Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Carlo Blundo
@article{DBLP:journals/access/BlundoLO23, author = {Carlo Blundo and Vincenzo Loia and Francesco Orciuoli}, title = {A Time-Aware Approach for {MOOC} Dropout Prediction Based on Rule Induction and Sequential Three-Way Decisions}, journal = {{IEEE} Access}, volume = {11}, pages = {113189--113198}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3323202}, doi = {10.1109/ACCESS.2023.3323202}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BlundoLO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BlundoC23, author = {Carlo Blundo and Stelvio Cimato}, title = {Role mining under User-Distribution cardinality constraint}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103611}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103611}, doi = {10.1016/J.JISA.2023.103611}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BlundoC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/BlundoCS23, author = {Carlo Blundo and Stelvio Cimato and Luisa Siniscalchi}, title = {Heuristics for constrained role mining in the post-processing framework}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {14}, number = {8}, pages = {9925--9937}, year = {2023}, url = {https://doi.org/10.1007/s12652-021-03648-1}, doi = {10.1007/S12652-021-03648-1}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/BlundoCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BlundoCS22, author = {Carlo Blundo and Stelvio Cimato and Luisa Siniscalchi}, title = {Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints}, journal = {Comput. J.}, volume = {65}, number = {6}, pages = {1386--1411}, year = {2022}, url = {https://doi.org/10.1093/comjnl/bxaa186}, doi = {10.1093/COMJNL/BXAA186}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BlundoCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/BlundoFFLO22, author = {Carlo Blundo and Giuseppe Fenza and Graziano Fuccio and Vincenzo Loia and Francesco Orciuoli}, title = {A time-driven FCA-based approach for identifying students' dropout in MOOCs}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {4}, pages = {2683--2705}, year = {2022}, url = {https://doi.org/10.1002/int.22414}, doi = {10.1002/INT.22414}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/BlundoFFLO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/BlundoFFLO22, author = {Carlo Blundo and Giuseppe Fenza and Graziano Fuccio and Vincenzo Loia and Francesco Orciuoli}, editor = {Leonard Barolli and Farookh Hussain and Tomoya Enokido}, title = {Sequential Three-Way Decisions for Reducing Uncertainty in Dropout Prediction for Online Courses}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), Sydney, NSW, Australia, 13-15 April 2022, Volume 1}, series = {Lecture Notes in Networks and Systems}, volume = {449}, pages = {46--55}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-99584-3\_5}, doi = {10.1007/978-3-030-99584-3\_5}, timestamp = {Thu, 31 Mar 2022 15:19:27 +0200}, biburl = {https://dblp.org/rec/conf/aina/BlundoFFLO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BlundoCS20, author = {Carlo Blundo and Stelvio Cimato and Luisa Siniscalchi}, title = {Managing Constraints in Role Based Access Control}, journal = {{IEEE} Access}, volume = {8}, pages = {140497--140511}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3011310}, doi = {10.1109/ACCESS.2020.3011310}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BlundoCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fuzzIEEE/BlundoMPS19, author = {Carlo Blundo and Carmen De Maio and Mimmo Parente and Luisa Siniscalchi}, title = {An intelligent and private method to profile social network users}, booktitle = {2019 {IEEE} International Conference on Fuzzy Systems, {FUZZ-IEEE} 2019, New Orleans, LA, USA, June 23-26, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/FUZZ-IEEE.2019.8858912}, doi = {10.1109/FUZZ-IEEE.2019.8858912}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fuzzIEEE/BlundoMPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ideal/BlundoCS18, author = {Carlo Blundo and Stelvio Cimato and Luisa Siniscalchi}, editor = {Hujun Yin and David Camacho and Paulo Novais and Antonio J. Tall{\'{o}}n{-}Ballesteros}, title = {PostProcessing in Constrained Role Mining}, booktitle = {Intelligent Data Engineering and Automated Learning - {IDEAL} 2018 - 19th International Conference, Madrid, Spain, November 21-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11314}, pages = {204--214}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03493-1\_22}, doi = {10.1007/978-3-030-03493-1\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ideal/BlundoCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hcis/BlundoOP17, author = {Carlo Blundo and Francesco Orciuoli and Mimmo Parente}, title = {An AmI-based and privacy-preserving shopping mall model}, journal = {Hum. centric Comput. Inf. Sci.}, volume = {7}, pages = {26}, year = {2017}, url = {https://doi.org/10.1186/s13673-017-0107-4}, doi = {10.1186/S13673-017-0107-4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/hcis/BlundoOP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/BlundoCS17, author = {Carlo Blundo and Stelvio Cimato and Luisa Siniscalchi}, editor = {Sorel Reisman and Sheikh Iqbal Ahamed and Claudio Demartini and Thomas M. Conte and Ling Liu and William R. Claycomb and Motonori Nakamura and Edmundo Tovar and Stelvio Cimato and Chung{-}Horng Lung and Hiroki Takakura and Ji{-}Jiang Yang and Toyokazu Akiyama and Zhiyong Zhang and Kamrul Hasan}, title = {{PRUCC-RM:} Permission-Role-Usage Cardinality Constrained Role Mining}, booktitle = {41st {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2017, Turin, Italy, July 4-8, 2017. Volume 2}, pages = {149--154}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/COMPSAC.2017.195}, doi = {10.1109/COMPSAC.2017.195}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/BlundoCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssci/BlundoOP16, author = {Carlo Blundo and Francesco Orciuoli and Mimmo Parente}, title = {A private Intelligent Shopping Mall}, booktitle = {2016 {IEEE} Symposium Series on Computational Intelligence, {SSCI} 2016, Athens, Greece, December 6-9, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/SSCI.2016.7850186}, doi = {10.1109/SSCI.2016.7850186}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/ssci/BlundoOP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BlundoCG14, author = {Carlo Blundo and Emiliano De Cristofaro and Paolo Gasti}, title = {EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity}, journal = {J. Comput. Secur.}, volume = {22}, number = {3}, pages = {355--381}, year = {2014}, url = {https://doi.org/10.3233/JCS-130482}, doi = {10.3233/JCS-130482}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BlundoCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/BlundoCGP13, author = {Carlo Blundo and Angelo De Caro and Clemente Galdi and Giuseppe Persiano}, title = {Certified Information Access}, journal = {J. Syst. Softw.