BibTeX records: Carlo Blundo

download as .bib file

@article{DBLP:journals/access/BlundoLO23,
  author       = {Carlo Blundo and
                  Vincenzo Loia and
                  Francesco Orciuoli},
  title        = {A Time-Aware Approach for {MOOC} Dropout Prediction Based on Rule
                  Induction and Sequential Three-Way Decisions},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {113189--113198},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3323202},
  doi          = {10.1109/ACCESS.2023.3323202},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BlundoLO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BlundoC23,
  author       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {Role mining under User-Distribution cardinality constraint},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103611},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103611},
  doi          = {10.1016/J.JISA.2023.103611},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BlundoC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/BlundoCS23,
  author       = {Carlo Blundo and
                  Stelvio Cimato and
                  Luisa Siniscalchi},
  title        = {Heuristics for constrained role mining in the post-processing framework},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {14},
  number       = {8},
  pages        = {9925--9937},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12652-021-03648-1},
  doi          = {10.1007/S12652-021-03648-1},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/BlundoCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/BlundoCS22,
  author       = {Carlo Blundo and
                  Stelvio Cimato and
                  Luisa Siniscalchi},
  title        = {Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints},
  journal      = {Comput. J.},
  volume       = {65},
  number       = {6},
  pages        = {1386--1411},
  year         = {2022},
  url          = {https://doi.org/10.1093/comjnl/bxaa186},
  doi          = {10.1093/COMJNL/BXAA186},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/BlundoCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/BlundoFFLO22,
  author       = {Carlo Blundo and
                  Giuseppe Fenza and
                  Graziano Fuccio and
                  Vincenzo Loia and
                  Francesco Orciuoli},
  title        = {A time-driven FCA-based approach for identifying students' dropout
                  in MOOCs},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {4},
  pages        = {2683--2705},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.22414},
  doi          = {10.1002/INT.22414},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/BlundoFFLO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/BlundoFFLO22,
  author       = {Carlo Blundo and
                  Giuseppe Fenza and
                  Graziano Fuccio and
                  Vincenzo Loia and
                  Francesco Orciuoli},
  editor       = {Leonard Barolli and
                  Farookh Hussain and
                  Tomoya Enokido},
  title        = {Sequential Three-Way Decisions for Reducing Uncertainty in Dropout
                  Prediction for Online Courses},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 36th International Conference on Advanced Information Networking
                  and Applications (AINA-2022), Sydney, NSW, Australia, 13-15 April
                  2022, Volume 1},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {449},
  pages        = {46--55},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-99584-3\_5},
  doi          = {10.1007/978-3-030-99584-3\_5},
  timestamp    = {Thu, 31 Mar 2022 15:19:27 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/BlundoFFLO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BlundoCS20,
  author       = {Carlo Blundo and
                  Stelvio Cimato and
                  Luisa Siniscalchi},
  title        = {Managing Constraints in Role Based Access Control},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {140497--140511},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3011310},
  doi          = {10.1109/ACCESS.2020.3011310},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BlundoCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fuzzIEEE/BlundoMPS19,
  author       = {Carlo Blundo and
                  Carmen De Maio and
                  Mimmo Parente and
                  Luisa Siniscalchi},
  title        = {An intelligent and private method to profile social network users},
  booktitle    = {2019 {IEEE} International Conference on Fuzzy Systems, {FUZZ-IEEE}
                  2019, New Orleans, LA, USA, June 23-26, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/FUZZ-IEEE.2019.8858912},
  doi          = {10.1109/FUZZ-IEEE.2019.8858912},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fuzzIEEE/BlundoMPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ideal/BlundoCS18,
  author       = {Carlo Blundo and
                  Stelvio Cimato and
                  Luisa Siniscalchi},
  editor       = {Hujun Yin and
                  David Camacho and
                  Paulo Novais and
                  Antonio J. Tall{\'{o}}n{-}Ballesteros},
  title        = {PostProcessing in Constrained Role Mining},
  booktitle    = {Intelligent Data Engineering and Automated Learning - {IDEAL} 2018
                  - 19th International Conference, Madrid, Spain, November 21-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11314},
  pages        = {204--214},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03493-1\_22},
  doi          = {10.1007/978-3-030-03493-1\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ideal/BlundoCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hcis/BlundoOP17,
  author       = {Carlo Blundo and
                  Francesco Orciuoli and
                  Mimmo Parente},
  title        = {An AmI-based and privacy-preserving shopping mall model},
  journal      = {Hum. centric Comput. Inf. Sci.},
  volume       = {7},
  pages        = {26},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13673-017-0107-4},
  doi          = {10.1186/S13673-017-0107-4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/hcis/BlundoOP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/BlundoCS17,
  author       = {Carlo Blundo and
                  Stelvio Cimato and
                  Luisa Siniscalchi},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Kamrul Hasan},
  title        = {{PRUCC-RM:} Permission-Role-Usage Cardinality Constrained Role Mining},
  booktitle    = {41st {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2017, Turin, Italy, July 4-8, 2017. Volume 2},
  pages        = {149--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/COMPSAC.2017.195},
  doi          = {10.1109/COMPSAC.2017.195},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/BlundoCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssci/BlundoOP16,
  author       = {Carlo Blundo and
                  Francesco Orciuoli and
                  Mimmo Parente},
  title        = {A private Intelligent Shopping Mall},
  booktitle    = {2016 {IEEE} Symposium Series on Computational Intelligence, {SSCI}
                  2016, Athens, Greece, December 6-9, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/SSCI.2016.7850186},
  doi          = {10.1109/SSCI.2016.7850186},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/ssci/BlundoOP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BlundoCG14,
  author       = {Carlo Blundo and
                  Emiliano De Cristofaro and
                  Paolo Gasti},
  title        = {EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {355--381},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-130482},
  doi          = {10.3233/JCS-130482},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BlundoCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/BlundoCGP13,
  author       = {Carlo Blundo and
                  Angelo De Caro and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Certified Information Access},
  journal      = {J. Syst. Softw.},
  volume       = {86},
  number       = {9},
  pages        = {2439--2450},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jss.2013.04.089},
  doi          = {10.1016/J.JSS.2013.04.089},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/BlundoCGP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BlundoCG12,
  author       = {Carlo Blundo and
                  Emiliano De Cristofaro and
                  Paolo Gasti},
  editor       = {Roberto Di Pietro and
                  Javier Herranz and
                  Ernesto Damiani and
                  Radu State},
  title        = {EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security, 7th International
                  Workshop, {DPM} 2012, and 5th International Workshop, {SETOP} 2012,
                  Pisa, Italy, September 13-14, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7731},
  pages        = {89--103},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35890-6\_7},
