|
Search the dblp DataBase
Paolo D'Arco:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Paolo D'Arco, Douglas R. Stinson
On Unconditionally Secure Robust Distributed Key Distribution Centers. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2002, pp:346-363 [Conf]
- Paolo D'Arco, Douglas R. Stinson
Fault Tolerant and DistributedBroadcast Encryption. [Citation Graph (0, 0)][DBLP] CT-RSA, 2003, pp:263-280 [Conf]
- Carlo Blundo, Paolo D'Arco
The Key Establishment Problem. [Citation Graph (0, 0)][DBLP] FOSAD, 2002, pp:44-90 [Conf]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis
Definitions and Bounds for Self-Healing Key Distribution Schemes. [Citation Graph (0, 0)][DBLP] ICALP, 2004, pp:234-245 [Conf]
- Stelvio Cimato, Paolo D'Arco, Ivan Visconti
Anonymous Group Communication in Mobile Networks. [Citation Graph (0, 0)][DBLP] ICTCS, 2003, pp:316-328 [Conf]
- Paolo D'Arco
On the Distribution of a Key Distribution Center. [Citation Graph (0, 0)][DBLP] ICTCS, 2001, pp:357-369 [Conf]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
A Novel Approach to Proactive Password Checking. [Citation Graph (0, 0)][DBLP] InfraSec, 2002, pp:30-39 [Conf]
- Carlo Blundo, Paolo D'Arco, Massimiliano Listo
A New Self-Healing Key Distribution Scheme. [Citation Graph (0, 0)][DBLP] ISCC, 2003, pp:803-808 [Conf]
- Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:1-17 [Conf]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
Hyppocrates. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:63-80 [Conf]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson
New Results on Unconditionally Secure Distributed Oblivious Transfer. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2002, pp:291-309 [Conf]
- Paolo D'Arco, Douglas R. Stinson
Generalized Zig-zag Functions and Oblivious Transfer Reductions. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2001, pp:87-102 [Conf]
- Carlo Blundo, Paolo D'Arco, Antonio Giorgio Gaggia
A tau-Restricted Key Agreement Scheme. [Citation Graph (0, 0)][DBLP] Comput. J., 1999, v:42, n:1, pp:51-61 [Journal]
- Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Ljupco Kocarev
Security of public key cryptosystems based on Chebyshev Polynomials [Citation Graph (0, 0)][DBLP] CoRR, 2004, v:0, n:, pp:- [Journal]
- Carlo Blundo, Paolo D'Arco, Carles Padró
A Ramp Model for Distributed Key Distribution Schemes. [Citation Graph (0, 0)][DBLP] Discrete Applied Mathematics, 2003, v:128, n:1, pp:47-64 [Journal]
- Paolo D'Arco, Wataru Kishimoto, Douglas R. Stinson
Properties and constraints of cheating-immune secret sharing schemes. [Citation Graph (0, 0)][DBLP] Discrete Applied Mathematics, 2006, v:154, n:2, pp:219-233 [Journal]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Massimiliano Listo
Design of Self-Healing Key Distribution Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2004, v:32, n:1-3, pp:15-44 [Journal]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis
A t-private k-database information retrieval scheme. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2001, v:1, n:1, pp:64-68 [Journal]
- Stelvio Cimato, Antonella Cresti, Paolo D'Arco
A unified model for unconditionally secure key distribution. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2006, v:14, n:1, pp:45-64 [Journal]
- Carlo Blundo, Paolo D'Arco
Analysis and Design of Distributed Key Distribution Centers. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2005, v:18, n:4, pp:391-414 [Journal]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
HYPPOCRATES: a new proactive password checker. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2004, v:71, n:1-2, pp:163-175 [Journal]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson
Contrast Optimal Threshold Visual Cryptography Schemes. [Citation Graph (0, 0)][DBLP] SIAM J. Discrete Math., 2003, v:16, n:2, pp:224-261 [Journal]
- Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró
Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2004, v:320, n:2-3, pp:269-291 [Journal]
- Angelo Ciaramella, Paolo D'Arco, Alfredo De Santis, Clemente Galdi, Roberto Tagliaferri
Neural Network Techniques for Proactive Password Checking. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:327-339 [Journal]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis
On Self-Healing Key Distribution Schemes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2006, v:52, n:12, pp:5455-5467 [Journal]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson
On Unconditionally Secure Distributed Oblivious Transfer. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2007, v:20, n:3, pp:323-373 [Journal]
Revisiting DoS Attacks and Privacy in RFID-Enabled Networks. [Citation Graph (, )][DBLP]
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants. [Citation Graph (, )][DBLP]
Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.006secs
|