}, volume = {86}, number = {9}, pages = {2439--2450}, year = {2013}, url = {https://doi.org/10.1016/j.jss.2013.04.089}, doi = {10.1016/J.JSS.2013.04.089}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/BlundoCGP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BlundoCG12, author = {Carlo Blundo and Emiliano De Cristofaro and Paolo Gasti}, editor = {Roberto Di Pietro and Javier Herranz and Ernesto Damiani and Radu State}, title = {EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security, 7th International Workshop, {DPM} 2012, and 5th International Workshop, {SETOP} 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7731}, pages = {89--103}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35890-6\_7}, doi = {10.1007/978-3-642-35890-6\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BlundoCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BlundoC12, author = {Carlo Blundo and Stelvio Cimato}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Constrained Role Mining}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {289--304}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_19}, doi = {10.1007/978-3-642-38004-4\_19}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/stm/BlundoC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1203-3744, author = {Carlo Blundo and Stelvio Cimato}, title = {Constrained Role Mining}, journal = {CoRR}, volume = {abs/1203.3744}, year = {2012}, url = {http://arxiv.org/abs/1203.3744}, eprinttype = {arXiv}, eprint = {1203.3744}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1203-3744.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csr/BlundoCDGKPS11, author = {Carlo Blundo and Angelo De Caro and Shlomi Dolev and Niv Gilboa and Marina Kopeetsky and Giuseppe Persiano and Paul G. Spirakis}, title = {Innovative approaches for security of small artefacts}, journal = {Comput. Sci. Rev.}, volume = {5}, number = {1}, pages = {47--55}, year = {2011}, url = {https://doi.org/10.1016/j.cosrev.2010.09.002}, doi = {10.1016/J.COSREV.2010.09.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csr/BlundoCDGKPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Blundo11, author = {Carlo Blundo}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Private Information Retrieval}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {974--976}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_762}, doi = {10.1007/978-1-4419-5906-5\_762}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Blundo11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-5062, author = {Carlo Blundo and Emiliano De Cristofaro and Paolo Gasti}, title = {EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity}, journal = {CoRR}, volume = {abs/1111.5062}, year = {2011}, url = {http://arxiv.org/abs/1111.5062}, eprinttype = {arXiv}, eprint = {1111.5062}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-5062.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BlundoCVSFPS10, author = {Carlo Blundo and Stelvio Cimato and Sabrina De Capitani di Vimercati and Alfredo De Santis and Sara Foresti and Stefano Paraboschi and Pierangela Samarati}, title = {Managing key hierarchies for access control enforcement: Heuristic approaches}, journal = {Comput. Secur.}, volume = {29}, number = {5}, pages = {533--547}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.12.006}, doi = {10.1016/J.COSE.2009.12.006}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BlundoCVSFPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wsn/VincenzoCCG10, author = {Vincenzo Auletta and Carlo Blundo and Emiliano De Cristofaro and Guerriero Raimato}, title = {Web Services Invocation over Bluetooth}, journal = {Wirel. Sens. Netw.}, volume = {2}, number = {6}, pages = {447--461}, year = {2010}, url = {https://doi.org/10.4236/wsn.2010.26056}, doi = {10.4236/WSN.2010.26056}, timestamp = {Wed, 25 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wsn/VincenzoCCG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BlundoIP10, author = {Carlo Blundo and Vincenzo Iovino and Giuseppe Persiano}, editor = {Swee{-}Huay Heng and Rebecca N. Wright and Bok{-}Min Goi}, title = {Predicate Encryption with Partial Public Keys}, booktitle = {Cryptology and Network Security - 9th International Conference, {CANS} 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6467}, pages = {298--313}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17619-7\_21}, doi = {10.1007/978-3-642-17619-7\_21}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/BlundoIP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AulettaBCCPV10, author = {Vincenzo Auletta and Carlo Blundo and Angelo De Caro and Emiliano De Cristofaro and Giuseppe Persiano and Ivan Visconti}, editor = {Radu Sion and Reza Curtmola and Sven Dietrich and Aggelos Kiayias and Josep M. Miret and Kazue Sako and Francesc Seb{\'{e}}}, title = {Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports}, booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6054}, pages = {94--104}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14992-4\_9}, doi = {10.1007/978-3-642-14992-4\_9}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AulettaBCCPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BlundoC10, author = {Carlo Blundo and Stelvio Cimato}, editor = {Sung Y. Shin and Sascha Ossowski and Michael Schumacher and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {A simple role mining algorithm}, booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}, pages = {1958--1962}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1774088.1774503}, doi = {10.1145/1774088.1774503}, timestamp = {Sun, 02 Jun 2019 21:18:37 +0200}, biburl = {https://dblp.org/rec/conf/sac/BlundoC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlundoIP10, author = {Carlo Blundo and Vincenzo Iovino and Giuseppe Persiano}, title = {Predicate Encryption with Partial Public Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {476}, year = {2010}, url = {http://eprint.iacr.org/2010/476}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlundoIP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BlundoIP09, author = {Carlo Blundo and Vincenzo Iovino and Giuseppe Persiano}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Private-Key Hidden Vector Encryption with Key Confidentiality}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {259--277}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_17}, doi = {10.1007/978-3-642-10433-6\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/BlundoIP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BlundoCP09, author = {Carlo Blundo and Angelo De Caro and Giuseppe Persiano}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nora Cuppens{-}Boulahia and Yves Roudier}, title = {Untraceable Tags Based on Mild Assumptions}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security, 4th International Workshop, {DPM} 2009 and Second International Workshop, {SETOP} 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5939}, pages = {178--192}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11207-2\_14}, doi = {10.1007/978-3-642-11207-2\_14}, timestamp = {Fri, 27 Dec 2019 21:19:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BlundoCP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictcs/BlundoIP09, author = {Carlo Blundo and Vincenzo Iovino and Giuseppe Persiano}, editor = {Alessandra Cherubini and Mario Coppo and Giuseppe Persiano}, title = {Private-Key Hidden Vector Encryption with Key Privacy}, booktitle = {Theoretical Computer Science, 11th Italian Conference, {ICTCS} 2009, Cremona, Italy, September 28-30, 2009, Proceedings}, pages = {46--50}, year = {2009}, timestamp = {Tue, 28 May 2013 14:21:59 +0200}, biburl = {https://dblp.org/rec/conf/ictcs/BlundoIP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BlundoCVSFPS09, author = {Carlo Blundo and Stelvio Cimato and Sabrina De Capitani di Vimercati and Alfredo De Santis and Sara Foresti and Stefano Paraboschi and Pierangela Samarati}, editor = {Dimitris Gritzalis and Javier L{\'{o}}pez}, title = {Efficient Key Management for Enforcing Access Control in Outsourced Scenarios}, booktitle = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {297}, pages = {364--375}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01244-0\_32}, doi = {10.1007/978-3-642-01244-0\_32}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BlundoCVSFPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlundoCP09, author = {Carlo Blundo and Angelo De Caro and Giuseppe Persiano}, title = {Untraceable Tags based on Mild Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {380}, year = {2009}, url = {http://eprint.iacr.org/2009/380}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlundoCP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecows/BlundoCGP08, author = {Carlo Blundo and Emiliano De Cristofaro and Clemente Galdi and Giuseppe Persiano}, editor = {Claus Pahl and Siobh{\'{a}}n Clarke and Rik Eshuis}, title = {Validating Orchestration of Web Services with {BPEL} and Aggregate Signatures}, booktitle = {{ECOWS} 2008, Sixth European Conference on Web Services, 12-14 November 2008, Dublin, Ireland}, pages = {205--214}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ECOWS.2008.9}, doi = {10.1109/ECOWS.2008.