  doi          = {10.1007/978-3-642-35890-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BlundoCG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BlundoC12,
  author       = {Carlo Blundo and
                  Stelvio Cimato},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Constrained Role Mining},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {289--304},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_19},
  doi          = {10.1007/978-3-642-38004-4\_19},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BlundoC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1203-3744,
  author       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {Constrained Role Mining},
  journal      = {CoRR},
  volume       = {abs/1203.3744},
  year         = {2012},
  url          = {http://arxiv.org/abs/1203.3744},
  eprinttype    = {arXiv},
  eprint       = {1203.3744},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1203-3744.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csr/BlundoCDGKPS11,
  author       = {Carlo Blundo and
                  Angelo De Caro and
                  Shlomi Dolev and
                  Niv Gilboa and
                  Marina Kopeetsky and
                  Giuseppe Persiano and
                  Paul G. Spirakis},
  title        = {Innovative approaches for security of small artefacts},
  journal      = {Comput. Sci. Rev.},
  volume       = {5},
  number       = {1},
  pages        = {47--55},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cosrev.2010.09.002},
  doi          = {10.1016/J.COSREV.2010.09.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csr/BlundoCDGKPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Blundo11,
  author       = {Carlo Blundo},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Private Information Retrieval},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {974--976},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_762},
  doi          = {10.1007/978-1-4419-5906-5\_762},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Blundo11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-5062,
  author       = {Carlo Blundo and
                  Emiliano De Cristofaro and
                  Paolo Gasti},
  title        = {EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity},
  journal      = {CoRR},
  volume       = {abs/1111.5062},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.5062},
  eprinttype    = {arXiv},
  eprint       = {1111.5062},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-5062.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BlundoCVSFPS10,
  author       = {Carlo Blundo and
                  Stelvio Cimato and
                  Sabrina De Capitani di Vimercati and
                  Alfredo De Santis and
                  Sara Foresti and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Managing key hierarchies for access control enforcement: Heuristic
                  approaches},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {533--547},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.12.006},
  doi          = {10.1016/J.COSE.2009.12.006},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BlundoCVSFPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wsn/VincenzoCCG10,
  author       = {Vincenzo Auletta and
                  Carlo Blundo and
                  Emiliano De Cristofaro and
                  Guerriero Raimato},
  title        = {Web Services Invocation over Bluetooth},
  journal      = {Wirel. Sens. Netw.},
  volume       = {2},
  number       = {6},
  pages        = {447--461},
  year         = {2010},
  url          = {https://doi.org/10.4236/wsn.2010.26056},
  doi          = {10.4236/WSN.2010.26056},
  timestamp    = {Wed, 25 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wsn/VincenzoCCG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BlundoIP10,
  author       = {Carlo Blundo and
                  Vincenzo Iovino and
                  Giuseppe Persiano},
  editor       = {Swee{-}Huay Heng and
                  Rebecca N. Wright and
                  Bok{-}Min Goi},
  title        = {Predicate Encryption with Partial Public Keys},
  booktitle    = {Cryptology and Network Security - 9th International Conference, {CANS}
                  2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6467},
  pages        = {298--313},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17619-7\_21},
  doi          = {10.1007/978-3-642-17619-7\_21},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/BlundoIP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AulettaBCCPV10,
  author       = {Vincenzo Auletta and
                  Carlo Blundo and
                  Angelo De Caro and
                  Emiliano De Cristofaro and
                  Giuseppe Persiano and
                  Ivan Visconti},
  editor       = {Radu Sion and
                  Reza Curtmola and
                  Sven Dietrich and
                  Aggelos Kiayias and
                  Josep M. Miret and
                  Kazue Sako and
                  Francesc Seb{\'{e}}},
  title        = {Increasing Privacy Threats in the Cyberspace: The Case of Italian
                  E-Passports},
  booktitle    = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
                  WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  pages        = {94--104},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14992-4\_9},
  doi          = {10.1007/978-3-642-14992-4\_9},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AulettaBCCPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BlundoC10,
  author       = {Carlo Blundo and
                  Stelvio Cimato},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {A simple role mining algorithm},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {1958--1962},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774503},
  doi          = {10.1145/1774088.1774503},
  timestamp    = {Sun, 02 Jun 2019 21:18:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/BlundoC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlundoIP10,
  author       = {Carlo Blundo and
                  Vincenzo Iovino and
                  Giuseppe Persiano},
  title        = {Predicate Encryption with Partial Public Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlundoIP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BlundoIP09,
  author       = {Carlo Blundo and
                  Vincenzo Iovino and
                  Giuseppe Persiano},
  editor       = {Juan A. Garay and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Private-Key Hidden Vector Encryption with Key Confidentiality},
  booktitle    = {Cryptology and Network Security, 8th International Conference, {CANS}
                  2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5888},
  pages        = {259--277},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10433-6\_17},
  doi          = {10.1007/978-3-642-10433-6\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/BlundoIP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BlundoCP09,
  author       = {Carlo Blundo and
                  Angelo De Caro and
                  Giuseppe Persiano},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Nora Cuppens{-}Boulahia and
                  Yves Roudier},
  title        = {Untraceable Tags Based on Mild Assumptions},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security, 4th International
                  Workshop, {DPM} 2009 and Second International Workshop, {SETOP} 2009,
                  St. Malo, France, September 24-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5939},
  pages        = {178--192},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11207-2\_14},
  doi          = {10.1007/978-3-642-11207-2\_14},
  timestamp    = {Fri, 27 Dec 2019 21:19:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BlundoCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictcs/BlundoIP09,
  author       = {Carlo Blundo and
                  Vincenzo Iovino and
                  Giuseppe Persiano},
  editor       = {Alessandra Cherubini and
                  Mario Coppo and
                  Giuseppe Persiano},
  title        = {Private-Key Hidden Vector Encryption with Key Privacy},
  booktitle    = {Theoretical Computer Science, 11th Italian Conference, {ICTCS} 2009,
                  Cremona, Italy, September 28-30, 2009, Proceedings},
  pages        = {46--50},
  year         = {2009},
  timestamp    = {Tue, 28 May 2013 14:21:59 +0200},
  biburl       = {https://dblp.org/rec/conf/ictcs/BlundoIP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BlundoCVSFPS09,
  author       = {Carlo Blundo and
                  Stelvio Cimato and
                  Sabrina De Capitani di Vimercati and
                  Alfredo De Santis and
                  Sara Foresti and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Dimitris Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {Efficient Key Management for Enforcing Access Control in Outsourced
                  Scenarios},
  booktitle    = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC}
