The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Paolo D'Arco: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Paolo D'Arco, Douglas R. Stinson
    On Unconditionally Secure Robust Distributed Key Distribution Centers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:346-363 [Conf]
  2. Paolo D'Arco, Douglas R. Stinson
    Fault Tolerant and DistributedBroadcast Encryption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:263-280 [Conf]
  3. Carlo Blundo, Paolo D'Arco
    The Key Establishment Problem. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2002, pp:44-90 [Conf]
  4. Carlo Blundo, Paolo D'Arco, Alfredo De Santis
    Definitions and Bounds for Self-Healing Key Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    ICALP, 2004, pp:234-245 [Conf]
  5. Stelvio Cimato, Paolo D'Arco, Ivan Visconti
    Anonymous Group Communication in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ICTCS, 2003, pp:316-328 [Conf]
  6. Paolo D'Arco
    On the Distribution of a Key Distribution Center. [Citation Graph (0, 0)][DBLP]
    ICTCS, 2001, pp:357-369 [Conf]
  7. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
    A Novel Approach to Proactive Password Checking. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:30-39 [Conf]
  8. Carlo Blundo, Paolo D'Arco, Massimiliano Listo
    A New Self-Healing Key Distribution Scheme. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:803-808 [Conf]
  9. Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró
    Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:1-17 [Conf]
  10. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
    Hyppocrates. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:63-80 [Conf]
  11. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson
    New Results on Unconditionally Secure Distributed Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:291-309 [Conf]
  12. Paolo D'Arco, Douglas R. Stinson
    Generalized Zig-zag Functions and Oblivious Transfer Reductions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:87-102 [Conf]
  13. Carlo Blundo, Paolo D'Arco, Antonio Giorgio Gaggia
    A tau-Restricted Key Agreement Scheme. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1999, v:42, n:1, pp:51-61 [Journal]
  14. Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Ljupco Kocarev
    Security of public key cryptosystems based on Chebyshev Polynomials [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  15. Carlo Blundo, Paolo D'Arco, Carles Padró
    A Ramp Model for Distributed Key Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2003, v:128, n:1, pp:47-64 [Journal]
  16. Paolo D'Arco, Wataru Kishimoto, Douglas R. Stinson
    Properties and constraints of cheating-immune secret sharing schemes. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:219-233 [Journal]
  17. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Massimiliano Listo
    Design of Self-Healing Key Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:15-44 [Journal]
  18. Carlo Blundo, Paolo D'Arco, Alfredo De Santis
    A t-private k-database information retrieval scheme. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2001, v:1, n:1, pp:64-68 [Journal]
  19. Stelvio Cimato, Antonella Cresti, Paolo D'Arco
    A unified model for unconditionally secure key distribution. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:1, pp:45-64 [Journal]
  20. Carlo Blundo, Paolo D'Arco
    Analysis and Design of Distributed Key Distribution Centers. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2005, v:18, n:4, pp:391-414 [Journal]
  21. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
    HYPPOCRATES: a new proactive password checker. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2004, v:71, n:1-2, pp:163-175 [Journal]
  22. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson
    Contrast Optimal Threshold Visual Cryptography Schemes. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 2003, v:16, n:2, pp:224-261 [Journal]
  23. Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró
    Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2004, v:320, n:2-3, pp:269-291 [Journal]
  24. Angelo Ciaramella, Paolo D'Arco, Alfredo De Santis, Clemente Galdi, Roberto Tagliaferri
    Neural Network Techniques for Proactive Password Checking. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:327-339 [Journal]
  25. Carlo Blundo, Paolo D'Arco, Alfredo De Santis
    On Self-Healing Key Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:12, pp:5455-5467 [Journal]
  26. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson
    On Unconditionally Secure Distributed Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:3, pp:323-373 [Journal]

  27. Revisiting DoS Attacks and Privacy in RFID-Enabled Networks. [Citation Graph (, )][DBLP]


  28. Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants. [Citation Graph (, )][DBLP]


  29. Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002