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecows/BlundoCGP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BlundoPSV08, author = {Carlo Blundo and Giuseppe Persiano and Ahmad{-}Reza Sadeghi and Ivan Visconti}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {Improved Security Notions and Protocols for Non-transferable Identification}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {364--378}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_24}, doi = {10.1007/978-3-540-88313-5\_24}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BlundoPSV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BlundoCSGP08, author = {Carlo Blundo and Emiliano De Cristofaro and Aniello Del Sorbo and Clemente Galdi and Giuseppe Persiano}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {A Distributed Implementation of the Certified Information Access Service}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {396--410}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_26}, doi = {10.1007/978-3-540-88313-5\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BlundoCSGP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BlundoGP07, author = {Carlo Blundo and Clemente Galdi and Giuseppe Persiano}, title = {Low-randomness constant-round private {XOR} computations}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {1}, pages = {15--26}, year = {2007}, url = {https://doi.org/10.1007/s10207-006-0007-5}, doi = {10.1007/S10207-006-0007-5}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BlundoGP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BlundoDSS07, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis and Douglas R. Stinson}, title = {On Unconditionally Secure Distributed Oblivious Transfer}, journal = {J. Cryptol.}, volume = {20}, number = {3}, pages = {323--373}, year = {2007}, url = {https://doi.org/10.1007/s00145-007-0327-2}, doi = {10.1007/S00145-007-0327-2}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlundoDSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsnc/AulettaBC07, author = {Vincenzo Auletta and Carlo Blundo and Emiliano De Cristofaro}, title = {A {J2ME} transparent middleware to support {HTTP} connections over Bluetooth}, booktitle = {Proceedings of the Second International Conference on Systems and Networks Communications {(ICSNC} 2007), August 25-31, 2007, Cap Esterel, French Riviera, France}, pages = {3}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICSNC.2007.3}, doi = {10.1109/ICSNC.2007.3}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsnc/AulettaBC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/BlundoC07, author = {Carlo Blundo and Emiliano De Cristofaro}, editor = {Robert Meersman and Zahir Tari}, title = {A Bluetooth-Based {JXME} Infrastructure}, booktitle = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, {OTM} Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4803}, pages = {667--682}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76848-7\_45}, doi = {10.1007/978-3-540-76848-7\_45}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/otm/BlundoC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BlundoCS06, author = {Carlo Blundo and Stelvio Cimato and Alfredo De Santis}, title = {Visual cryptography schemes with optimal pixel expansion}, journal = {Theor. Comput. Sci.}, volume = {369}, number = {1-3}, pages = {169--182}, year = {2006}, url = {https://doi.org/10.1016/j.tcs.2006.08.008}, doi = {10.1016/J.TCS.2006.08.008}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/BlundoCS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BlundoDS06, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis}, title = {On Self-Healing Key Distribution Schemes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {52}, number = {12}, pages = {5455--5467}, year = {2006}, url = {https://doi.org/10.1109/TIT.2006.885514}, doi = {10.1109/TIT.2006.885514}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/BlundoDS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/AulettaBCR06, author = {Vincenzo Auletta and Carlo Blundo and Emiliano De Cristofaro and Guerriero Raimato}, title = {A Lightweight Framework forWeb Services Invocation over Bluetooth}, booktitle = {2006 {IEEE} International Conference on Web Services {(ICWS} 2006), 18-22 September 2006, Chicago, Illinois, {USA}}, pages = {331--338}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICWS.2006.7}, doi = {10.1109/ICWS.2006.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/AulettaBCR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/AulettaBCR06, author = {Vincenzo Auletta and Carlo Blundo and Stelvio Cimato and Guerriero Raimato}, editor = {Paolo Bellavista and Chi{-}Ming Chen and Antonio Corradi and Mahmoud Daneshmand}, title = {A Web Service Based Micro-payment System}, booktitle = {Proceedings of the 11th {IEEE} Symposium on Computers and Communications {(ISCC} 2006), 26-29 June 2006, Cagliari, Sardinia, Italy}, pages = {328--333}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ISCC.2006.20}, doi = {10.1109/ISCC.2006.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/AulettaBCR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mswim/AulettaBCR06, author = {Vincenzo Auletta and Carlo Blundo and Emiliano De Cristofaro and Guerriero Raimato}, editor = {Mohamed Ould{-}Khaoua and Mar{\'{\i}}a Blanca Caminero}, title = {Performance evaluation of web services invocation over Bluetooth}, booktitle = {Proceedings of the 1st {ACM} Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, {PM2HW2N} 2006, Terromolinos, Spain, October 2, 2006}, pages = {1--8}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1163653.1163655}, doi = {10.1145/1163653.1163655}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mswim/AulettaBCR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlundoCS06, author = {Carlo Blundo and Stelvio Cimato and Alfredo De Santis}, title = {Visual Cryptography Schemes with Optimal Pixel Expansion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {170}, year = {2006}, url = {http://eprint.iacr.org/2006/170}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlundoCS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecr/BlundoCB05, author = {Carlo Blundo and Stelvio Cimato and Annalisa De Bonis}, title = {Secure E-Coupons}, journal = {Electron. Commer. Res.}, volume = {5}, number = {1}, pages = {117--139}, year = {2005}, url = {https://doi.org/10.1023/B:ELEC.0000045976.24984.48}, doi = {10.1023/B:ELEC.0000045976.24984.48}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecr/BlundoCB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BlundoD05, author = {Carlo Blundo and Paolo D'Arco}, title = {Analysis and Design of Distributed Key Distribution Centers}, journal = {J. Cryptol.