                  11 International Information Security Conference, {SEC} 2009, Pafos,
                  Cyprus, May 18-20, 2009. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {297},
  pages        = {364--375},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01244-0\_32},
  doi          = {10.1007/978-3-642-01244-0\_32},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BlundoCVSFPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlundoCP09,
  author       = {Carlo Blundo and
                  Angelo De Caro and
                  Giuseppe Persiano},
  title        = {Untraceable Tags based on Mild Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/380},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlundoCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecows/BlundoCGP08,
  author       = {Carlo Blundo and
                  Emiliano De Cristofaro and
                  Clemente Galdi and
                  Giuseppe Persiano},
  editor       = {Claus Pahl and
                  Siobh{\'{a}}n Clarke and
                  Rik Eshuis},
  title        = {Validating Orchestration of Web Services with {BPEL} and Aggregate
                  Signatures},
  booktitle    = {{ECOWS} 2008, Sixth European Conference on Web Services, 12-14 November
                  2008, Dublin, Ireland},
  pages        = {205--214},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ECOWS.2008.9},
  doi          = {10.1109/ECOWS.2008.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecows/BlundoCGP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BlundoPSV08,
  author       = {Carlo Blundo and
                  Giuseppe Persiano and
                  Ahmad{-}Reza Sadeghi and
                  Ivan Visconti},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {Improved Security Notions and Protocols for Non-transferable Identification},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {364--378},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_24},
  doi          = {10.1007/978-3-540-88313-5\_24},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BlundoPSV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BlundoCSGP08,
  author       = {Carlo Blundo and
                  Emiliano De Cristofaro and
                  Aniello Del Sorbo and
                  Clemente Galdi and
                  Giuseppe Persiano},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {A Distributed Implementation of the Certified Information Access Service},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {396--410},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_26},
  doi          = {10.1007/978-3-540-88313-5\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BlundoCSGP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BlundoGP07,
  author       = {Carlo Blundo and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Low-randomness constant-round private {XOR} computations},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {1},
  pages        = {15--26},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-006-0007-5},
  doi          = {10.1007/S10207-006-0007-5},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BlundoGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BlundoDSS07,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Alfredo De Santis and
                  Douglas R. Stinson},
  title        = {On Unconditionally Secure Distributed Oblivious Transfer},
  journal      = {J. Cryptol.},
  volume       = {20},
  number       = {3},
  pages        = {323--373},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00145-007-0327-2},
  doi          = {10.1007/S00145-007-0327-2},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BlundoDSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsnc/AulettaBC07,
  author       = {Vincenzo Auletta and
                  Carlo Blundo and
                  Emiliano De Cristofaro},
  title        = {A {J2ME} transparent middleware to support {HTTP} connections over
                  Bluetooth},
  booktitle    = {Proceedings of the Second International Conference on Systems and
                  Networks Communications {(ICSNC} 2007), August 25-31, 2007, Cap Esterel,
                  French Riviera, France},
  pages        = {3},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICSNC.2007.3},
  doi          = {10.1109/ICSNC.2007.3},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsnc/AulettaBC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/BlundoC07,
  author       = {Carlo Blundo and
                  Emiliano De Cristofaro},
  editor       = {Robert Meersman and
                  Zahir Tari},
  title        = {A Bluetooth-Based {JXME} Infrastructure},
  booktitle    = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE,
                  GADA, and IS, {OTM} Confederated International Conferences CoopIS,
                  DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30,
                  2007, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4803},
  pages        = {667--682},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76848-7\_45},
  doi          = {10.1007/978-3-540-76848-7\_45},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/BlundoC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BlundoCS06,
  author       = {Carlo Blundo and
                  Stelvio Cimato and
                  Alfredo De Santis},
  title        = {Visual cryptography schemes with optimal pixel expansion},
  journal      = {Theor. Comput. Sci.},
  volume       = {369},
  number       = {1-3},
  pages        = {169--182},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.tcs.2006.08.008},
  doi          = {10.1016/J.TCS.2006.08.008},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/BlundoCS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BlundoDS06,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Alfredo De Santis},
  title        = {On Self-Healing Key Distribution Schemes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {52},
  number       = {12},
  pages        = {5455--5467},
  year         = {2006},
  url          = {https://doi.org/10.1109/TIT.2006.885514},
  doi          = {10.1109/TIT.2006.885514},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/BlundoDS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/AulettaBCR06,
  author       = {Vincenzo Auletta and
                  Carlo Blundo and
                  Emiliano De Cristofaro and
                  Guerriero Raimato},
  title        = {A Lightweight Framework forWeb Services Invocation over Bluetooth},
  booktitle    = {2006 {IEEE} International Conference on Web Services {(ICWS} 2006),
                  18-22 September 2006, Chicago, Illinois, {USA}},
  pages        = {331--338},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICWS.2006.7},
  doi          = {10.1109/ICWS.2006.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/AulettaBCR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/AulettaBCR06,
  author       = {Vincenzo Auletta and
                  Carlo Blundo and
                  Stelvio Cimato and
                  Guerriero Raimato},
  editor       = {Paolo Bellavista and
                  Chi{-}Ming Chen and
                  Antonio Corradi and
                  Mahmoud Daneshmand},
  title        = {A Web Service Based Micro-payment System},
  booktitle    = {Proceedings of the 11th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2006), 26-29 June 2006, Cagliari, Sardinia, Italy},
  pages        = {328--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISCC.2006.20},
  doi          = {10.1109/ISCC.2006.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/AulettaBCR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mswim/AulettaBCR06,
  author       = {Vincenzo Auletta and
                  Carlo Blundo and
                  Emiliano De Cristofaro and
                  Guerriero Raimato},
  editor       = {Mohamed Ould{-}Khaoua and
                  Mar{\'{\i}}a Blanca Caminero},
  title        = {Performance evaluation of web services invocation over Bluetooth},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Performance Monitoring and
                  Measurement of Heterogeneous Wireless and Wired Networks, {PM2HW2N}
                  2006, Terromolinos, Spain, October 2, 2006},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1163653.1163655},
  doi          = {10.1145/1163653.1163655},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mswim/AulettaBCR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlundoCS06,
  author       = {Carlo Blundo and
                  Stelvio Cimato and
                  Alfredo De Santis},
  title        = {Visual Cryptography Schemes with Optimal Pixel Expansion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {170},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/170},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlundoCS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecr/BlundoCB05,
  author       = {Carlo Blundo and
                  Stelvio Cimato and
                  Annalisa De Bonis},
