [Conf]
  10. Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro
    Secret Sharing Schemes with Veto Capabilities. [Citation Graph (0, 0)][DBLP]
    Algebraic Coding, 1993, pp:82-89 [Conf]
  11. Carlo Blundo, Paolo D'Arco
    The Key Establishment Problem. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2002, pp:44-90 [Conf]
  12. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
    Constructions and Bounds for Visual Cryptography. [Citation Graph (0, 0)][DBLP]
    ICALP, 1996, pp:416-428 [Conf]
  13. Carlo Blundo, Paolo D'Arco, Alfredo De Santis
    Definitions and Bounds for Self-Healing Key Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    ICALP, 2004, pp:234-245 [Conf]
  14. Carlo Blundo, Alfredo De Santis, Giuseppe Persiano, Ugo Vaccaro
    On the Number of Random Bits in Totally Private Computation. [Citation Graph (0, 0)][DBLP]
    ICALP, 1995, pp:171-182 [Conf]
  15. Carlo Blundo, Alfredo De Santis, Ugo Vaccaro
    Randomness in Distributed Protocols. [Citation Graph (0, 0)][DBLP]
    ICALP, 1994, pp:568-579 [Conf]
  16. Vincenzo Auletta, Carlo Blundo, Emiliano De Cristofaro, Guerriero Raimato
    A Lightweight Framework forWeb Services Invocation over Bluetooth. [Citation Graph (0, 0)][DBLP]
    ICWS, 2006, pp:331-338 [Conf]
  17. Carlo Blundo, Clemente Galdi
    Steganography Using Modern Arts. [Citation Graph (0, 0)][DBLP]
    IFIP TCS, 2000, pp:140-151 [Conf]
  18. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
    A Novel Approach to Proactive Password Checking. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:30-39 [Conf]
  19. Vincenzo Auletta, Carlo Blundo, Stelvio Cimato, Guerriero Raimato
    A Web Service Based Micro-payment System. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:328-333 [Conf]
  20. Carlo Blundo, Stelvio Cimato, Roberto De Prisco
    Certified Email: Design and Implementation of a New Optimistic Protocol.. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:828-833 [Conf]
  21. Carlo Blundo, Paolo D'Arco, Massimiliano Listo
    A New Self-Healing Key Distribution Scheme. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:803-808 [Conf]
  22. Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró
    Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:1-17 [Conf]
  23. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
    Hyppocrates. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:63-80 [Conf]
  24. Carlo Blundo, Stelvio Cimato
    A Platform for Secure E-Gambling. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:768-772 [Conf]
  25. Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson
    Dynamic Multi-threshold Metering Schemes. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:130-143 [Conf]
  26. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson
    New Results on Unconditionally Secure Distributed Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:291-309 [Conf]
  27. Carlo Blundo, Stelvio Cimato, Roberto De Prisco
    A Lightweight Approach to Authenticated Web Caching. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:157-163 [Conf]
  28. Carlo Blundo, Stelvio Cimato
    SAWM: a tool for secure and authenticated web metering. [Citation Graph (0, 0)][DBLP]
    SEKE, 2002, pp:641-648 [Conf]
  29. Carlo Blundo, Alfredo De Santis, Ugo Vaccaro
    Efficient Sharing of Many Secrets. [Citation Graph (0, 0)][DBLP]
    STACS, 1993, pp:692-703 [Conf]
  30. Carlo Blundo, Annalisa De Bonis, Barbara Masucci
    Metering Schemes with Pricing. [Citation Graph (0, 0)][DBLP]
    DISC, 2000, pp:194-208 [Conf]
  31. Carlo Blundo, Clemente Galdi, Pino Persiano
    Randomness Recycling in Constant-Round Private Computations (extended Abstract). [Citation Graph (0, 0)][DBLP]
    DISC, 1999, pp:138-150 [Conf]
  32. Carlo Blundo, Stelvio Cimato, Annalisa De Bonis
    A lightweight protocol for the generation and distribution of secure e-coupons. [Citation Graph (0, 0)][DBLP]
    WWW, 2002, pp:542-552 [Conf]
  33. Carlo Blundo, Alfredo De Santis, Giuseppe Persiano, Ugo Vaccaro
    Randomness Complexity of Private Computation. [Citation Graph (0, 0)][DBLP]
    Computational Complexity, 1999, v:8, n:2, pp:145-168 [Journal]
  34. Carlo Blundo, Alfredo De Santis
    Visual cryptography schemes with perfect reconstruction of black pixels. [Citation Graph (0, 0)][DBLP]
    Computers & Graphics, 1998, v:22, n:4, pp:449-455 [Journal]
  35. Carlo Blundo, Paolo D'Arco, Antonio Giorgio Gaggia
    A tau-Restricted Key Agreement Scheme. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1999, v:42, n:1, pp:51-61 [Journal]
  36. Carlo Blundo, Clemente Galdi
    Hiding Information in Image Mosaics. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2003, v:46, n:2, pp:202-212 [Journal]