}, volume = {18}, number = {4}, pages = {391--414}, year = {2005}, url = {https://doi.org/10.1007/s00145-005-0407-0}, doi = {10.1007/S00145-005-0407-0}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlundoD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Blundo05, author = {Carlo Blundo}, title = {Randomness in self-healing key distribution schemes}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {80--84}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543962}, doi = {10.1109/ITWTPI.2005.1543962}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icits/Blundo05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/BlundoCP05, author = {Carlo Blundo and Stelvio Cimato and Roberto De Prisco}, title = {A Lightweight Approach to Authenticated Web Caching}, booktitle = {2005 {IEEE/IPSJ} International Symposium on Applications and the Internet {(SAINT} 2005), 31 January - 4 February 2005, Trento, Italy}, pages = {157--163}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SAINT.2005.5}, doi = {10.1109/SAINT.2005.5}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/BlundoCP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scn/2004, editor = {Carlo Blundo and Stelvio Cimato}, title = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b105083}, doi = {10.1007/B105083}, isbn = {3-540-24301-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BlundoC04, author = {Carlo Blundo and Stelvio Cimato}, title = {A Software Infrastructure for Authenticated Web Metering}, journal = {Computer}, volume = {37}, number = {4}, pages = {28--33}, year = {2004}, url = {https://doi.org/10.1109/MC.2004.1297298}, doi = {10.1109/MC.2004.1297298}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BlundoC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlundoDSL04, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis and Massimiliano Listo}, title = {Design of Self-Healing Key Distribution Schemes}, journal = {Des. Codes Cryptogr.}, volume = {32}, number = {1-3}, pages = {15--44}, year = {2004}, url = {https://doi.org/10.1023/B:DESI.0000029210.20690.3f}, doi = {10.1023/B:DESI.0000029210.20690.3F}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlundoDSL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlundoMMP04, author = {Carlo Blundo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Barbara Masucci and Carles Padr{\'{o}}}, title = {A Linear Algebraic Approach to Metering Schemes}, journal = {Des. Codes Cryptogr.}, volume = {33}, number = {3}, pages = {241--260}, year = {2004}, url = {https://doi.org/10.1023/B:DESI.0000036249.86262.d5}, doi = {10.1023/B:DESI.0000036249.86262.D5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlundoMMP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/BlundoDSG04, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis and Clemente Galdi}, title = {H\({}_{\mbox{YPPOCRATES}}\): a new proactive password checker}, journal = {J. Syst. Softw.}, volume = {71}, number = {1-2}, pages = {163--175}, year = {2004}, url = {https://doi.org/10.1016/S0164-1212(03)00004-9}, doi = {10.1016/S0164-1212(03)00004-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/BlundoDSG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BlundoDDP04, author = {Carlo Blundo and Paolo D'Arco and Vanesa Daza and Carles Padr{\'{o}}}, title = {Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures}, journal = {Theor. Comput. Sci.}, volume = {320}, number = {2-3}, pages = {269--291}, year = {2004}, url = {https://doi.org/10.1016/j.tcs.2004.02.030}, doi = {10.1016/J.TCS.2004.02.030}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BlundoDDP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecows/BlundoC04, author = {Carlo Blundo and Stelvio Cimato}, editor = {Liang{-}Jie Zhang}, title = {A Framework for Authenticated Web Services}, booktitle = {Web Services, European Conference, {ECOWS} 2004, Erfurt, Germany, September 27-30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3250}, pages = {61--71}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30209-4\_5}, doi = {10.1007/978-3-540-30209-4\_5}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ecows/BlundoC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BlundoDS04, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis}, editor = {Josep D{\'{\i}}az and Juhani Karhum{\"{a}}ki and Arto Lepist{\"{o}} and Donald Sannella}, title = {Definitions and Bounds for Self-Healing Key Distribution Schemes}, booktitle = {Automata, Languages and Programming: 31st International Colloquium, {ICALP} 2004, Turku, Finland, July 12-16, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3142}, pages = {234--245}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27836-8\_22}, doi = {10.1007/978-3-540-27836-8\_22}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/BlundoDS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/BlundoC04, author = {Carlo Blundo and Stelvio Cimato}, title = {A Platform for Secure E-Gambling}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {768--772}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286750}, doi = {10.1109/ITCC.2004.1286750}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/BlundoC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BlundoG03, author = {Carlo Blundo and Clemente Galdi}, title = {Hiding Information in Image Mosaics}, journal = {Comput. J.}, volume = {46}, number = {2}, pages = {202--212}, year = {2003}, url = {https://doi.org/10.1093/comjnl/46.2.202}, doi = {10.1093/COMJNL/46.2.202}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BlundoG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/BlundoDP03, author = {Carlo Blundo and Paolo D'Arco and Carles Padr{\'{o}}}, title = {A Ramp Model for Distributed Key Distribution Schemes}, journal = {Discret. Appl. Math.}, volume = {128}, number = {1}, pages = {47--64}, year = {2003}, url = {https://doi.org/10.1016/S0166-218X(02)00435-3}, doi = {10.1016/S0166-218X(02)00435-3}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/BlundoDP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/BlundoDSS03, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis and Douglas R. Stinson}, title = {Contrast Optimal Threshold Visual Cryptography Schemes}, journal = {{SIAM} J. Discret. Math.}, volume = {16}, number = {2}, pages = {224--261}, year = {2003}, url = {https://doi.org/10.1137/S0895480198336683}, doi = {10.1137/S0895480198336683}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/BlundoDSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/BlundoDL03, author = {Carlo Blundo and Paolo D'Arco and Massimiliano Listo}, title = {A New Self-Healing Key Distribution Scheme}, booktitle = {Proceedings of the Eighth {IEEE} Symposium on Computers and Communications {(ISCC} 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey}, pages = {803--808}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ISCC.2003.1214216}, doi = {10.1109/ISCC.2003.1214216}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/BlundoDL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/BlundoCP03, author = {Carlo Blundo and Stelvio Cimato and Roberto De Prisco}, title = {Certified Email: Design and Implementation of a New Optimistic Protocol.