Carlo Blundo
Carlo Blundo
Professor of Computer Science, UniversitÓ di Salerno
Geverifieerd e-mailadres voor unisa.it
Titel
Geciteerd door
Geciteerd door
Jaar
Perfectly-secure key distribution for dynamic conferences
C Blundo, A De Santis, A Herzberg, S Kutten, U Vaccaro, M Yung
Annual international cryptology conference, 471-486, 1992
14351992
Visual cryptography for general access structures
G Ateniese, C Blundo, A De Santis, DR Stinson
Information and computation 129 (2), 86-106, 1996
8801996
Extended capabilities for visual cryptography
G Ateniese, C Blundo, A De Santis, DR Stinson
Theoretical Computer Science 250 (1-2), 143-161, 2001
5692001
On the contrast in visual cryptography schemes
C Blundo, A De Santis, DR Stinson
Journal of Cryptology 12 (4), 261-289, 1999
3591999
Perfectly secure key distribution for dynamic conferences
C Blundo, A De Santis, A Herzberg, S Kutten, U Vaccaro, M Yung
Information and Computation 146 (1), 1-23, 1998
3051998
Visual cryptography for grey level images
C Blundo, A De Santis, M Naor
Information Processing Letters 75 (6), 255-259, 2000
2962000
Graph decompositions and secret sharing schemes
C Blundo, A De Santis, DR Stinson, U Vaccaro
Journal of cryptology 8 (1), 39-64, 1995
2541995
Contrast optimal threshold visual cryptography schemes
C Blundo, P D'Arco, A De Santis, DR Stinson
SIAM Journal on Discrete Mathematics 16 (2), 224-261, 2003
2432003
Improved schemes for visual cryptography
C Blundo, A De Bonis, A De Santis
Designs, Codes and Cryptography 24 (3), 255-278, 2001
1922001
Constructions and bounds for visual cryptography
G Ateniese, C Blundo, A De Santis, DR Stinson
International Colloquium on Automata, Languages, and Programming, 416-428, 1996
1691996
Space requirements for broadcast encryption
C Blundo, A Cresti
Workshop on the Theory and Application of of Cryptographic Techniques, 287-298, 1994
1591994
Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution
C Blundo, LAF Mattos, DR Stinson
Annual International Cryptology Conference, 387-400, 1996
1461996
Tight bounds on the information rate of secret sharing schemes
C Blundo, A De Santis, R De Simone, U Vaccaro
Designs, Codes and Cryptography 11 (2), 107-110, 1997
1411997
Design of self-healing key distribution schemes
C Blundo, P D’arco, A De Santis, M Listo
Designs, Codes and Cryptography 32 (1), 15-44, 2004
1312004
Multi-secret sharing schemes
C Blundo, A De Santis, G Di Crescenzo, AG Gaggia, U Vaccaro
Annual International Cryptology Conference, 150-163, 1994
1291994
Visual cryptography schemes with perfect reconstruction of black pixels
C Blundo, A De Santis
Computers & Graphics 22 (4), 449-455, 1998
1021998
On the information rate of secret sharing schemes
C Blundo, A De Santis, L Gargano, U Vaccaro
Annual International Cryptology Conference, 148-167, 1992
981992
Fully dynamic secret sharing schemes
C Blundo, A Cresti, A De Santis, U Vaccaro
Annual International Cryptology Conference, 110-125, 1993
861993
EsPRESSo: efficient privacy-preserving evaluation of sample set similarity
C Blundo, E De Cristofaro, P Gasti
Data Privacy Management and Autonomous Spontaneous Security, 89-103, 2012
802012
Visual cryptography schemes with optimal pixel expansion
C Blundo, S Cimato, A De Santis
Theoretical Computer Science 369 (1-3), 169-182, 2006
782006
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20