  37. Carlo Blundo, Stelvio Cimato
    A Software Infrastructure for Authenticated Web Metering. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:28-33 [Journal]
  38. Carlo Blundo, Paolo D'Arco, Carles Padró
    A Ramp Model for Distributed Key Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2003, v:128, n:1, pp:47-64 [Journal]
  39. Carlo Blundo, Douglas R. Stinson
    Anonymous Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 1997, v:77, n:1, pp:13-28 [Journal]
  40. Carlo Blundo, Annalisa De Bonis, Alfredo De Santis
    Improved Schemes for Visual Cryptography. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2001, v:24, n:3, pp:255-278 [Journal]
  41. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Massimiliano Listo
    Design of Self-Healing Key Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:15-44 [Journal]
  42. Carlo Blundo, Antonio Giorgio Gaggia, Douglas R. Stinson
    On the Dealer's Randomness Required in Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:11, n:3, pp:235-259 [Journal]
  43. Carlo Blundo, Sebastià Martín Molleví, Barbara Masucci, Carles Padró
    A Linear Algebraic Approach to Metering Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:33, n:3, pp:241-260 [Journal]
  44. Carlo Blundo, Barbara Masucci, Douglas R. Stinson, Ruizhong Wei
    Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2002, v:26, n:1-3, pp:97-110 [Journal]
  45. Carlo Blundo, Alfredo De Santis, Roberto De Simone, Ugo Vaccaro
    Tight Bounds on the Information Rate of Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:11, n:2, pp:107-122 [Journal]
  46. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
    Visual Cryptography for General Access Structures [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 1996, v:3, n:12, pp:- [Journal]
  47. Carlo Blundo, Stelvio Cimato, Annalisa De Bonis
    Secure E-Coupons. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2005, v:5, n:1, pp:117-139 [Journal]
  48. Carlo Blundo, Stelvio Cimato, Roberto De Prisco, Anna Lisa Ferrara
    Modeling A Certified Email Protocol using I/O Automata. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:339-359 [Journal]
  49. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
    Visual Cryptography for General Access Structures. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1996, v:129, n:2, pp:86-106 [Journal]
  50. Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung
    Perfectly Secure Key Distribution for Dynamic Conferences. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1998, v:146, n:1, pp:1-23 [Journal]
  51. Carlo Blundo, Alfredo De Santis, Ugo Vaccaro
    Randomness in Distribution Protocols. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1996, v:131, n:2, pp:111-139 [Journal]
  52. Carlo Blundo, Paolo D'Arco, Alfredo De Santis
    A t-private k-database information retrieval scheme. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2001, v:1, n:1, pp:64-68 [Journal]
  53. Carlo Blundo, Clemente Galdi, Giuseppe Persiano
    Low-randomness constant-round private XOR computations. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:1, pp:15-26 [Journal]
  54. Carlo Blundo
    A Note on Dynamic Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1995, v:55, n:4, pp:189-193 [Journal]
  55. Carlo Blundo, Stelvio Cimato, Barbara Masucci
    A note on optimal metering schemes. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2002, v:84, n:6, pp:319-326 [Journal]
  56. Carlo Blundo, Alfredo De Santis
    Lower Bounds for Robust Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:63, n:6, pp:317-321 [Journal]
  57. Carlo Blundo, Alfredo De Santis, Antonio Giorgio Gaggia
    Probability of Shares in Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:72, n:5-6, pp:169-175 [Journal]
  58. Carlo Blundo, Alfredo De Santis, Moni Naor
    Visual cryptography for grey level images. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2000, v:75, n:6, pp:255-259 [Journal]
  59. Carlo Blundo, Alfredo De Santis, Ugo Vaccaro
    On Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:65, n:1, pp:25-32 [Journal]
  60. Carlo Blundo, Antonella Cresti
    Unconditional Secure Conference Key Distribution Schemes with Disenrollment Capability. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1999, v:120, n:1-4, pp:113-130 [Journal]
  61. Carlo Blundo, Barbara Masucci
    A Note on the Randomness in Dynamic Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1999, v:7, n:1, pp:73-85 [Journal]
  62. Carlo Blundo, Luiz A. Frota Mattos, Douglas R. Stinson
    Multiple Key Distribution Maintaining User Anonymity via Broadcast Channels. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1995, v:3, n:4, pp:309-322 [Journal]