}, booktitle = {Proceedings of the Eighth {IEEE} Symposium on Computers and Communications {(ISCC} 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey}, pages = {828--833}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ISCC.2003.1214220}, doi = {10.1109/ISCC.2003.1214220}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/BlundoCP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/BlundoDL03, author = {Carlo Blundo and Paolo D'Arco and Massimiliano Listo}, title = {A flaw in a self-healing key distribution scheme}, booktitle = {Proceedings 2003 {IEEE} Information Theory Workshop, {ITW} 2003, La Sorbonne, Paris, France, 31 March - 4 April, 2003}, pages = {163--166}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ITW.2003.1216720}, doi = {10.1109/ITW.2003.1216720}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/BlundoDL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BlundoCPF04, author = {Carlo Blundo and Stelvio Cimato and Roberto De Prisco and Anna Lisa Ferrara}, editor = {Mario Bravetti and Roberto Gorrieri}, title = {Modeling {A} Certified Email Protocol using {I/O} Automata}, booktitle = {Formal Methods for Security and Time: Proceedings of the {MEFISTO} Project 2003, {MEFISTO} 2003, Pisa, Italy, November 3-5, 2003}, series = {Electronic Notes in Theoretical Computer Science}, volume = {99}, pages = {339--359}, publisher = {Elsevier}, year = {2003}, url = {https://doi.org/10.1016/j.entcs.2004.02.015}, doi = {10.1016/J.ENTCS.2004.02.015}, timestamp = {Thu, 08 Dec 2022 22:44:21 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BlundoCPF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ictcs/2003, editor = {Carlo Blundo and Cosimo Laneve}, title = {Theoretical Computer Science, 8th Italian Conference, {ICTCS} 2003, Bertinoro, Italy, October 13-15, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2841}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b13810}, doi = {10.1007/B13810}, isbn = {3-540-20216-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictcs/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cominfsys/BlundoBM02, author = {Carlo Blundo and Annalisa De Bonis and Barbara Masucci}, title = {Bounds and constructions for metering schemes}, journal = {Commun. Inf. Syst.}, volume = {2}, number = {1}, pages = {1--28}, year = {2002}, url = {https://doi.org/10.4310/cis.2002.v2.n1.a1}, doi = {10.4310/CIS.2002.V2.N1.A1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cominfsys/BlundoBM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlundoMSW02, author = {Carlo Blundo and Barbara Masucci and Douglas R. Stinson and Ruizhong Wei}, title = {Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes}, journal = {Des. Codes Cryptogr.}, volume = {26}, number = {1-3}, pages = {97--110}, year = {2002}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlundoMSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/BlundoCM02, author = {Carlo Blundo and Stelvio Cimato and Barbara Masucci}, title = {A note on optimal metering schemes}, journal = {Inf. Process. Lett.}, volume = {84}, number = {6}, pages = {319--326}, year = {2002}, url = {https://doi.org/10.1016/S0020-0190(02)00321-6}, doi = {10.1016/S0020-0190(02)00321-6}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/BlundoCM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/BlundoD02, author = {Carlo Blundo and Paolo D'Arco}, editor = {Riccardo Focardi and Roberto Gorrieri}, title = {The Key Establishment Problem}, booktitle = {Foundations of Security Analysis and Design II, {FOSAD} 2001/2002 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {2946}, pages = {44--90}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-24631-2\_2}, doi = {10.1007/978-3-540-24631-2\_2}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/fosad/BlundoD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infrasec/BlundoDSG02, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis and Clemente Galdi}, editor = {George I. Davida and Yair Frankel and Owen Rees}, title = {A Novel Approach to Proactive Password Checking}, booktitle = {Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2437}, pages = {30--39}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45831-X\_3}, doi = {10.1007/3-540-45831-X\_3}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infrasec/BlundoDSG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BlundoDSS02, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis and Douglas R. Stinson}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {New Results on Unconditionally Secure Distributed Oblivious Transfer}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {291--309}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_19}, doi = {10.1007/3-540-36492-7\_19}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BlundoDSS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seke/BlundoC02, author = {Carlo Blundo and Stelvio Cimato}, title = {{SAWM:} a tool for secure and authenticated web metering}, booktitle = {Proceedings of the 14th international conference on Software engineering and knowledge engineering, {SEKE} 2002, Ischia, Italy, July 15-19, 2002}, pages = {641--648}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/568760.568871}, doi = {10.1145/568760.568871}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/seke/BlundoC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/BlundoCB02, author = {Carlo Blundo and Stelvio Cimato and Annalisa De Bonis}, editor = {David Lassner and David De Roure and Arun Iyengar}, title = {A lightweight protocol for the generation and distribution of secure e-coupons}, booktitle = {Proceedings of the Eleventh International World Wide Web Conference, {WWW} 2002, May 7-11, 2002, Honolulu, Hawaii, {USA}}, pages = {542--552}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/511446.511517}, doi = {10.1145/511446.511517}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/BlundoCB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlundoBS01, author = {Carlo Blundo and Annalisa De Bonis and Alfredo De Santis}, title = {Improved Schemes for Visual Cryptography}, journal = {Des. Codes Cryptogr.}, volume = {24}, number = {3}, pages = {255--278}, year = {2001}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlundoBS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/endm/BlundoDP01, author = {Carlo Blundo and Paolo D'Arco and Carles Padr{\'{o}}}, title = {A Ramp Model for Distributed Key Distribution Schemes}, journal = {Electron. Notes Discret. Math.}, volume = {6}, pages = {45--54}, year = {2001}, url = {https://doi.org/10.1016/S1571-0653(04)00156-8}, doi = {10.1016/S1571-0653(04)00156-8}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/endm/BlundoDP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BlundoDS01, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis}, title = {A t-private k-database information retrieval scheme}, journal = {Int. J. Inf. Sec.}, volume = {1}, number = {1}, pages = {64--68}, year = {2001}, url = {https://doi.org/10.1007/s102070100005}, doi = {10.1007/S102070100005}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BlundoDS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AtenieseBSS01, author = {Giuseppe Ateniese and Carlo Blundo and Alfredo De Santis and Douglas R. Stinson}, title = {Extended capabilities for visual cryptography}, journal = {Theor. Comput. Sci.