dblp.uni-trier.dewww.uni-trier.de

Carlo Blundo

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
87EECarlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadeghi, Ivan Visconti: Improved Security Notions and Protocols for Non-transferable Identification. ESORICS 2008: 364-378
86EECarlo Blundo, Emiliano De Cristofaro, Aniello Del Sorbo, Clemente Galdi, Giuseppe Persiano: A Distributed Implementation of the Certified Information Access Service. ESORICS 2008: 396-410
2007
85EEVincenzo Auletta, Carlo Blundo, Emiliano De Cristofaro: A J2ME transparent middleware to support HTTP connections over Bluetooth. ICSNC 2007: 3
84EECarlo Blundo, Emiliano De Cristofaro: A Bluetooth-Based JXME Infrastructure. OTM Conferences (1) 2007: 667-682
83EECarlo Blundo, Clemente Galdi, Giuseppe Persiano: Low-randomness constant-round private XOR computations. Int. J. Inf. Sec. 6(1): 15-26 (2007)
82EECarlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson: On Unconditionally Secure Distributed Oblivious Transfer. J. Cryptology 20(3): 323-373 (2007)
2006
81EEVincenzo Auletta, Carlo Blundo, Emiliano De Cristofaro, Guerriero Raimato: A Lightweight Framework forWeb Services Invocation over Bluetooth. ICWS 2006: 331-338
80EEVincenzo Auletta, Carlo Blundo, Stelvio Cimato, Guerriero Raimato: A Web Service Based Micro-payment System. ISCC 2006: 328-333
79EEVincenzo Auletta, Carlo Blundo, Emiliano De Cristofaro, Guerriero Raimato: Performance evaluation of web services invocation over Bluetooth. PM2HW2N 2006: 1-8
78EECarlo Blundo, Paolo D'Arco, Alfredo De Santis: On Self-Healing Key Distribution Schemes. IEEE Transactions on Information Theory 52(12): 5455-5467 (2006)
77EECarlo Blundo, Stelvio Cimato, Alfredo De Santis: Visual cryptography schemes with optimal pixel expansion. Theor. Comput. Sci. 369(1-3): 169-182 (2006)
2005
76 Carlo Blundo, Stelvio Cimato: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers Springer 2005
75EECarlo Blundo, Stelvio Cimato, Roberto De Prisco: A Lightweight Approach to Authenticated Web Caching. SAINT 2005: 157-163
74EECarlo Blundo, Stelvio Cimato, Annalisa De Bonis: Secure E-Coupons. Electronic Commerce Research 5(1): 117-139 (2005)
73EECarlo Blundo, Paolo D'Arco: Analysis and Design of Distributed Key Distribution Centers. J. Cryptology 18(4): 391-414 (2005)
2004
72EECarlo Blundo, Stelvio Cimato: A Framework for Authenticated Web Services. ECOWS 2004: 61-71
71EECarlo Blundo, Paolo D'Arco, Alfredo De Santis: Definitions and Bounds for Self-Healing Key Distribution Schemes. ICALP 2004: 234-245
70EECarlo Blundo, Stelvio Cimato: A Platform for Secure E-Gambling. ITCC (2) 2004: 768-772
69EECarlo Blundo, Paolo D'Arco, Alfredo De Santis, Massimiliano Listo: Design of Self-Healing Key Distribution Schemes. Des. Codes Cryptography 32(1-3): 15-44 (2004)
68EECarlo Blundo, Sebastià Martín Molleví, Barbara Masucci, Carles Padró: A Linear Algebraic Approach to Metering Schemes. Des. Codes Cryptography 33(3): 241-260 (2004)
67EECarlo Blundo, Stelvio Cimato, Roberto De Prisco, Anna Lisa Ferrara: Modeling A Certified Email Protocol using I/O Automata. Electr. Notes Theor. Comput. Sci. 99: 339-359 (2004)
66EECarlo Blundo, Stelvio Cimato: A Software Infrastructure for Authenticated Web Metering. IEEE Computer 37(4): 28-33 (2004)
65EECarlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi: HYPPOCRATES: a new proactive password checker. Journal of Systems and Software 71(1-2): 163-175 (2004)
64EECarlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró: Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures. Theor. Comput. Sci. 320(2-3): 269-291 (2004)
2003
63 Carlo Blundo, Cosimo Laneve: Theoretical Computer Science, 8th Italian Conference, ICTCS 2003, Bertinoro, Italy, October 13-15, 2003, Proceedings Springer 2003
62EECarlo Blundo, Paolo D'Arco, Massimiliano Listo: A New Self-Healing Key Distribution Scheme. ISCC 2003: 803-808
61EECarlo Blundo, Stelvio Cimato, Roberto De Prisco: Certified Email: Design and Implementation of a New Optimistic Protocol.. ISCC 2003: 828-833
60EECarlo Blundo, Clemente Galdi: Hiding Information in Image Mosaics. Comput. J. 46(2): 202-212 (2003)
59EECarlo Blundo, Paolo D'Arco, Carles Padró: A Ramp Model for Distributed Key Distribution Schemes. Discrete Applied Mathematics 128(1): 47-64 (2003)
58EECarlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson: Contrast Optimal Threshold Visual Cryptography Schemes. SIAM J. Discrete Math. 16(2): 224-261 (2003)
2002
57EECarlo Blundo, Paolo D'Arco: The Key Establishment Problem. FOSAD 2002: 44-90
56EECarlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi: A Novel Approach to Proactive Password Checking. InfraSec 2002: 30-39
55EECarlo Blundo, Stelvio Cimato: SAWM: a tool for secure and authenticated web metering. SEKE 2002: 641-648
54EECarlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson: New Results on Unconditionally Secure Distributed Oblivious Transfer. Selected Areas in Cryptography 2002: 291-309
53EECarlo Blundo, Stelvio Cimato, Annalisa De Bonis: A lightweight protocol for the generation and distribution of secure e-coupons. WWW 2002: 542-552
52 Carlo Blundo, Barbara Masucci, Douglas R. Stinson, Ruizhong Wei: Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes. Des. Codes Cryptography 26(1-3): 97-110 (2002)
51EECarlo Blundo, Stelvio Cimato, Barbara Masucci: A note on optimal metering schemes. Inf. Process. Lett. 84(6): 319-326 (2002)
2001
50EECarlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró: Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. ISC 2001: 1-17
49EECarlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi: Hyppocrates. ISC 2001: 63-80
48 Carlo Blundo, Annalisa De Bonis, Alfredo De Santis: Improved Schemes for Visual Cryptography. Des. Codes Cryptography 24(3): 255-278 (2001)
47EECarlo Blundo, Paolo D'Arco, Carles Padró: A Ramp Model for Distributed Key Distribution Schemes. Electronic Notes in Discrete Mathematics 6: 45-54 (2001)
46EECarlo Blundo, Paolo D'Arco, Alfredo De Santis: A t-private k-database information retrieval scheme. Int. J. Inf. Sec. 1(1): 64-68 (2001)
45EEGiuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1-2): 143-161 (2001)
2000
44EECarlo Blundo, Annalisa De Bonis, Barbara Masucci: Metering Schemes with Pricing. DISC 2000: 194-208
43EECarlo Blundo, Clemente Galdi: Steganography Using Modern Arts. IFIP TCS 2000: 140-151
42EECarlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson: Dynamic Multi-threshold Metering Schemes. Selected Areas in Cryptography 2000: 130-143
41EECarlo Blundo, Alfredo De Santis, Moni Naor: Visual cryptography for grey level images. Inf. Process. Lett. 75(6): 255-259 (2000)
1999
40EECarlo Blundo, Clemente Galdi, Pino Persiano: Randomness Recycling in Constant-Round Private Computations (extended Abstract). DISC 1999: 138-150
39 Carlo Blundo, Paolo D'Arco, Antonio Giorgio Gaggia: A tau-Restricted Key Agreement Scheme. Comput. J. 42(1): 51-61 (1999)
38 Carlo Blundo, Alfredo De Santis, Giuseppe Persiano, Ugo Vaccaro: Randomness Complexity of Private Computation. Computational Complexity 8(2): 145-168 (1999)
