2008 |
87 | EE | Carlo Blundo,
Giuseppe Persiano,
Ahmad-Reza Sadeghi,
Ivan Visconti:
Improved Security Notions and Protocols for Non-transferable Identification.
ESORICS 2008: 364-378 |
86 | EE | Carlo Blundo,
Emiliano De Cristofaro,
Aniello Del Sorbo,
Clemente Galdi,
Giuseppe Persiano:
A Distributed Implementation of the Certified Information Access Service.
ESORICS 2008: 396-410 |
2007 |
85 | EE | Vincenzo Auletta,
Carlo Blundo,
Emiliano De Cristofaro:
A J2ME transparent middleware to support HTTP connections over Bluetooth.
ICSNC 2007: 3 |
84 | EE | Carlo Blundo,
Emiliano De Cristofaro:
A Bluetooth-Based JXME Infrastructure.
OTM Conferences (1) 2007: 667-682 |
83 | EE | Carlo Blundo,
Clemente Galdi,
Giuseppe Persiano:
Low-randomness constant-round private XOR computations.
Int. J. Inf. Sec. 6(1): 15-26 (2007) |
82 | EE | Carlo Blundo,
Paolo D'Arco,
Alfredo De Santis,
Douglas R. Stinson:
On Unconditionally Secure Distributed Oblivious Transfer.
J. Cryptology 20(3): 323-373 (2007) |
2006 |
81 | EE | Vincenzo Auletta,
Carlo Blundo,
Emiliano De Cristofaro,
Guerriero Raimato:
A Lightweight Framework forWeb Services Invocation over Bluetooth.
ICWS 2006: 331-338 |
80 | EE | Vincenzo Auletta,
Carlo Blundo,
Stelvio Cimato,
Guerriero Raimato:
A Web Service Based Micro-payment System.
ISCC 2006: 328-333 |
79 | EE | Vincenzo Auletta,
Carlo Blundo,
Emiliano De Cristofaro,
Guerriero Raimato:
Performance evaluation of web services invocation over Bluetooth.
PM2HW2N 2006: 1-8 |
78 | EE | Carlo Blundo,
Paolo D'Arco,
Alfredo De Santis:
On Self-Healing Key Distribution Schemes.
IEEE Transactions on Information Theory 52(12): 5455-5467 (2006) |
77 | EE | Carlo Blundo,
Stelvio Cimato,
Alfredo De Santis:
Visual cryptography schemes with optimal pixel expansion.
Theor. Comput. Sci. 369(1-3): 169-182 (2006) |
2005 |
76 | | Carlo Blundo,
Stelvio Cimato:
Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers
Springer 2005 |
75 | EE | Carlo Blundo,
Stelvio Cimato,
Roberto De Prisco:
A Lightweight Approach to Authenticated Web Caching.
SAINT 2005: 157-163 |
74 | EE | Carlo Blundo,
Stelvio Cimato,
Annalisa De Bonis:
Secure E-Coupons.
Electronic Commerce Research 5(1): 117-139 (2005) |
73 | EE | Carlo Blundo,
Paolo D'Arco:
Analysis and Design of Distributed Key Distribution Centers.
J. Cryptology 18(4): 391-414 (2005) |
2004 |
72 | EE | Carlo Blundo,
Stelvio Cimato:
A Framework for Authenticated Web Services.
ECOWS 2004: 61-71 |
71 | EE | Carlo Blundo,
Paolo D'Arco,
Alfredo De Santis:
Definitions and Bounds for Self-Healing Key Distribution Schemes.
ICALP 2004: 234-245 |
70 | EE | Carlo Blundo,
Stelvio Cimato:
A Platform for Secure E-Gambling.
ITCC (2) 2004: 768-772 |
69 | EE | Carlo Blundo,
Paolo D'Arco,
Alfredo De Santis,
Massimiliano Listo:
Design of Self-Healing Key Distribution Schemes.
Des. Codes Cryptography 32(1-3): 15-44 (2004) |
68 | EE | Carlo Blundo,
Sebastià Martín Molleví,
Barbara Masucci,
Carles Padró:
A Linear Algebraic Approach to Metering Schemes.
Des. Codes Cryptography 33(3): 241-260 (2004) |
67 | EE | Carlo Blundo,
Stelvio Cimato,
Roberto De Prisco,
Anna Lisa Ferrara:
Modeling A Certified Email Protocol using I/O Automata.
Electr. Notes Theor. Comput. Sci. 99: 339-359 (2004) |
66 | EE | Carlo Blundo,
Stelvio Cimato:
A Software Infrastructure for Authenticated Web Metering.