  title        = {Secure E-Coupons},
  journal      = {Electron. Commer. Res.},
  volume       = {5},
  number       = {1},
  pages        = {117--139},
  year         = {2005},
  url          = {https://doi.org/10.1023/B:ELEC.0000045976.24984.48},
  doi          = {10.1023/B:ELEC.0000045976.24984.48},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecr/BlundoCB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BlundoD05,
  author       = {Carlo Blundo and
                  Paolo D'Arco},
  title        = {Analysis and Design of Distributed Key Distribution Centers},
  journal      = {J. Cryptol.},
  volume       = {18},
  number       = {4},
  pages        = {391--414},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00145-005-0407-0},
  doi          = {10.1007/S00145-005-0407-0},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BlundoD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Blundo05,
  author       = {Carlo Blundo},
  title        = {Randomness in self-healing key distribution schemes},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {80--84},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543962},
  doi          = {10.1109/ITWTPI.2005.1543962},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Blundo05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/BlundoCP05,
  author       = {Carlo Blundo and
                  Stelvio Cimato and
                  Roberto De Prisco},
  title        = {A Lightweight Approach to Authenticated Web Caching},
  booktitle    = {2005 {IEEE/IPSJ} International Symposium on Applications and the Internet
                  {(SAINT} 2005), 31 January - 4 February 2005, Trento, Italy},
  pages        = {157--163},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SAINT.2005.5},
  doi          = {10.1109/SAINT.2005.5},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/BlundoCP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2004,
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b105083},
  doi          = {10.1007/B105083},
  isbn         = {3-540-24301-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BlundoC04,
  author       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {A Software Infrastructure for Authenticated Web Metering},
  journal      = {Computer},
  volume       = {37},
  number       = {4},
  pages        = {28--33},
  year         = {2004},
  url          = {https://doi.org/10.1109/MC.2004.1297298},
  doi          = {10.1109/MC.2004.1297298},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BlundoC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlundoDSL04,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Alfredo De Santis and
                  Massimiliano Listo},
  title        = {Design of Self-Healing Key Distribution Schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {32},
  number       = {1-3},
  pages        = {15--44},
  year         = {2004},
  url          = {https://doi.org/10.1023/B:DESI.0000029210.20690.3f},
  doi          = {10.1023/B:DESI.0000029210.20690.3F},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlundoDSL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlundoMMP04,
  author       = {Carlo Blundo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Barbara Masucci and
                  Carles Padr{\'{o}}},
  title        = {A Linear Algebraic Approach to Metering Schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {33},
  number       = {3},
  pages        = {241--260},
  year         = {2004},
  url          = {https://doi.org/10.1023/B:DESI.0000036249.86262.d5},
  doi          = {10.1023/B:DESI.0000036249.86262.D5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlundoMMP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/BlundoDSG04,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Alfredo De Santis and
                  Clemente Galdi},
  title        = {H\({}_{\mbox{YPPOCRATES}}\): a new proactive password checker},
  journal      = {J. Syst. Softw.},
  volume       = {71},
  number       = {1-2},
  pages        = {163--175},
  year         = {2004},
  url          = {https://doi.org/10.1016/S0164-1212(03)00004-9},
  doi          = {10.1016/S0164-1212(03)00004-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/BlundoDSG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BlundoDDP04,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Vanesa Daza and
                  Carles Padr{\'{o}}},
  title        = {Bounds and constructions for unconditionally secure distributed key
                  distribution schemes for general access structures},
  journal      = {Theor. Comput. Sci.},
  volume       = {320},
  number       = {2-3},
  pages        = {269--291},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.tcs.2004.02.030},
  doi          = {10.1016/J.TCS.2004.02.030},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/BlundoDDP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecows/BlundoC04,
  author       = {Carlo Blundo and
                  Stelvio Cimato},
  editor       = {Liang{-}Jie Zhang},
  title        = {A Framework for Authenticated Web Services},
  booktitle    = {Web Services, European Conference, {ECOWS} 2004, Erfurt, Germany,
                  September 27-30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3250},
  pages        = {61--71},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30209-4\_5},
  doi          = {10.1007/978-3-540-30209-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ecows/BlundoC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/BlundoDS04,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Alfredo De Santis},
  editor       = {Josep D{\'{\i}}az and
                  Juhani Karhum{\"{a}}ki and
                  Arto Lepist{\"{o}} and
                  Donald Sannella},
  title        = {Definitions and Bounds for Self-Healing Key Distribution Schemes},
  booktitle    = {Automata, Languages and Programming: 31st International Colloquium,
                  {ICALP} 2004, Turku, Finland, July 12-16, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3142},
  pages        = {234--245},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27836-8\_22},
  doi          = {10.1007/978-3-540-27836-8\_22},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/BlundoDS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/BlundoC04,
  author       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {A Platform for Secure E-Gambling},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {768--772},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286750},
  doi          = {10.1109/ITCC.2004.1286750},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/BlundoC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/BlundoG03,
  author       = {Carlo Blundo and
                  Clemente Galdi},
  title        = {Hiding Information in Image Mosaics},
  journal      = {Comput. J.},
  volume       = {46},
  number       = {2},
  pages        = {202--212},
  year         = {2003},
  url          = {https://doi.org/10.1093/comjnl/46.2.202},
  doi          = {10.1093/COMJNL/46.2.202},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/BlundoG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/BlundoDP03,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Carles Padr{\'{o}}},
  title        = {A Ramp Model for Distributed Key Distribution Schemes},
  journal      = {Discret. Appl. Math.},
  volume       = {128},
  number       = {1},
  pages        = {47--64},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0166-218X(02)00435-3},
  doi          = {10.1016/S0166-218X(02)00435-3},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/BlundoDP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/BlundoDSS03,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Alfredo De Santis and
                  Douglas R. Stinson},
  title        = {Contrast Optimal Threshold Visual Cryptography Schemes},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {16},
  number       = {2},
  pages        = {224--261},
  year         = {2003},
  url          = {https://doi.org/10.1137/S0895480198336683},
  doi          = {10.1137/S0895480198336683},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/BlundoDSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/BlundoDL03,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Massimiliano Listo},
  title        = {A New Self-Healing Key Distribution Scheme},
  booktitle    = {Proceedings of the Eighth {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey},
  pages        = {803--808},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ISCC.2003.1214216},
  doi          = {10.1109/ISCC.2003.1214216},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/BlundoDL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/BlundoCP03,
  author       = {Carlo Blundo and
                  Stelvio Cimato and
                  Roberto De Prisco},
  title        = {Certified Email: Design and Implementation of a New Optimistic Protocol.},
  booktitle    = {Proceedings of the Eighth {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey},
  pages        = {828--833},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ISCC.2003.1214220},
  doi          = {10.1109/ISCC.2003.1214220},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/BlundoCP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/BlundoDL03,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Massimiliano Listo},
  title        = {A flaw in a self-healing key distribution scheme},
  booktitle    = {Proceedings 2003 {IEEE} Information Theory Workshop, {ITW} 2003, La
                  Sorbonne, Paris, France, 31 March - 4 April, 2003},
  pages        = {163--166},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ITW.2003.1216720},
  doi          = {10.1109/ITW.2003.1216720},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/BlundoDL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BlundoCPF04,
  author       = {Carlo Blundo and
                  Stelvio Cimato and
                  Roberto De Prisco and
                  Anna Lisa Ferrara},
  editor       = {Mario Bravetti and
                  Roberto Gorrieri},
  title        = {Modeling {A} Certified Email Protocol using {I/O} Automata},
  booktitle    = {Formal Methods for Security and Time: Proceedings of the {MEFISTO}
                  Project 2003, {MEFISTO} 2003, Pisa, Italy, November 3-5, 2003},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {99},
  pages        = {339--359},
  publisher    = {Elsevier},
  year         = {2003},
  url          = {https://doi.org/10.1016/j.entcs.2004.02.015},
  doi          = {10.1016/J.ENTCS.2004.02.015},
  timestamp    = {Thu, 08 Dec 2022 22:44:21 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BlundoCPF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ictcs/2003,
  editor       = {Carlo Blundo and
                  Cosimo Laneve},
  title        = {Theoretical Computer Science, 8th Italian Conference, {ICTCS} 2003,
                  Bertinoro, Italy, October 13-15, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2841},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b13810},
  doi          = {10.1007/B13810},
  isbn         = {3-540-20216-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ictcs/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cominfsys/BlundoBM02,
  author       = {Carlo Blundo and
                  Annalisa De Bonis and
                  Barbara Masucci},
  title        = {Bounds and constructions for metering schemes},
  journal      = {Commun. Inf. Syst.},
  volume       = {2},
  number       = {1},
  pages        = {1--28},
  year         = {2002},
  url          = {https://doi.org/10.4310/cis.2002.v2.n1.a1},
  doi          = {10.4310/CIS.2002.V2.N1.A1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cominfsys/BlundoBM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlundoMSW02,
  author       = {Carlo Blundo and
                  Barbara Masucci and
                  Douglas R. Stinson and
                  Ruizhong Wei},
  title        = {Constructions and Bounds for Unconditionally Secure Non-Interactive
                  Commitment Schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {26},
  number       = {1-3},
  pages        = {97--110},
  year         = {2002},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlundoMSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/BlundoCM02,
  author       = {Carlo Blundo and
                  Stelvio Cimato and
                  Barbara Masucci},
  title        = {A note on optimal metering schemes},
  journal      = {Inf. Process. Lett.},
  volume       = {84},
  number       = {6},
  pages        = {319--326},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0020-0190(02)00321-6},
  doi          = {10.1016/S0020-0190(02)00321-6},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/BlundoCM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/BlundoD02,
  author       = {Carlo Blundo and
                  Paolo D'Arco},
  editor       = {Riccardo Focardi and
                  Roberto Gorrieri},
  title        = {The Key Establishment Problem},
  booktitle    = {Foundations of Security Analysis and Design II, {FOSAD} 2001/2002
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {2946},
  pages        = {44--90},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-24631-2\_2},
  doi          = {10.1007/978-3-540-24631-2\_2},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/BlundoD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infrasec/BlundoDSG02,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Alfredo De Santis and
                  Clemente Galdi},
  editor       = {George I. Davida and
                  Yair Frankel and
                  Owen Rees},
  title        = {A Novel Approach to Proactive Password Checking},
  booktitle    = {Infrastructure Security, International Conference, InfraSec 2002 Bristol,
                  UK, October 1-3, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2437},
  pages        = {30--39},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45831-X\_3},
  doi          = {10.1007/3-540-45831-X\_3},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infrasec/BlundoDSG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BlundoDSS02,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Alfredo De Santis and
                  Douglas R. Stinson},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {New Results on Unconditionally Secure Distributed Oblivious Transfer},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {291--309},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_19},
  doi          = {10.1007/3-540-36492-7\_19},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BlundoDSS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seke/BlundoC02,
  author       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {{SAWM:} a tool for secure and authenticated web metering},
  booktitle    = {Proceedings of the 14th international conference on Software engineering
                  and knowledge engineering, {SEKE} 2002, Ischia, Italy, July 15-19,
                  2002},
  pages        = {641--648},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/568760.568871},
  doi          = {10.1145/568760.568871},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/seke/BlundoC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/BlundoCB02,
  author       = {Carlo Blundo and
                  Stelvio Cimato and
                  Annalisa De Bonis},
  editor       = {David Lassner and
                  David De Roure and
                  Arun Iyengar},
  title        = {A lightweight protocol for the generation and distribution of secure
                  e-coupons},
  booktitle    = {Proceedings of the Eleventh International World Wide Web Conference,
                  {WWW} 2002, May 7-11, 2002, Honolulu, Hawaii, {USA}},
  pages        = {542--552},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/511446.511517},
  doi          = {10.1145/511446.511517},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/BlundoCB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlundoBS01,
  author       = {Carlo Blundo and
                  Annalisa De Bonis and
                  Alfredo De Santis},
  title        = {Improved Schemes for Visual Cryptography},
  journal      = {Des. Codes Cryptogr.},
  volume       = {24},
  number       = {3},
  pages        = {255--278},
  year         = {2001},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlundoBS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/endm/BlundoDP01,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Carles Padr{\'{o}}},
  title        = {A Ramp Model for Distributed Key Distribution Schemes},
  journal      = {Electron. Notes Discret. Math.},
  volume       = {6},
  pages        = {45--54},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1571-0653(04)00156-8},
  doi          = {10.1016/S1571-0653(04)00156-8},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/endm/BlundoDP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BlundoDS01,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Alfredo De Santis},
  title        = {A t-private k-database information retrieval scheme},
  journal      = {Int. J. Inf. Sec.},
  volume       = {1},
  number       = {1},
  pages        = {64--68},
  year         = {2001},
  url          = {https://doi.org/10.1007/s102070100005},
  doi          = {10.1007/S102070100005},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BlundoDS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AtenieseBSS01,
  author       = {Giuseppe Ateniese and
                  Carlo Blundo and
                  Alfredo De Santis and
                  Douglas R. Stinson},
  title        = {Extended capabilities for visual cryptography},
  journal      = {Theor. Comput. Sci.},
  volume       = {250},
  number       = {1-2},
  pages        = {143--161},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0304-3975(99)00127-9},
  doi          = {10.1016/S0304-3975(99)00127-9},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/AtenieseBSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BlundoDDP01,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Vanesa Daza and
                  Carles Padr{\'{o}}},
  editor       = {George I. Davida and
                  Yair Frankel},
  title        = {Bounds and Constructions for Unconditionally Secure Distributed Key
                  Distribution Schemes for General Access Structures},
  booktitle    = {Information Security, 4th International Conference, {ISC} 2001, Malaga,
                  Spain, October 1-3, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2200},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45439-X\_1},
  doi          = {10.1007/3-540-45439-X\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BlundoDDP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BlundoDSG01,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Alfredo De Santis and
                  Clemente Galdi},
  editor       = {George I. Davida and
                  Yair Frankel},
  title        = {Hyppocrates},
  booktitle    = {Information Security, 4th International Conference, {ISC} 2001, Malaga,
                  Spain, October 1-3, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2200},
  pages        = {63--80},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45439-X\_5},
  doi          = {10.1007/3-540-45439-X\_5},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BlundoDSG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlundoMMP01,
  author       = {Carlo Blundo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Barbara Masucci and
                  Carles Padr{\'{o}}},
  title        = {A Linear Algebraic Approach to Metering Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlundoMMP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/BlundoSN00,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Moni Naor},
  title        = {Visual cryptography for grey level images},
  journal      = {Inf. Process. Lett.},
  volume       = {75},
  number       = {6},
  pages        = {255--259},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0020-0190(00)00108-3},
  doi          = {10.1016/S0020-0190(00)00108-3},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/BlundoSN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifipTCS/BlundoG00,
  author       = {Carlo Blundo and
                  Clemente Galdi},
  editor       = {Jan van Leeuwen and
                  Osamu Watanabe and
                  Masami Hagiya and
                  Peter D. Mosses and
                  Takayasu Ito},
  title        = {Steganography Using Modern Arts},
  booktitle    = {Theoretical Computer Science, Exploring New Frontiers of Theoretical
                  Informatics, International Conference {IFIP} {TCS} 2000, Sendai, Japan,
                  August 17-19, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1872},
  pages        = {140--151},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44929-9\_12},
  doi          = {10.1007/3-540-44929-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/ifipTCS/BlundoG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BlundoBMS00,
  author       = {Carlo Blundo and
                  Annalisa De Bonis and
                  Barbara Masucci and
                  Douglas R. Stinson},
  editor       = {Douglas R. Stinson and
                  Stafford E. Tavares},
  title        = {Dynamic Multi-threshold Metering Schemes},
  booktitle    = {Selected Areas in Cryptography, 7th Annual International Workshop,
                  {SAC} 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2012},
  pages        = {130--143},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44983-3\_10},
  doi          = {10.1007/3-540-44983-3\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BlundoBMS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/BlundoBM00,
  author       = {Carlo Blundo and
                  Annalisa De Bonis and
                  Barbara Masucci},
  editor       = {Maurice Herlihy},
  title        = {Metering Schemes with Pricing},
  booktitle    = {Distributed Computing, 14th International Conference, {DISC} 2000,
                  Toledo, Spain, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1914},
  pages        = {194--208},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-40026-5\_13},
  doi          = {10.1007/3-540-40026-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/BlundoBM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlundoMSW00,
  author       = {Carlo Blundo and
                  Barbara Masucci and
                  Douglas R. Stinson and
                  Ruizhong Wei},
  title        = {Constructions and Bounds for Unconditionally Secure Commitment Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlundoMSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/BlundoSPV99,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Giuseppe Persiano and
                  Ugo Vaccaro},
  title        = {Randomness Complexity of Private Computation},
  journal      = {Comput. Complex.},
  volume       = {8},
  number       = {2},
  pages        = {145--168},
  year         = {1999},
  url          = {https://doi.org/10.1007/s000370050025},
  doi          = {10.1007/S000370050025},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cc/BlundoSPV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/BlundoDG99,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Antonio Giorgio Gaggia},
  title        = {A tau-Restricted Key Agreement Scheme},
  journal      = {Comput. J.},
  volume       = {42},
  number       = {1},
  pages        = {51--61},
  year         = {1999},
  url          = {https://doi.org/10.1093/comjnl/42.1.51},
  doi          = {10.1093/COMJNL/42.1.51},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/BlundoDG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/BlundoSG99,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Antonio Giorgio Gaggia},
  title        = {Probability of Shares in Secret Sharing Schemes},
  journal      = {Inf. Process. Lett.},
  volume       = {72},
  number       = {5-6},
  pages        = {169--175},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0020-0190(99)00153-2},
  doi          = {10.1016/S0020-0190(99)00153-2},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/BlundoSG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/BlundoC99,
  author       = {Carlo Blundo and
                  Antonella Cresti},
  title        = {Unconditional Secure Conference Key Distribution Schemes with Disenrollment
                  Capability},
  journal      = {Inf. Sci.},
  volume       = {120},
  number       = {1-4},
  pages        = {113--130},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0020-0255(99)00074-2},
  doi          = {10.1016/S0020-0255(99)00074-2},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/BlundoC99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BlundoM99,
  author       = {Carlo Blundo and
                  Barbara Masucci},
  title        = {A Note on the Randomness in Dynamic Threshold Schemes},
  journal      = {J. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {73--85},
  year         = {1999},
  url          = {https://doi.org/10.3233/jcs-1999-7104},
  doi          = {10.3233/JCS-1999-7104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BlundoM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BlundoSKO99,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Kaoru Kurosawa and
                  Wakaha Ogata},
  title        = {On a Fallacious Bound for Authentication Codes},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {155--159},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900049},
  doi          = {10.1007/S001459900049},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BlundoSKO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BlundoSS99,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Douglas R. Stinson},
  title        = {On the Contrast in Visual Cryptography Schemes},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {4},
  pages        = {261--289},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900057},
  doi          = {10.1007/S001459900057},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BlundoSS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/BlundoM99,
  author       = {Carlo Blundo and
                  Barbara Masucci},
  title        = {Randomness in Multi-Secret Sharing Schemes},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {5},
  number       = {7},
  pages        = {367--389},
  year         = {1999},
  url          = {https://doi.org/10.3217/jucs-005-07-0367},
  doi          = {10.3217/JUCS-005-07-0367},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/BlundoM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/BlundoGP99,
  author       = {Carlo Blundo and
                  Clemente Galdi and
                  Pino Persiano},
  editor       = {Prasad Jayanti},
  title        = {Randomness Recycling in Constant-Round Private Computations (extended
                  Abstract)},
  booktitle    = {Distributed Computing, 13th International Symposium, Bratislava, Slovak
                  Republic, September 27-29, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1693},
  pages        = {138--150},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48169-9\_10},
  doi          = {10.1007/3-540-48169-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/BlundoGP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cg/BlundoS98,
  author       = {Carlo Blundo and
                  Alfredo De Santis},
  title        = {Visual cryptography schemes with perfect reconstruction of black pixels},
  journal      = {Comput. Graph.},
  volume       = {22},
  number       = {4},
  pages        = {449--455},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0097-8493(98)00034-X},
  doi          = {10.1016/S0097-8493(98)00034-X},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cg/BlundoS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/BlundoSHKVY98,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Amir Herzberg and
                  Shay Kutten and
                  Ugo Vaccaro and
                  Moti Yung},
  title        = {Perfectly Secure Key Distribution for Dynamic Conferences},
  journal      = {Inf. Comput.},
  volume       = {146},
  number       = {1},
  pages        = {1--23},
  year         = {1998},
  url          = {https://doi.org/10.1006/inco.1998.2717},
  doi          = {10.1006/INCO.1998.2717},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/BlundoSHKVY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/BlundoSV98,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Ugo Vaccaro},
  title        = {On Secret Sharing Schemes},
  journal      = {Inf. Process. Lett.},
  volume       = {65},
  number       = {1},
  pages        = {25--32},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0020-0190(97)00194-4},
  doi          = {10.1016/S0020-0190(97)00194-4},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/BlundoSV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BlundoMS98,
  author       = {Carlo Blundo and
                  Luiz A. Frota Mattos and
                  Douglas R. Stinson},
  title        = {Generalized Beimel-Chor Schemes for Broadcast Encryption and Interactive
                  Key Distribution},
  journal      = {Theor. Comput. Sci.},
  volume       = {200},
  number       = {1-2},
  pages        = {313--334},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0304-3975(98)80007-8},
  doi          = {10.1016/S0304-3975(98)80007-8},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/BlundoMS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/BlundoS97,
  author       = {Carlo Blundo and
                  Douglas R. Stinson},
  title        = {Anonymous Secret Sharing Schemes},
  journal      = {Discret. Appl. Math.},
  volume       = {77},
  number       = {1},
  pages        = {13--28},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0166-218X(97)89208-6},
  doi          = {10.1016/S0166-218X(97)89208-6},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/BlundoS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlundoSSV97,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Roberto de Simone and
                  Ugo Vaccaro},
  title        = {Tight Bounds on the Information Rate of Secret Sharing Schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {11},
  number       = {2},
  pages        = {107--122},
  year         = {1997},
  url          = {https://doi.org/10.1023/A:1008216403325},
  doi          = {10.1023/A:1008216403325},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlundoSSV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlundoGS97,
  author       = {Carlo Blundo and
                  Antonio Giorgio Gaggia and
                  Douglas R. Stinson},
  title        = {On the Dealer's Randomness Required in Secret Sharing Schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {11},
  number       = {3},
  pages        = {235--259},
  year         = {1997},
  url          = {https://doi.org/10.1023/A:1008242111272},
  doi          = {10.1023/A:1008242111272},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlundoGS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/BlundoS97,
  author       = {Carlo Blundo and
                  Alfredo De Santis},
  title        = {Lower Bounds for Robust Secret Sharing Schemes},
  journal      = {Inf. Process. Lett.},
  volume       = {63},
  number       = {6},
  pages        = {317--321},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0020-0190(97)00135-X},
  doi          = {10.1016/S0020-0190(97)00135-X},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/BlundoS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/AtenieseBSS96,
  author       = {Giuseppe Ateniese and
                  Carlo Blundo and
                  Alfredo De Santis and
                  Douglas R. Stinson},
  title        = {Visual Cryptography for General Access Structures},
  journal      = {Inf. Comput.},
  volume       = {129},
  number       = {2},
  pages        = {86--106},
  year         = {1996},
  url          = {https://doi.org/10.1006/inco.1996.0076},
  doi          = {10.1006/INCO.1996.0076},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/AtenieseBSS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/BlundoSV96,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Ugo Vaccaro},
  title        = {Randomness in Distribution Protocols},
  journal      = {Inf. Comput.},
  volume       = {131},
  number       = {2},
  pages        = {111--139},
  year         = {1996},
  url          = {https://doi.org/10.1006/inco.1996.0095},
  doi          = {10.1006/INCO.1996.0095},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/BlundoSV96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BlundoSGV96,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Luisa Gargano and
                  Ugo Vaccaro},
  title        = {On the Information Rate of Secret Sharing Schemes},
  journal      = {Theor. Comput. Sci.},
  volume       = {154},
  number       = {2},
  pages        = {283--306},
  year         = {1996},
  url          = {https://doi.org/10.1016/0304-3975(95)00065-8},
  doi          = {10.1016/0304-3975(95)00065-8},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/BlundoSGV96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BlundoCSV96,
  author       = {Carlo Blundo and
                  Antonella Cresti and
                  Alfredo De Santis and
                  Ugo Vaccaro},
  title        = {Fully Dynamic Secret Sharing Schemes},
  journal      = {Theor. Comput. Sci.},
  volume       = {165},
  number       = {2},
  pages        = {407--440},
  year         = {1996},
  url          = {https://doi.org/10.1016/0304-3975(96)00003-5},
  doi          = {10.1016/0304-3975(96)00003-5},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/BlundoCSV96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BlundoP96,
  author       = {Carlo Blundo and
                  Roberto De Prisco},
  title        = {New bounds on the expected length of one-to-one codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {42},
  number       = {1},
  pages        = {246--250},
  year         = {1996},
  url          = {https://doi.org/10.1109/18.481795},
  doi          = {10.1109/18.481795},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/BlundoP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlundoMS96,
  author       = {Carlo Blundo and
                  Luiz A. Frota Mattos and
                  Douglas R. Stinson},
  editor       = {Neal Koblitz},
  title        = {Trade-offs Between Communication and Storage in Unconditionally Secure
                  Schemes for Broadcast Encryption and Interactive Key Distribution},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {387--400},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_29},
  doi          = {10.1007/3-540-68697-5\_29},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlundoMS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/AtenieseBSS96,
  author       = {Giuseppe Ateniese and
                  Carlo Blundo and
                  Alfredo De Santis and
                  Douglas R. Stinson},
  editor       = {Friedhelm Meyer auf der Heide and
                  Burkhard Monien},
  title        = {Constructions and Bounds for Visual Cryptography},
  booktitle    = {Automata, Languages and Programming, 23rd International Colloquium,
                  ICALP96, Paderborn, Germany, 8-12 July 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1099},
  pages        = {416--428},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61440-0\_147},
  doi          = {10.1007/3-540-61440-0\_147},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/AtenieseBSS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR96-012,
  author       = {Giuseppe Ateniese and
                  Carlo Blundo and
                  Alfredo De Santis and
                  Douglas R. Stinson},
  title        = {Visual Cryptography for General Access Structures},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR96-012}},