37EECarlo Blundo, Alfredo De Santis, Antonio Giorgio Gaggia: Probability of Shares in Secret Sharing Schemes. Inf. Process. Lett. 72(5-6): 169-175 (1999)
36 Carlo Blundo, Antonella Cresti: Unconditional Secure Conference Key Distribution Schemes with Disenrollment Capability. Inf. Sci. 120(1-4): 113-130 (1999)
35EECarlo Blundo, Alfredo De Santis, Kaoru Kurosawa, Wakaha Ogata: On a Fallacious Bound for Authentication Codes. J. Cryptology 12(3): 155-159 (1999)
34EECarlo Blundo, Alfredo De Santis, Douglas R. Stinson: On the Contrast in Visual Cryptography Schemes. J. Cryptology 12(4): 261-289 (1999)
33EECarlo Blundo, Barbara Masucci: Randomness in Multi-Secret Sharing Schemes. J. UCS 5(7): 367-389 (1999)
32 Carlo Blundo, Barbara Masucci: A Note on the Randomness in Dynamic Threshold Schemes. Journal of Computer Security 7(1): 73-85 (1999)
1998
31EECarlo Blundo, Alfredo De Santis: Visual cryptography schemes with perfect reconstruction of black pixels. Computers & Graphics 22(4): 449-455 (1998)
30 Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung: Perfectly Secure Key Distribution for Dynamic Conferences. Inf. Comput. 146(1): 1-23 (1998)
29EECarlo Blundo, Alfredo De Santis, Ugo Vaccaro: On Secret Sharing Schemes. Inf. Process. Lett. 65(1): 25-32 (1998)
28EECarlo Blundo, Luiz A. Frota Mattos, Douglas R. Stinson: Generalized Beimel-Chor Schemes for Broadcast Encryption and Interactive Key Distribution. Theor. Comput. Sci. 200(1-2): 313-334 (1998)
1997
27EECarlo Blundo, Alfredo De Santis, Roberto De Simone, Ugo Vaccaro: Tight Bounds on the Information Rate of Secret Sharing Schemes. Des. Codes Cryptography 11(2): 107-122 (1997)
26 Carlo Blundo, Antonio Giorgio Gaggia, Douglas R. Stinson: On the Dealer's Randomness Required in Secret Sharing Schemes. Des. Codes Cryptography 11(3): 235-259 (1997)
25EECarlo Blundo, Douglas R. Stinson: Anonymous Secret Sharing Schemes. Discrete Applied Mathematics 77(1): 13-28 (1997)
24EECarlo Blundo, Alfredo De Santis: Lower Bounds for Robust Secret Sharing Schemes. Inf. Process. Lett. 63(6): 317-321 (1997)
1996
23EECarlo Blundo, Luiz A. Frota Mattos, Douglas R. Stinson: Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution. CRYPTO 1996: 387-400
22 Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson: Constructions and Bounds for Visual Cryptography. ICALP 1996: 416-428
21EEGiuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson: Visual Cryptography for General Access Structures Electronic Colloquium on Computational Complexity (ECCC) 3(12): (1996)
20 Carlo Blundo, Roberto De Prisco: New bounds on the expected length of one-to-one codes. IEEE Transactions on Information Theory 42(1): 246-250 (1996)
19 Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson: Visual Cryptography for General Access Structures. Inf. Comput. 129(2): 86-106 (1996)
18 Carlo Blundo, Alfredo De Santis, Ugo Vaccaro: Randomness in Distribution Protocols. Inf. Comput. 131(2): 111-139 (1996)
17EECarlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro: On the Information Rate of Secret Sharing Schemes. Theor. Comput. Sci. 154(2): 283-306 (1996)
16EECarlo Blundo, Antonella Cresti, Alfredo De Santis, Ugo Vaccaro: Fully Dynamic Secret Sharing Schemes. Theor. Comput. Sci. 165(2): 407-440 (1996)
1995
15 Carlo Blundo, Alfredo De Santis, Giuseppe Persiano, Ugo Vaccaro: On the Number of Random Bits in Totally Private Computation. ICALP 1995: 171-182
14 Carlo Blundo, Alfredo De Santis, Antonio Giorgio Gaggia, Ugo Vaccaro: New bounds on the information rate of secret sharing schemes. IEEE Transactions on Information Theory 41(2): 549-554 (1995)
13EECarlo Blundo: A Note on Dynamic Threshold Schemes. Inf. Process. Lett. 55(4): 189-193 (1995)
12 Carlo Blundo, Alfredo De Santis, Douglas R. Stinson, Ugo Vaccaro: Graph Decompositions and Secret Sharing Schemes. J. Cryptology 8(1): 39-64 (1995)
11 Carlo Blundo, Luiz A. Frota Mattos, Douglas R. Stinson: Multiple Key Distribution Maintaining User Anonymity via Broadcast Channels. Journal of Computer Security 3(4): 309-322 (1995)
1994
10EECarlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia, Ugo Vaccaro: Multi-Secret Sharing Schemes. CRYPTO 1994: 150-163
9EECarlo Blundo, Antonella Cresti: Space Requirements for Broadcast Encryption. EUROCRYPT 1994: 287-298
8EECarlo Blundo, Antonio Giorgio Gaggia, Douglas R. Stinson: On the Dealer's Randomness Required in Secret Sharing Schemes. EUROCRYPT 1994: 35-46
7 Carlo Blundo, Alfredo De Santis, Ugo Vaccaro: Randomness in Distributed Protocols. ICALP 1994: 568-579
1993
6 Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro: Secret Sharing Schemes with Veto Capabilities. Algebraic Coding 1993: 82-89
5EECarlo Blundo, Antonella Cresti, Alfredo De Santis, Ugo Vaccaro: Fully Dynamic Secret Sharing Schemes. CRYPTO 1993: 110-125
4 Carlo Blundo, Alfredo De Santis, Ugo Vaccaro: Efficient Sharing of Many Secrets. STACS 1993: 692-703
1992
3EECarlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro: On the Information Rate of Secret Sharing Schemes (Extended Abstract). CRYPTO 1992: 148-167
2EECarlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung: Perfectly-Secure Key Distribution for Dynamic Conferences. CRYPTO 1992: 471-486
1EECarlo Blundo, Alfredo De Santis, Douglas R. Stinson, Ugo Vaccaro: Graph Decompositions and Secret Sharing Schemes. EUROCRYPT 1992: 1-24

Coauthor Index

1Giuseppe Ateniese [19] [21] [22] [45]
2Vincenzo Auletta [79] [80] [81] [85]
3Annalisa De Bonis [42] [44] [48] [53] [74]
4Stelvio Cimato [51] [53] [55] [61] [66] [67] [70] [72] [74] [75] [76] [77] [80]
5Giovanni Di Crescenzo [10]
6Antonella Cresti [5] [9] [16] [36]
7Emiliano De Cristofaro [79] [81] [84] [85] [86]
8Paolo D'Arco [39] [46] [47] [49] [50] [54] [56] [57] [58] [59] [62] [64] [65] [69] [71] [73] [78] [82]
9Vanesa Daza [50] [64]
10Anna Lisa Ferrara [67]
11Antonio Giorgio Gaggia [8] [10] [14] [26] [37] [39]
12Clemente Galdi [40] [43] [49] [56] [60] [65] [83] [86]
13Luisa Gargano [3] [6] [17]
14Amir Herzberg [2] [30]
15Kaoru Kurosawa [35]
16Shay Kutten [2] [30]
17Cosimo Laneve [63]
18Massimiliano Listo [62] [69]
19Barbara Masucci [32] [33] [42] [44] [51] [52] [68]
20Luiz A. Frota Mattos [11] [23] [28]
21Sebastià Martín Molleví [68]
22Moni Naor [41]
23Wakaha Ogata [35]
24Carles Padró [47] [50] [59] [64] [68]
25Giuseppe Persiano (Pino Persiano) [15] [38] [40] [83] [86] [87]
26Roberto De Prisco [20] [61] [67] [75]
27Guerriero Raimato [79] [80] [81]
28Ahmad-Reza Sadeghi [87]
29Alfredo De Santis [1] [2] [3] [4] [5] [6] [7] [10] [12] [14] [15] [16] [17] [18] [19] [21] [22] [24] [27] [29] [30] [31] [34] [35] [37] [38] [41] [45] [46] [48] [49] [54] [56] [58] [65] [69] [71] [77] [78] [82]
30Roberto De Simone [27]
31Aniello Del Sorbo [86]
32Douglas R. Stinson [1] [8] [11] [12] [19] [21] [22] [23] [25] [26] [28] [34] [42] [45] [52] [54] [58] [82]
33Ugo Vaccaro [1] [2] [3] [4] [5] [6] [7] [10] [12] [14] [15] [16] [17] [18] [27] [29] [30] [38]
34Ivan Visconti [87]
35Ruizhong Wei [52]
36Moti Yung (Mordechai M. Yung) [2] [30]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)