  63. Carlo Blundo, Paolo D'Arco
    Analysis and Design of Distributed Key Distribution Centers. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2005, v:18, n:4, pp:391-414 [Journal]
  64. Carlo Blundo, Alfredo De Santis, Kaoru Kurosawa, Wakaha Ogata
    On a Fallacious Bound for Authentication Codes. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:3, pp:155-159 [Journal]
  65. Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
    On the Contrast in Visual Cryptography Schemes. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:4, pp:261-289 [Journal]
  66. Carlo Blundo, Alfredo De Santis, Douglas R. Stinson, Ugo Vaccaro
    Graph Decompositions and Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1995, v:8, n:1, pp:39-64 [Journal]
  67. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
    HYPPOCRATES: a new proactive password checker. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2004, v:71, n:1-2, pp:163-175 [Journal]
  68. Carlo Blundo, Barbara Masucci
    Randomness in Multi-Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    J. UCS, 1999, v:5, n:7, pp:367-389 [Journal]
  69. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson
    Contrast Optimal Threshold Visual Cryptography Schemes. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 2003, v:16, n:2, pp:224-261 [Journal]
  70. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
    Extended capabilities for visual cryptography. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2001, v:250, n:1-2, pp:143-161 [Journal]
  71. Carlo Blundo, Antonella Cresti, Alfredo De Santis, Ugo Vaccaro
    Fully Dynamic Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1996, v:165, n:2, pp:407-440 [Journal]
  72. Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró
    Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2004, v:320, n:2-3, pp:269-291 [Journal]
  73. Carlo Blundo, Luiz A. Frota Mattos, Douglas R. Stinson
    Generalized Beimel-Chor Schemes for Broadcast Encryption and Interactive Key Distribution. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1998, v:200, n:1-2, pp:313-334 [Journal]
  74. Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro
    On the Information Rate of Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1996, v:154, n:2, pp:283-306 [Journal]
  75. Carlo Blundo, Stelvio Cimato, Alfredo De Santis
    Visual cryptography schemes with optimal pixel expansion. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:369, n:1-3, pp:169-182 [Journal]
  76. Carlo Blundo, Roberto De Prisco
    New bounds on the expected length of one-to-one codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1996, v:42, n:1, pp:246-250 [Journal]
  77. Carlo Blundo, Alfredo De Santis, Antonio Giorgio Gaggia, Ugo Vaccaro
    New bounds on the information rate of secret sharing schemes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1995, v:41, n:2, pp:549-554 [Journal]
  78. Carlo Blundo, Paolo D'Arco, Alfredo De Santis
    On Self-Healing Key Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:12, pp:5455-5467 [Journal]
  79. Carlo Blundo, Emiliano De Cristofaro
    A Bluetooth-Based JXME Infrastructure. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (1), 2007, pp:667-682 [Conf]
  80. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson
    On Unconditionally Secure Distributed Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:3, pp:323-373 [Journal]

  81. Private-Key Hidden Vector Encryption with Key Confidentiality. [Citation Graph (, )][DBLP]


  82. Validating Orchestration of Web Services with BPEL and Aggregate Signatures. [Citation Graph (, )][DBLP]


  83. A Distributed Implementation of the Certified Information Access Service. [Citation Graph (, )][DBLP]


  84. Improved Security Notions and Protocols for Non-transferable Identification. [Citation Graph (, )][DBLP]


  85. Untraceable Tags Based on Mild Assumptions. [Citation Graph (, )][DBLP]


  86. Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports. [Citation Graph (, )][DBLP]


  87. Performance evaluation of web services invocation over Bluetooth. [Citation Graph (, )][DBLP]


  88. A simple role mining algorithm. [Citation Graph (, )][DBLP]


  89. Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. [Citation Graph (, )][DBLP]


  90. A J2ME transparent middleware to support HTTP connections over Bluetooth. [Citation Graph (, )][DBLP]


  91. Managing key hierarchies for access control enforcement: Heuristic approaches. [Citation Graph (, )][DBLP]


Search in 0.057secs, Finished in 0.062secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002