IEEE Computer 37(4): 28-33 (2004) |
65 | EE | Carlo Blundo,
Paolo D'Arco,
Alfredo De Santis,
Clemente Galdi:
HYPPOCRATES: a new proactive password checker.
Journal of Systems and Software 71(1-2): 163-175 (2004) |
64 | EE | Carlo Blundo,
Paolo D'Arco,
Vanesa Daza,
Carles Padró:
Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures.
Theor. Comput. Sci. 320(2-3): 269-291 (2004) |
2003 |
63 | | Carlo Blundo,
Cosimo Laneve:
Theoretical Computer Science, 8th Italian Conference, ICTCS 2003, Bertinoro, Italy, October 13-15, 2003, Proceedings
Springer 2003 |
62 | EE | Carlo Blundo,
Paolo D'Arco,
Massimiliano Listo:
A New Self-Healing Key Distribution Scheme.
ISCC 2003: 803-808 |
61 | EE | Carlo Blundo,
Stelvio Cimato,
Roberto De Prisco:
Certified Email: Design and Implementation of a New Optimistic Protocol..
ISCC 2003: 828-833 |
60 | EE | Carlo Blundo,
Clemente Galdi:
Hiding Information in Image Mosaics.
Comput. J. 46(2): 202-212 (2003) |
59 | EE | Carlo Blundo,
Paolo D'Arco,
Carles Padró:
A Ramp Model for Distributed Key Distribution Schemes.
Discrete Applied Mathematics 128(1): 47-64 (2003) |
58 | EE | Carlo Blundo,
Paolo D'Arco,
Alfredo De Santis,
Douglas R. Stinson:
Contrast Optimal Threshold Visual Cryptography Schemes.
SIAM J. Discrete Math. 16(2): 224-261 (2003) |
2002 |
57 | EE | Carlo Blundo,
Paolo D'Arco:
The Key Establishment Problem.
FOSAD 2002: 44-90 |
56 | EE | Carlo Blundo,
Paolo D'Arco,
Alfredo De Santis,
Clemente Galdi:
A Novel Approach to Proactive Password Checking.
InfraSec 2002: 30-39 |
55 | EE | Carlo Blundo,
Stelvio Cimato:
SAWM: a tool for secure and authenticated web metering.
SEKE 2002: 641-648 |
54 | EE | Carlo Blundo,
Paolo D'Arco,
Alfredo De Santis,
Douglas R. Stinson:
New Results on Unconditionally Secure Distributed Oblivious Transfer.
Selected Areas in Cryptography 2002: 291-309 |
53 | EE | Carlo Blundo,
Stelvio Cimato,
Annalisa De Bonis:
A lightweight protocol for the generation and distribution of secure e-coupons.
WWW 2002: 542-552 |
52 | | Carlo Blundo,
Barbara Masucci,
Douglas R. Stinson,
Ruizhong Wei:
Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes.
Des. Codes Cryptography 26(1-3): 97-110 (2002) |
51 | EE | Carlo Blundo,
Stelvio Cimato,
Barbara Masucci:
A note on optimal metering schemes.
Inf. Process. Lett. 84(6): 319-326 (2002) |
2001 |
50 | EE | Carlo Blundo,
Paolo D'Arco,
Vanesa Daza,
Carles Padró:
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures.
ISC 2001: 1-17 |
49 | EE | Carlo Blundo,
Paolo D'Arco,
Alfredo De Santis,
Clemente Galdi:
Hyppocrates.
ISC 2001: 63-80 |
48 | | Carlo Blundo,
Annalisa De Bonis,
Alfredo De Santis:
Improved Schemes for Visual Cryptography.
Des. Codes Cryptography 24(3): 255-278 (2001) |
47 | EE | Carlo Blundo,
Paolo D'Arco,
Carles Padró:
A Ramp Model for Distributed Key Distribution Schemes.
Electronic Notes in Discrete Mathematics 6: 45-54 (2001) |
46 | EE | Carlo Blundo,
Paolo D'Arco,
Alfredo De Santis:
A t-private k-database information retrieval scheme.
Int. J. Inf. Sec. 1(1): 64-68 (2001) |
45 | EE | Giuseppe Ateniese,
Carlo Blundo,
Alfredo De Santis,
Douglas R. Stinson:
Extended capabilities for visual cryptography.
Theor. Comput. Sci. 250(1-2): 143-161 (2001) |
2000 |
44 | EE | Carlo Blundo,
Annalisa De Bonis,
Barbara Masucci:
Metering Schemes with Pricing.
DISC 2000: 194-208 |
43 | EE | Carlo Blundo,
Clemente Galdi:
Steganography Using Modern Arts.
IFIP TCS 2000: 140-151 |
42 | EE | Carlo Blundo,
Annalisa De Bonis,
Barbara Masucci,
Douglas R. Stinson:
Dynamic Multi-threshold Metering Schemes.
Selected Areas in Cryptography 2000: 130-143 |
41 | EE | Carlo Blundo,
Alfredo De Santis,
Moni Naor:
Visual cryptography for grey level images.
Inf. Process. Lett. 75(6): 255-259 (2000) |
1999 |
40 | EE | Carlo Blundo,
Clemente Galdi,
Pino Persiano:
Randomness Recycling in Constant-Round Private Computations (extended Abstract).
DISC 1999: 138-150 |
39 | | Carlo Blundo,
Paolo D'Arco,
Antonio Giorgio Gaggia:
A tau-Restricted Key Agreement Scheme.
Comput. J. 42(1): 51-61 (1999) |
38 | | Carlo Blundo,
Alfredo De Santis,
Giuseppe Persiano,
Ugo Vaccaro:
Randomness Complexity of Private Computation.
Computational Complexity 8(2): 145-168 (1999) |
37 | EE | Carlo Blundo,
Alfredo De Santis,
Antonio Giorgio Gaggia:
Probability of Shares in Secret Sharing Schemes.
Inf. Process. Lett. 72(5-6): 169-175 (1999) |
36 | | Carlo Blundo,
Antonella Cresti:
Unconditional Secure Conference Key Distribution Schemes with Disenrollment Capability.
Inf. Sci. 120(1-4): 113-130 (1999) |
35 | EE | Carlo Blundo,
Alfredo De Santis,
Kaoru Kurosawa,
Wakaha Ogata:
On a Fallacious Bound for Authentication Codes.
J. Cryptology 12(3): 155-159 (1999) |
34 | EE | Carlo Blundo,
Alfredo De Santis,
Douglas R. Stinson:
On the Contrast in Visual Cryptography Schemes.
J. Cryptology 12(4): 261-289 (1999) |
33 | EE | Carlo Blundo,
Barbara Masucci:
Randomness in Multi-Secret Sharing Schemes.
J. UCS 5(7): 367-389 (1999) |
32 | | Carlo Blundo,
Barbara Masucci:
A Note on the Randomness in Dynamic Threshold Schemes.
Journal of Computer Security 7(1): 73-85 (1999) |
1998 |
31 | EE | Carlo Blundo,
Alfredo De Santis:
Visual cryptography schemes with perfect reconstruction of black pixels.
Computers & Graphics 22(4): 449-455 (1998) |
30 | | Carlo Blundo,
Alfredo De Santis,
Amir Herzberg,
Shay Kutten,
Ugo Vaccaro,
Moti Yung:
Perfectly Secure Key Distribution for Dynamic Conferences.
Inf. Comput. 146(1): 1-23 (1998) |
29 | EE | Carlo Blundo,
Alfredo De Santis,
Ugo Vaccaro:
On Secret Sharing Schemes.
Inf. Process. Lett. 65(1): 25-32 (1998) |
28 | EE | Carlo Blundo,
Luiz A. Frota Mattos,
Douglas R. Stinson:
Generalized Beimel-Chor Schemes for Broadcast Encryption and Interactive Key Distribution.
Theor. Comput. Sci. 200(1-2): 313-334 (1998) |
1997 |
27 | EE | Carlo Blundo,
Alfredo De Santis,
Roberto De Simone,
Ugo Vaccaro:
Tight Bounds on the Information Rate of Secret Sharing Schemes.
Des. Codes Cryptography 11(2): 107-122 (1997) |
26 | | Carlo Blundo,
Antonio Giorgio Gaggia,
Douglas R. Stinson:
On the Dealer's Randomness Required in Secret Sharing Schemes.
Des. Codes Cryptography 11(3): 235-259 (1997) |
25 | EE | Carlo Blundo,
Douglas R. Stinson:
Anonymous Secret Sharing Schemes.
Discrete Applied Mathematics 77(1): 13-28 (1997) |
24 | EE | Carlo Blundo,
Alfredo De Santis:
Lower Bounds for Robust Secret Sharing Schemes.
Inf. Process. Lett. 63(6): 317-321 (1997) |
1996 |
23 | EE | Carlo Blundo,
Luiz A. Frota Mattos,
Douglas R. Stinson:
Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution.
CRYPTO 1996: 387-400 |
22 | | Giuseppe Ateniese,
Carlo Blundo,
Alfredo De Santis,
Douglas R. Stinson:
Constructions and Bounds for Visual Cryptography.
ICALP 1996: 416-428 |
21 | EE | Giuseppe Ateniese,
Carlo Blundo,
Alfredo De Santis,
Douglas R. Stinson:
Visual Cryptography for General Access Structures
Electronic Colloquium on Computational Complexity (ECCC) 3(12): (1996) |
20 | | Carlo Blundo,
Roberto De Prisco:
New bounds on the expected length of one-to-one codes.
IEEE Transactions on Information Theory 42(1): 246-250 (1996) |
19 | | Giuseppe Ateniese,
Carlo Blundo,
Alfredo De Santis,
Douglas R. Stinson:
Visual Cryptography for General Access Structures.
Inf. Comput. 129(2): 86-106 (1996) |
18 | | Carlo Blundo,
Alfredo De Santis,
Ugo Vaccaro:
Randomness in Distribution Protocols.
Inf. Comput. 131(2): 111-139 (1996) |
17 | EE | Carlo Blundo,
Alfredo De Santis,
Luisa Gargano,
Ugo Vaccaro:
On the Information Rate of Secret Sharing Schemes.
Theor. Comput. Sci. 154(2): 283-306 (1996) |
16 | EE | Carlo Blundo,
Antonella Cresti,
Alfredo De Santis,
Ugo Vaccaro:
Fully Dynamic Secret Sharing Schemes.
Theor. Comput. Sci. 165(2): 407-440 (1996) |
1995 |
15 | | Carlo Blundo,
Alfredo De Santis,
Giuseppe Persiano,
Ugo Vaccaro:
On the Number of Random Bits in Totally Private Computation.
ICALP 1995: 171-182 |
14 | | Carlo Blundo,
Alfredo De Santis,
Antonio Giorgio Gaggia,
Ugo Vaccaro:
New bounds on the information rate of secret sharing schemes.
IEEE Transactions on Information Theory 41(2): 549-554 (1995) |
13 | EE | Carlo Blundo:
A Note on Dynamic Threshold Schemes.
Inf. Process. Lett. 55(4): 189-193 (1995) |
12 | | Carlo Blundo,
Alfredo De Santis,
Douglas R. Stinson,
Ugo Vaccaro:
Graph Decompositions and Secret Sharing Schemes.
J. Cryptology 8(1): 39-64 (1995) |
11 | | Carlo Blundo,
Luiz A. Frota Mattos,
Douglas R. Stinson:
Multiple Key Distribution Maintaining User Anonymity via Broadcast Channels.
Journal of Computer Security 3(4): 309-322 (1995) |
1994 |
10 | EE | Carlo Blundo,
Alfredo De Santis,
Giovanni Di Crescenzo,
Antonio Giorgio Gaggia,
Ugo Vaccaro:
Multi-Secret Sharing Schemes.
CRYPTO 1994: 150-163 |
9 | EE | Carlo Blundo,
Antonella Cresti:
Space Requirements for Broadcast Encryption.
EUROCRYPT 1994: 287-298 |
8 | EE | Carlo Blundo,
Antonio Giorgio Gaggia,
Douglas R. Stinson:
On the Dealer's Randomness Required in Secret Sharing Schemes.
EUROCRYPT 1994: 35-46 |
7 | | Carlo Blundo,
Alfredo De Santis,
Ugo Vaccaro:
Randomness in Distributed Protocols.
ICALP 1994: 568-579 |
1993 |
6 | | Carlo Blundo,
Alfredo De Santis,
Luisa Gargano,
Ugo Vaccaro:
Secret Sharing Schemes with Veto Capabilities.
Algebraic Coding 1993: 82-89 |
5 | EE | Carlo Blundo,
Antonella Cresti,
Alfredo De Santis,
Ugo Vaccaro:
Fully Dynamic Secret Sharing Schemes.
CRYPTO 1993: 110-125 |
4 | | Carlo Blundo,
Alfredo De Santis,
Ugo Vaccaro:
Efficient Sharing of Many Secrets.
STACS 1993: 692-703 |
1992 |
3 | EE | Carlo Blundo,
Alfredo De Santis,
Luisa Gargano,
Ugo Vaccaro:
On the Information Rate of Secret Sharing Schemes (Extended Abstract).
CRYPTO 1992: 148-167 |
2 | EE | Carlo Blundo,
Alfredo De Santis,
Amir Herzberg,
Shay Kutten,
Ugo Vaccaro,
Moti Yung:
Perfectly-Secure Key Distribution for Dynamic Conferences.
CRYPTO 1992: 471-486 |
1 | EE | Carlo Blundo,
Alfredo De Santis,
Douglas R. Stinson,
Ugo Vaccaro:
Graph Decompositions and Secret Sharing Schemes.
EUROCRYPT 1992: 1-24 |