}, volume = {250}, number = {1-2}, pages = {143--161}, year = {2001}, url = {https://doi.org/10.1016/S0304-3975(99)00127-9}, doi = {10.1016/S0304-3975(99)00127-9}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/AtenieseBSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BlundoDDP01, author = {Carlo Blundo and Paolo D'Arco and Vanesa Daza and Carles Padr{\'{o}}}, editor = {George I. Davida and Yair Frankel}, title = {Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures}, booktitle = {Information Security, 4th International Conference, {ISC} 2001, Malaga, Spain, October 1-3, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2200}, pages = {1--17}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45439-X\_1}, doi = {10.1007/3-540-45439-X\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/BlundoDDP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BlundoDSG01, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis and Clemente Galdi}, editor = {George I. Davida and Yair Frankel}, title = {Hyppocrates}, booktitle = {Information Security, 4th International Conference, {ISC} 2001, Malaga, Spain, October 1-3, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2200}, pages = {63--80}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45439-X\_5}, doi = {10.1007/3-540-45439-X\_5}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BlundoDSG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlundoMMP01, author = {Carlo Blundo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Barbara Masucci and Carles Padr{\'{o}}}, title = {A Linear Algebraic Approach to Metering Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2001}, url = {http://eprint.iacr.org/2001/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlundoMMP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/BlundoSN00, author = {Carlo Blundo and Alfredo De Santis and Moni Naor}, title = {Visual cryptography for grey level images}, journal = {Inf. Process. Lett.}, volume = {75}, number = {6}, pages = {255--259}, year = {2000}, url = {https://doi.org/10.1016/S0020-0190(00)00108-3}, doi = {10.1016/S0020-0190(00)00108-3}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/BlundoSN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifipTCS/BlundoG00, author = {Carlo Blundo and Clemente Galdi}, editor = {Jan van Leeuwen and Osamu Watanabe and Masami Hagiya and Peter D. Mosses and Takayasu Ito}, title = {Steganography Using Modern Arts}, booktitle = {Theoretical Computer Science, Exploring New Frontiers of Theoretical Informatics, International Conference {IFIP} {TCS} 2000, Sendai, Japan, August 17-19, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1872}, pages = {140--151}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44929-9\_12}, doi = {10.1007/3-540-44929-9\_12}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/ifipTCS/BlundoG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BlundoBMS00, author = {Carlo Blundo and Annalisa De Bonis and Barbara Masucci and Douglas R. Stinson}, editor = {Douglas R. Stinson and Stafford E. Tavares}, title = {Dynamic Multi-threshold Metering Schemes}, booktitle = {Selected Areas in Cryptography, 7th Annual International Workshop, {SAC} 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2012}, pages = {130--143}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44983-3\_10}, doi = {10.1007/3-540-44983-3\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BlundoBMS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/BlundoBM00, author = {Carlo Blundo and Annalisa De Bonis and Barbara Masucci}, editor = {Maurice Herlihy}, title = {Metering Schemes with Pricing}, booktitle = {Distributed Computing, 14th International Conference, {DISC} 2000, Toledo, Spain, October 4-6, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1914}, pages = {194--208}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-40026-5\_13}, doi = {10.1007/3-540-40026-5\_13}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/BlundoBM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlundoMSW00, author = {Carlo Blundo and Barbara Masucci and Douglas R. Stinson and Ruizhong Wei}, title = {Constructions and Bounds for Unconditionally Secure Commitment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2000}, url = {http://eprint.iacr.org/2000/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlundoMSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cc/BlundoSPV99, author = {Carlo Blundo and Alfredo De Santis and Giuseppe Persiano and Ugo Vaccaro}, title = {Randomness Complexity of Private Computation}, journal = {Comput. Complex.}, volume = {8}, number = {2}, pages = {145--168}, year = {1999}, url = {https://doi.org/10.1007/s000370050025}, doi = {10.1007/S000370050025}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cc/BlundoSPV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BlundoDG99, author = {Carlo Blundo and Paolo D'Arco and Antonio Giorgio Gaggia}, title = {A tau-Restricted Key Agreement Scheme}, journal = {Comput. J.}, volume = {42}, number = {1}, pages = {51--61}, year = {1999}, url = {https://doi.org/10.1093/comjnl/42.1.51}, doi = {10.1093/COMJNL/42.1.51}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BlundoDG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/BlundoSG99, author = {Carlo Blundo and Alfredo De Santis and Antonio Giorgio Gaggia}, title = {Probability of Shares in Secret Sharing Schemes}, journal = {Inf. Process. Lett.}, volume = {72}, number = {5-6}, pages = {169--175}, year = {1999}, url = {https://doi.org/10.1016/S0020-0190(99)00153-2}, doi = {10.1016/S0020-0190(99)00153-2}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/BlundoSG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/BlundoC99, author = {Carlo Blundo and Antonella Cresti}, title = {Unconditional Secure Conference Key Distribution Schemes with Disenrollment Capability}, journal = {Inf. Sci.}, volume = {120}, number = {1-4}, pages = {113--130}, year = {1999}, url = {https://doi.org/10.1016/S0020-0255(99)00074-2}, doi = {10.1016/S0020-0255(99)00074-2}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/BlundoC99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BlundoM99, author = {Carlo Blundo and Barbara Masucci}, title = {A Note on the Randomness in Dynamic Threshold Schemes}, journal = {J. Comput. Secur.}, volume = {7}, number = {1}, pages = {73--85}, year = {1999}, url = {https://doi.org/10.3233/jcs-1999-7104}, doi = {10.3233/JCS-1999-7104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BlundoM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BlundoSKO99, author = {Carlo Blundo and Alfredo De Santis and Kaoru Kurosawa and Wakaha Ogata}, title = {On a Fallacious Bound for Authentication Codes}, journal = {J. Cryptol.}, volume = {12}, number = {3}, pages = {155--159}, year = {1999}, url = {https://doi.org/10.1007/s001459900049}, doi = {10.1007/S001459900049}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlundoSKO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BlundoSS99, author = {Carlo Blundo and Alfredo De Santis and Douglas R. Stinson}, title = {On the Contrast in Visual Cryptography Schemes}, journal = {J. Cryptol.}, volume = {12}, number = {4}, pages = {261--289}, year = {1999}, url = {https://doi.org/10.1007/s001459900057}, doi = {10.1007/S001459900057}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlundoSS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/BlundoM99, author = {Carlo Blundo and Barbara Masucci}, title = {Randomness in Multi-Secret Sharing Schemes}, journal = {J. Univers. Comput. Sci.}, volume = {5}, number = {7}, pages = {367--389}, year = {1999}, url = {https://doi.org/10.3217/jucs-005-07-0367}, doi = {10.3217/JUCS-005-07-0367}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/BlundoM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/BlundoGP99, author = {Carlo Blundo and Clemente Galdi and Pino Persiano}, editor = {Prasad Jayanti}, title = {Randomness Recycling in Constant-Round Private Computations (extended Abstract)}, booktitle = {Distributed Computing, 13th International Symposium, Bratislava, Slovak Republic, September 27-29, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1693}, pages = {138--150}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48169-9\_10}, doi = {10.1007/3-540-48169-9\_10}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/BlundoGP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cg/BlundoS98, author = {Carlo Blundo and Alfredo De Santis}, title = {Visual cryptography schemes with perfect reconstruction of black pixels}, journal = {Comput. Graph.}, volume = {22}, number = {4}, pages = {449--455}, year = {1998}, url = {https://doi.org/10.1016/S0097-8493(98)00034-X}, doi = {10.1016/S0097-8493(98)00034-X}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cg/BlundoS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/BlundoSHKVY98, author = {Carlo Blundo and Alfredo De Santis and Amir Herzberg and Shay Kutten and Ugo Vaccaro and Moti Yung}, title = {Perfectly Secure Key Distribution for Dynamic Conferences}, journal = {Inf. Comput.}, volume = {146}, number = {1}, pages = {1--23}, year = {1998}, url = {https://doi.org/10.1006/inco.1998.2717}, doi = {10.1006/INCO.1998.2717}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/BlundoSHKVY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/BlundoSV98, author = {Carlo Blundo and Alfredo De Santis and Ugo Vaccaro}, title = {On Secret Sharing Schemes}, journal = {Inf. Process. Lett.}, volume = {65}, number = {1}, pages = {25--32}, year = {1998}, url = {https://doi.org/10.1016/S0020-0190(97)00194-4}, doi = {10.1016/S0020-0190(97)00194-4}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/BlundoSV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BlundoMS98, author = {Carlo Blundo and Luiz A. Frota Mattos and Douglas R. Stinson}, title = {Generalized Beimel-Chor Schemes for Broadcast Encryption and Interactive Key Distribution}, journal = {Theor. Comput. Sci.}, volume = {200}, number = {1-2}, pages = {313--334}, year = {1998}, url = {https://doi.org/10.1016/S0304-3975(98)80007-8}, doi = {10.1016/S0304-3975(98)80007-8}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BlundoMS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/BlundoS97, author = {Carlo Blundo and Douglas R. Stinson}, title = {Anonymous Secret Sharing Schemes}, journal = {Discret. Appl. Math.}, volume = {77}, number = {1}, pages = {13--28}, year = {1997}, url = {https://doi.org/10.1016/S0166-218X(97)89208-6}, doi = {10.1016/S0166-218X(97)89208-6}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/BlundoS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlundoSSV97, author = {Carlo Blundo and Alfredo De Santis and Roberto de Simone and Ugo Vaccaro}, title = {Tight Bounds on the Information Rate of Secret Sharing Schemes}, journal = {Des. Codes Cryptogr.}, volume = {11}, number = {2}, pages = {107--122}, year = {1997}, url = {https://doi.org/10.1023/A:1008216403325}, doi = {10.1023/A:1008216403325}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlundoSSV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlundoGS97, author = {Carlo Blundo and Antonio Giorgio Gaggia and Douglas R. Stinson}, title = {On the Dealer's Randomness Required in Secret Sharing Schemes}, journal = {Des. Codes Cryptogr.}, volume = {11}, number = {3}, pages = {235--259}, year = {1997}, url = {https://doi.org/10.1023/A:1008242111272}, doi = {10.1023/A:1008242111272}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlundoGS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/BlundoS97, author = {Carlo Blundo and Alfredo De Santis}, title = {Lower Bounds for Robust Secret Sharing Schemes}, journal = {Inf. Process. Lett.}, volume = {63}, number = {6}, pages = {317--321}, year = {1997}, url = {https://doi.org/10.1016/S0020-0190(97)00135-X}, doi = {10.1016/S0020-0190(97)00135-X}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/BlundoS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/AtenieseBSS96, author = {Giuseppe Ateniese and Carlo Blundo and Alfredo De Santis and Douglas R. Stinson}, title = {Visual Cryptography for General Access Structures}, journal = {Inf. Comput.}, volume = {129}, number = {2}, pages = {86--106}, year = {1996}, url = {https://doi.org/10.1006/inco.1996.0076}, doi = {10.1006/INCO.1996.0076}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/AtenieseBSS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/BlundoSV96, author = {Carlo Blundo and Alfredo De Santis and Ugo Vaccaro}, title = {Randomness in Distribution Protocols}, journal = {Inf. Comput.}, volume = {131}, number = {2}, pages = {111--139}, year = {1996}, url = {https://doi.org/10.1006/inco.1996.0095}, doi = {10.1006/INCO.1996.0095}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/BlundoSV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BlundoSGV96, author = {Carlo Blundo and Alfredo De Santis and Luisa Gargano and Ugo Vaccaro}, title = {On the Information Rate of Secret Sharing Schemes}, journal = {Theor. Comput. Sci.}, volume = {154}, number = {2}, pages = {283--306}, year = {1996}, url = {https://doi.org/10.1016/0304-3975(95)00065-8}, doi = {10.1016/0304-3975(95)00065-8}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/BlundoSGV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BlundoCSV96, author = {Carlo Blundo and Antonella Cresti and Alfredo De Santis and Ugo Vaccaro}, title = {Fully Dynamic Secret Sharing Schemes}, journal = {Theor. Comput. Sci.}, volume = {165}, number = {2}, pages = {407--440}, year = {1996}, url = {https://doi.org/10.1016/0304-3975(96)00003-5}, doi = {10.1016/0304-3975(96)00003-5}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/BlundoCSV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BlundoP96, author = {Carlo Blundo and Roberto De Prisco}, title = {New bounds on the expected length of one-to-one codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {42}, number = {1}, pages = {246--250}, year = {1996}, url = {https://doi.org/10.1109/18.481795}, doi = {10.1109/18.481795}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/BlundoP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlundoMS96, author = {Carlo Blundo and Luiz A. Frota Mattos and Douglas R. Stinson}, editor = {Neal Koblitz}, title = {Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution}, booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {387--400}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68697-5\_29}, doi = {10.1007/3-540-68697-5\_29}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlundoMS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AtenieseBSS96, author = {Giuseppe Ateniese and Carlo Blundo and Alfredo De Santis and Douglas R. Stinson}, editor = {Friedhelm Meyer auf der Heide and Burkhard Monien}, title = {Constructions and Bounds for Visual Cryptography}, booktitle = {Automata, Languages and Programming, 23rd International Colloquium, ICALP96, Paderborn, Germany, 8-12 July 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1099}, pages = {416--428}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61440-0\_147}, doi = {10.1007/3-540-61440-0\_147}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/AtenieseBSS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR96-012, author = {Giuseppe Ateniese and Carlo Blundo and Alfredo De Santis and Douglas R. Stinson}, title = {Visual Cryptography for General Access Structures}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR96-012}}, year = {1996}, url = {https://eccc.weizmann.ac.il/eccc-reports/1996/TR96-012/index.html}, eprinttype = {ECCC}, eprint = {TR96-012}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR96-012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlundoSS96, author = {Carlo Blundo and Alfredo De Santis and Douglas R. Stinson}, title = {On the Contrast in Visual Cryptography Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {1996}, url = {http://eprint.iacr.org/1996/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlundoSS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Blundo95, author = {Carlo Blundo}, title = {A Note on Dynamic Threshold Schemes}, journal = {Inf. Process. Lett.}, volume = {55}, number = {4}, pages = {189--193}, year = {1995}, url = {https://doi.org/10.1016/0020-0190(95)00104-K}, doi = {10.1016/0020-0190(95)00104-K}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Blundo95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BlundoMS95, author = {Carlo Blundo and Luiz A. Frota Mattos and Douglas R. Stinson}, title = {Multiple Key Distribution Maintaining User Anonymity via Broadcast Channels}, journal = {J. Comput. Secur.}, volume = {3}, number = {4}, pages = {309--322}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-3406}, doi = {10.3233/JCS-1994/1995-3406}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BlundoMS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BlundoSSV95, author = {Carlo Blundo and Alfredo De Santis and Douglas R. Stinson and Ugo Vaccaro}, title = {Graph Decompositions and Secret Sharing Schemes}, journal = {J. Cryptol.}, volume = {8}, number = {1}, pages = {39--64}, year = {1995}, url = {https://doi.org/10.1007/BF00204801}, doi = {10.1007/BF00204801}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlundoSSV95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BlundoSGV95, author = {Carlo Blundo and Alfredo De Santis and Antonio Giorgio Gaggia and Ugo Vaccaro}, title = {New bounds on the information rate of secret sharing schemes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {41}, number = {2}, pages = {549--554}, year = {1995}, url = {https://doi.org/10.1109/18.370169}, doi = {10.1109/18.370169}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/BlundoSGV95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BlundoSPV95, author = {Carlo Blundo and Alfredo De Santis and Giuseppe Persiano and Ugo Vaccaro}, editor = {Zolt{\'{a}}n F{\"{u}}l{\"{o}}p and Ferenc G{\'{e}}cseg}, title = {On the Number of Random Bits in Totally Private Computation}, booktitle = {Automata, Languages and Programming, 22nd International Colloquium, ICALP95, Szeged, Hungary, July 10-14, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {944}, pages = {171--182}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60084-1\_72}, doi = {10.1007/3-540-60084-1\_72}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/BlundoSPV95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlundoSCGV94, author = {Carlo Blundo and Alfredo De Santis and Giovanni Di Crescenzo and Antonio Giorgio Gaggia and Ugo Vaccaro}, editor = {Yvo Desmedt}, title = {Multi-Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {150--163}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_17}, doi = {10.1007/3-540-48658-5\_17}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlundoSCGV94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlundoGS94, author = {Carlo Blundo and Antonio Giorgio Gaggia and Douglas R. Stinson}, editor = {Alfredo De Santis}, title = {On the Dealer's Randomness Required in Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {35--46}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053422}, doi = {10.1007/BFB0053422}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlundoGS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlundoC94, author = {Carlo Blundo and Antonella Cresti}, editor = {Alfredo De Santis}, title = {Space Requirements for Broadcast Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {287--298}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053444}, doi = {10.1007/BFB0053444}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlundoC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BlundoSV94, author = {Carlo Blundo and Alfredo De Santis and Ugo Vaccaro}, editor = {Serge Abiteboul and Eli Shamir}, title = {Randomness in Distributed Protocols}, booktitle = {Automata, Languages and Programming, 21st International Colloquium, ICALP94, Jerusalem, Israel, July 11-14, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {820}, pages = {568--579}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58201-0\_99}, doi = {10.1007/3-540-58201-0\_99}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/BlundoSV94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlundoCSV93, author = {Carlo Blundo and Antonella Cresti and Alfredo De Santis and Ugo Vaccaro}, editor = {Douglas R. Stinson}, title = {Fully Dynamic Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {110--125}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_10}, doi = {10.1007/3-540-48329-2\_10}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlundoCSV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fiwac/BlundoSGV93, author = {Carlo Blundo and Alfredo De Santis and Luisa Gargano and Ugo Vaccaro}, editor = {G{\'{e}}rard D. Cohen and Simon Litsyn and Antoine Lobstein and Gilles Z{\'{e}}mor}, title = {Secret Sharing Schemes with Veto Capabilities}, booktitle = {Algebraic Coding, First French-Israeli Workshop, Paris, France, July 19-21, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {781}, pages = {82--89}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-57843-9\_11}, doi = {10.1007/3-540-57843-9\_11}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fiwac/BlundoSGV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/BlundoSV93, author = {Carlo Blundo and Alfredo De Santis and Ugo Vaccaro}, editor = {Patrice Enjalbert and Alain Finkel and Klaus W. Wagner}, title = {Efficient Sharing of Many Secrets}, booktitle = {{STACS} 93, 10th Annual Symposium on Theoretical Aspects of Computer Science, W{\"{u}}rzburg, Germany, February 25-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {665}, pages = {692--703}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-56503-5\_68}, doi = {10.1007/3-540-56503-5\_68}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stacs/BlundoSV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlundoSGV92, author = {Carlo Blundo and Alfredo De Santis and Luisa Gargano and Ugo Vaccaro}, editor = {Ernest F. Brickell}, title = {On the Information Rate of Secret Sharing Schemes (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {148--167}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_11}, doi = {10.1007/3-540-48071-4\_11}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlundoSGV92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlundoSHKVY92, author = {Carlo Blundo and Alfredo De Santis and Amir Herzberg and Shay Kutten and Ugo Vaccaro and Moti Yung}, editor = {Ernest F. Brickell}, title = {Perfectly-Secure Key Distribution for Dynamic Conferences}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {471--486}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_33}, doi = {10.1007/3-540-48071-4\_33}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlundoSHKVY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlundoSSV92, author = {Carlo Blundo and Alfredo De Santis and Douglas R. Stinson and Ugo Vaccaro}, editor = {Rainer A. Rueppel}, title = {Graph Decompositions and Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonf{\"{u}}red, Hungary, May 24-28, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {658}, pages = {1--24}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-47555-9\_1}, doi = {10.1007/3-540-47555-9\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlundoSSV92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.