  year         = {1996},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/1996/TR96-012/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR96-012},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR96-012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlundoSS96,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Douglas R. Stinson},
  title        = {On the Contrast in Visual Cryptography Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {1996},
  url          = {http://eprint.iacr.org/1996/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlundoSS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Blundo95,
  author       = {Carlo Blundo},
  title        = {A Note on Dynamic Threshold Schemes},
  journal      = {Inf. Process. Lett.},
  volume       = {55},
  number       = {4},
  pages        = {189--193},
  year         = {1995},
  url          = {https://doi.org/10.1016/0020-0190(95)00104-K},
  doi          = {10.1016/0020-0190(95)00104-K},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Blundo95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BlundoMS95,
  author       = {Carlo Blundo and
                  Luiz A. Frota Mattos and
                  Douglas R. Stinson},
  title        = {Multiple Key Distribution Maintaining User Anonymity via Broadcast
                  Channels},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {309--322},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-3406},
  doi          = {10.3233/JCS-1994/1995-3406},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BlundoMS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BlundoSSV95,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Douglas R. Stinson and
                  Ugo Vaccaro},
  title        = {Graph Decompositions and Secret Sharing Schemes},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {1},
  pages        = {39--64},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00204801},
  doi          = {10.1007/BF00204801},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BlundoSSV95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BlundoSGV95,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Antonio Giorgio Gaggia and
                  Ugo Vaccaro},
  title        = {New bounds on the information rate of secret sharing schemes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {41},
  number       = {2},
  pages        = {549--554},
  year         = {1995},
  url          = {https://doi.org/10.1109/18.370169},
  doi          = {10.1109/18.370169},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/BlundoSGV95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/BlundoSPV95,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Giuseppe Persiano and
                  Ugo Vaccaro},
  editor       = {Zolt{\'{a}}n F{\"{u}}l{\"{o}}p and
                  Ferenc G{\'{e}}cseg},
  title        = {On the Number of Random Bits in Totally Private Computation},
  booktitle    = {Automata, Languages and Programming, 22nd International Colloquium,
                  ICALP95, Szeged, Hungary, July 10-14, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {944},
  pages        = {171--182},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60084-1\_72},
  doi          = {10.1007/3-540-60084-1\_72},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/BlundoSPV95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlundoSCGV94,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Giovanni Di Crescenzo and
                  Antonio Giorgio Gaggia and
                  Ugo Vaccaro},
  editor       = {Yvo Desmedt},
  title        = {Multi-Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {150--163},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_17},
  doi          = {10.1007/3-540-48658-5\_17},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlundoSCGV94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BlundoGS94,
  author       = {Carlo Blundo and
                  Antonio Giorgio Gaggia and
                  Douglas R. Stinson},
  editor       = {Alfredo De Santis},
  title        = {On the Dealer's Randomness Required in Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {35--46},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053422},
  doi          = {10.1007/BFB0053422},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BlundoGS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BlundoC94,
  author       = {Carlo Blundo and
                  Antonella Cresti},
  editor       = {Alfredo De Santis},
  title        = {Space Requirements for Broadcast Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {287--298},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053444},
  doi          = {10.1007/BFB0053444},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BlundoC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/BlundoSV94,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Ugo Vaccaro},
  editor       = {Serge Abiteboul and
                  Eli Shamir},
  title        = {Randomness in Distributed Protocols},
  booktitle    = {Automata, Languages and Programming, 21st International Colloquium,
                  ICALP94, Jerusalem, Israel, July 11-14, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {820},
  pages        = {568--579},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58201-0\_99},
  doi          = {10.1007/3-540-58201-0\_99},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/BlundoSV94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlundoCSV93,
  author       = {Carlo Blundo and
                  Antonella Cresti and
                  Alfredo De Santis and
                  Ugo Vaccaro},
  editor       = {Douglas R. Stinson},
  title        = {Fully Dynamic Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {110--125},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_10},
  doi          = {10.1007/3-540-48329-2\_10},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlundoCSV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fiwac/BlundoSGV93,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Luisa Gargano and
                  Ugo Vaccaro},
  editor       = {G{\'{e}}rard D. Cohen and
                  Simon Litsyn and
                  Antoine Lobstein and
                  Gilles Z{\'{e}}mor},
  title        = {Secret Sharing Schemes with Veto Capabilities},
  booktitle    = {Algebraic Coding, First French-Israeli Workshop, Paris, France, July
                  19-21, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {781},
  pages        = {82--89},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-57843-9\_11},
  doi          = {10.1007/3-540-57843-9\_11},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fiwac/BlundoSGV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/BlundoSV93,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Ugo Vaccaro},
  editor       = {Patrice Enjalbert and
                  Alain Finkel and
                  Klaus W. Wagner},
  title        = {Efficient Sharing of Many Secrets},
  booktitle    = {{STACS} 93, 10th Annual Symposium on Theoretical Aspects of Computer
                  Science, W{\"{u}}rzburg, Germany, February 25-27, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {665},
  pages        = {692--703},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-56503-5\_68},
  doi          = {10.1007/3-540-56503-5\_68},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/BlundoSV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlundoSGV92,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Luisa Gargano and
                  Ugo Vaccaro},
  editor       = {Ernest F. Brickell},
  title        = {On the Information Rate of Secret Sharing Schemes (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {148--167},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_11},
  doi          = {10.1007/3-540-48071-4\_11},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlundoSGV92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlundoSHKVY92,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Amir Herzberg and
                  Shay Kutten and
                  Ugo Vaccaro and
                  Moti Yung},
  editor       = {Ernest F. Brickell},
  title        = {Perfectly-Secure Key Distribution for Dynamic Conferences},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {471--486},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_33},
  doi          = {10.1007/3-540-48071-4\_33},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlundoSHKVY92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BlundoSSV92,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Douglas R. Stinson and
                  Ugo Vaccaro},
  editor       = {Rainer A. Rueppel},
  title        = {Graph Decompositions and Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Balatonf{\"{u}}red,
                  Hungary, May 24-28, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {658},
  pages        = {1--24},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-47555-9\_1},
  doi          = {10.1007/3-540-47555-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BlundoSSV92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics