Остановите войну!
for scientists:
default search action
Carlo Blundo
- > Home > Persons > Carlo Blundo
Publications
- 2010
- [j49]Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati:
Managing key hierarchies for access control enforcement: Heuristic approaches. Comput. Secur. 29(5): 533-547 (2010) - 2009
- [c42]Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati:
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. SEC 2009: 364-375 - 2007
- [j46]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson:
On Unconditionally Secure Distributed Oblivious Transfer. J. Cryptol. 20(3): 323-373 (2007) - 2006
- [j45]Carlo Blundo, Stelvio Cimato, Alfredo De Santis:
Visual cryptography schemes with optimal pixel expansion. Theor. Comput. Sci. 369(1-3): 169-182 (2006) - [j44]Carlo Blundo, Paolo D'Arco, Alfredo De Santis:
On Self-Healing Key Distribution Schemes. IEEE Trans. Inf. Theory 52(12): 5455-5467 (2006) - [i5]Carlo Blundo, Stelvio Cimato, Alfredo De Santis:
Visual Cryptography Schemes with Optimal Pixel Expansion. IACR Cryptol. ePrint Arch. 2006: 170 (2006) - 2004
- [j40]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Massimiliano Listo:
Design of Self-Healing Key Distribution Schemes. Des. Codes Cryptogr. 32(1-3): 15-44 (2004) - [j38]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi:
HYPPOCRATES: a new proactive password checker. J. Syst. Softw. 71(1-2): 163-175 (2004) - [c30]Carlo Blundo, Paolo D'Arco, Alfredo De Santis:
Definitions and Bounds for Self-Healing Key Distribution Schemes. ICALP 2004: 234-245 - 2003
- [j34]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson:
Contrast Optimal Threshold Visual Cryptography Schemes. SIAM J. Discret. Math. 16(2): 224-261 (2003) - 2002
- [c23]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi:
A Novel Approach to Proactive Password Checking. InfraSec 2002: 30-39 - [c22]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson:
New Results on Unconditionally Secure Distributed Oblivious Transfer. Selected Areas in Cryptography 2002: 291-309 - 2001
- [j30]Carlo Blundo, Annalisa De Bonis, Alfredo De Santis:
Improved Schemes for Visual Cryptography. Des. Codes Cryptogr. 24(3): 255-278 (2001) - [j28]Carlo Blundo, Paolo D'Arco, Alfredo De Santis:
A t-private k-database information retrieval scheme. Int. J. Inf. Sec. 1(1): 64-68 (2001) - [j27]Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson:
Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1-2): 143-161 (2001) - [c18]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi:
Hyppocrates. ISC 2001: 63-80 - 2000
- [j26]Carlo Blundo, Alfredo De Santis, Moni Naor:
Visual cryptography for grey level images. Inf. Process. Lett. 75(6): 255-259 (2000) - 1999
- [j25]Carlo Blundo, Alfredo De Santis, Giuseppe Persiano, Ugo Vaccaro:
Randomness Complexity of Private Computation. Comput. Complex. 8(2): 145-168 (1999) - [j23]Carlo Blundo, Alfredo De Santis, Antonio Giorgio Gaggia:
Probability of Shares in Secret Sharing Schemes. Inf. Process. Lett. 72(5-6): 169-175 (1999) - [j20]Carlo Blundo, Alfredo De Santis, Kaoru Kurosawa, Wakaha Ogata:
On a Fallacious Bound for Authentication Codes. J. Cryptol. 12(3): 155-159 (1999) - [j19]Carlo Blundo, Alfredo De Santis, Douglas R. Stinson:
On the Contrast in Visual Cryptography Schemes. J. Cryptol. 12(4): 261-289 (1999) - 1998
- [j17]Carlo Blundo, Alfredo De Santis:
Visual cryptography schemes with perfect reconstruction of black pixels. Comput. Graph. 22(4): 449-455 (1998) - [j16]Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung:
Perfectly Secure Key Distribution for Dynamic Conferences. Inf. Comput. 146(1): 1-23 (1998) - [j15]Carlo Blundo, Alfredo De Santis, Ugo Vaccaro:
On Secret Sharing Schemes. Inf. Process. Lett. 65(1): 25-32 (1998) - 1997
- [j12]Carlo Blundo, Alfredo De Santis, Roberto de Simone, Ugo Vaccaro:
Tight Bounds on the Information Rate of Secret Sharing Schemes. Des. Codes Cryptogr. 11(2): 107-122 (1997) - [j10]Carlo Blundo, Alfredo De Santis:
Lower Bounds for Robust Secret Sharing Schemes. Inf. Process. Lett. 63(6): 317-321 (1997) - 1996
- [j9]Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson:
Visual Cryptography for General Access Structures. Inf. Comput. 129(2): 86-106 (1996) - [j8]Carlo Blundo, Alfredo De Santis, Ugo Vaccaro:
Randomness in Distribution Protocols. Inf. Comput. 131(2): 111-139 (1996) - [j7]Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro:
On the Information Rate of Secret Sharing Schemes. Theor. Comput. Sci. 154(2): 283-306 (1996) - [j6]Carlo Blundo, Antonella Cresti, Alfredo De Santis, Ugo Vaccaro:
Fully Dynamic Secret Sharing Schemes. Theor. Comput. Sci. 165(2): 407-440 (1996) - [c12]Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson:
Constructions and Bounds for Visual Cryptography. ICALP 1996: 416-428 - [i2]Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson:
Visual Cryptography for General Access Structures. Electron. Colloquium Comput. Complex. TR96 (1996) - [i1]Carlo Blundo, Alfredo De Santis, Douglas R. Stinson:
On the Contrast in Visual Cryptography Schemes. IACR Cryptol. ePrint Arch. 1996: 13 (1996) - 1995
- [j2]Carlo Blundo, Alfredo De Santis, Douglas R. Stinson, Ugo Vaccaro:
Graph Decompositions and Secret Sharing Schemes. J. Cryptol. 8(1): 39-64 (1995) - [j1]Carlo Blundo, Alfredo De Santis, Antonio Giorgio Gaggia, Ugo Vaccaro:
New bounds on the information rate of secret sharing schemes. IEEE Trans. Inf. Theory 41(2): 549-554 (1995) - [c11]Carlo Blundo, Alfredo De Santis, Giuseppe Persiano, Ugo Vaccaro:
On the Number of Random Bits in Totally Private Computation. ICALP 1995: 171-182 - 1994
- [c10]Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia, Ugo Vaccaro:
Multi-Secret Sharing Schemes. CRYPTO 1994: 150-163 - [c7]Carlo Blundo, Alfredo De Santis, Ugo Vaccaro:
Randomness in Distributed Protocols. ICALP 1994: 568-579 - 1993
- [c6]Carlo Blundo, Antonella Cresti, Alfredo De Santis, Ugo Vaccaro:
Fully Dynamic Secret Sharing Schemes. CRYPTO 1993: 110-125 - [c5]Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro:
Secret Sharing Schemes with Veto Capabilities. Algebraic Coding 1993: 82-89 - [c4]Carlo Blundo, Alfredo De Santis, Ugo Vaccaro:
Efficient Sharing of Many Secrets. STACS 1993: 692-703 - 1992
- [c3]Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro:
On the Information Rate of Secret Sharing Schemes (Extended Abstract). CRYPTO 1992: 148-167 - [c2]Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung:
Perfectly-Secure Key Distribution for Dynamic Conferences. CRYPTO 1992: 471-486 - [c1]Carlo Blundo, Alfredo De Santis, Douglas R. Stinson, Ugo Vaccaro:
Graph Decompositions and Secret Sharing Schemes. EUROCRYPT 1992: 1-24
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-11-10 23:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint