Carlo Blundo

Orcid: 0000-0002-8225-3401

Affiliations:
  • University of Salerno, Italy


According to our database1, Carlo Blundo authored at least 109 papers between 1992 and 2023.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Role mining under User-Distribution cardinality constraint.
J. Inf. Secur. Appl., November, 2023

Heuristics for constrained role mining in the post-processing framework.
J. Ambient Intell. Humaniz. Comput., 2023

A Time-Aware Approach for MOOC Dropout Prediction Based on Rule Induction and Sequential Three-Way Decisions.
IEEE Access, 2023

2022
A time-driven FCA-based approach for identifying students' dropout in MOOCs.
Int. J. Intell. Syst., 2022

Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints.
Comput. J., 2022

Sequential Three-Way Decisions for Reducing Uncertainty in Dropout Prediction for Online Courses.
Proceedings of the Advanced Information Networking and Applications, 2022

2020
Managing Constraints in Role Based Access Control.
IEEE Access, 2020

2019
An intelligent and private method to profile social network users.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019

2018
PostProcessing in Constrained Role Mining.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2018, 2018

2017
An AmI-based and privacy-preserving shopping mall model.
Hum. centric Comput. Inf. Sci., 2017

PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
A private Intelligent Shopping Mall.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

2014
EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity.
J. Comput. Secur., 2014

2013
Certified Information Access.
J. Syst. Softw., 2013

2012
Constrained Role Mining.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

2011
Private Information Retrieval.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Innovative approaches for security of small artefacts.
Comput. Sci. Rev., 2011

2010
Web Services Invocation over Bluetooth.
Wirel. Sens. Netw., 2010

Predicate Encryption with Partial Public Keys.
IACR Cryptol. ePrint Arch., 2010

Managing key hierarchies for access control enforcement: Heuristic approaches.
Comput. Secur., 2010

A simple role mining algorithm.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
Untraceable Tags based on Mild Assumptions.
IACR Cryptol. ePrint Arch., 2009

Efficient Key Management for Enforcing Access Control in Outsourced Scenarios.
Proceedings of the Emerging Challenges for Security, 2009

Private-Key Hidden Vector Encryption with Key Privacy.
Proceedings of the Theoretical Computer Science, 11th Italian Conference, 2009

Private-Key Hidden Vector Encryption with Key Confidentiality.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
Improved Security Notions and Protocols for Non-transferable Identification.
Proceedings of the Computer Security, 2008

A Distributed Implementation of the Certified Information Access Service.
Proceedings of the Computer Security, 2008

Validating Orchestration of Web Services with BPEL and Aggregate Signatures.
Proceedings of the ECOWS 2008, 2008

2007
On Unconditionally Secure Distributed Oblivious Transfer.
J. Cryptol., 2007

Low-randomness constant-round private XOR computations.
Int. J. Inf. Sec., 2007

A Bluetooth-Based JXME Infrastructure.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

A J2ME transparent middleware to support HTTP connections over Bluetooth.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

2006
On Self-Healing Key Distribution Schemes.
IEEE Trans. Inf. Theory, 2006

Visual cryptography schemes with optimal pixel expansion.
Theor. Comput. Sci., 2006

Performance evaluation of web services invocation over Bluetooth.
Proceedings of the 1st ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2006

A Web Service Based Micro-payment System.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

A Lightweight Framework forWeb Services Invocation over Bluetooth.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

2005
Analysis and Design of Distributed Key Distribution Centers.
J. Cryptol., 2005

Secure E-Coupons.
Electron. Commer. Res., 2005

A Lightweight Approach to Authenticated Web Caching.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January, 2005

Randomness in self-healing key distribution schemes.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

2004
Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures.
Theor. Comput. Sci., 2004

H<sub>YPPOCRATES</sub>: a new proactive password checker.
J. Syst. Softw., 2004

A Linear Algebraic Approach to Metering Schemes.
Des. Codes Cryptogr., 2004

Design of Self-Healing Key Distribution Schemes.
Des. Codes Cryptogr., 2004

A Software Infrastructure for Authenticated Web Metering.
Computer, 2004

A Platform for Secure E-Gambling.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Definitions and Bounds for Self-Healing Key Distribution Schemes.
Proceedings of the Automata, Languages and Programming: 31st International Colloquium, 2004

A Framework for Authenticated Web Services.
Proceedings of the Web Services, European Conference, 2004

2003
Contrast Optimal Threshold Visual Cryptography Schemes.
SIAM J. Discret. Math., 2003

Modeling A Certified Email Protocol using I/O Automata.
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003

Hiding Information in Image Mosaics.
Comput. J., 2003

A flaw in a self-healing key distribution scheme.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

A New Self-Healing Key Distribution Scheme.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Certified Email: Design and Implementation of a New Optimistic Protocol..
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

2002
A note on optimal metering schemes.
Inf. Process. Lett., 2002

Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes.
Des. Codes Cryptogr., 2002

Bounds and constructions for metering schemes.
Commun. Inf. Syst., 2002

A lightweight protocol for the generation and distribution of secure e-coupons.
Proceedings of the Eleventh International World Wide Web Conference, 2002

SAWM: a tool for secure and authenticated web metering.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

New Results on Unconditionally Secure Distributed Oblivious Transfer.
Proceedings of the Selected Areas in Cryptography, 2002

A Novel Approach to Proactive Password Checking.
Proceedings of the Infrastructure Security, International Conference, 2002

The Key Establishment Problem.
Proceedings of the Foundations of Security Analysis and Design II, 2002

2001
Extended capabilities for visual cryptography.
Theor. Comput. Sci., 2001

A t-private k-database information retrieval scheme.
Int. J. Inf. Sec., 2001

A Ramp Model for Distributed Key Distribution Schemes.
Electron. Notes Discret. Math., 2001

Improved Schemes for Visual Cryptography.
Des. Codes Cryptogr., 2001

Hyppocrates.
Proceedings of the Information Security, 4th International Conference, 2001

2000
Visual cryptography for grey level images.
Inf. Process. Lett., 2000

Constructions and Bounds for Unconditionally Secure Commitment Schemes.
IACR Cryptol. ePrint Arch., 2000

Metering Schemes with Pricing.
Proceedings of the Distributed Computing, 14th International Conference, 2000

Dynamic Multi-threshold Metering Schemes.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

Steganography Using Modern Arts.
Proceedings of the Theoretical Computer Science, 2000

1999
Randomness in Multi-Secret Sharing Schemes.
J. Univers. Comput. Sci., 1999

On the Contrast in Visual Cryptography Schemes.
J. Cryptol., 1999

On a Fallacious Bound for Authentication Codes.
J. Cryptol., 1999

A Note on the Randomness in Dynamic Threshold Schemes.
J. Comput. Secur., 1999

Unconditional Secure Conference Key Distribution Schemes with Disenrollment Capability.
Inf. Sci., 1999

Probability of Shares in Secret Sharing Schemes.
Inf. Process. Lett., 1999

A tau-Restricted Key Agreement Scheme.
Comput. J., 1999

Randomness Complexity of Private Computation.
Comput. Complex., 1999

Randomness Recycling in Constant-Round Private Computations (extended Abstract).
Proceedings of the Distributed Computing, 1999

1998
Generalized Beimel-Chor Schemes for Broadcast Encryption and Interactive Key Distribution.
Theor. Comput. Sci., 1998

On Secret Sharing Schemes.
Inf. Process. Lett., 1998

Perfectly Secure Key Distribution for Dynamic Conferences.
Inf. Comput., 1998

Visual cryptography schemes with perfect reconstruction of black pixels.
Comput. Graph., 1998

1997
Lower Bounds for Robust Secret Sharing Schemes.
Inf. Process. Lett., 1997

Tight Bounds on the Information Rate of Secret Sharing Schemes.
Des. Codes Cryptogr., 1997

On the Dealer's Randomness Required in Secret Sharing Schemes.
Des. Codes Cryptogr., 1997

Anonymous Secret Sharing Schemes.
Discret. Appl. Math., 1997

1996
New bounds on the expected length of one-to-one codes.
IEEE Trans. Inf. Theory, 1996

On the Information Rate of Secret Sharing Schemes.
Theor. Comput. Sci., 1996

Fully Dynamic Secret Sharing Schemes.
Theor. Comput. Sci., 1996

Randomness in Distribution Protocols.
Inf. Comput., 1996

Visual Cryptography for General Access Structures
Electron. Colloquium Comput. Complex., 1996

Constructions and Bounds for Visual Cryptography.
Proceedings of the Automata, Languages and Programming, 23rd International Colloquium, 1996

Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution.
Proceedings of the Advances in Cryptology, 1996

1995
New bounds on the information rate of secret sharing schemes.
IEEE Trans. Inf. Theory, 1995

Graph Decompositions and Secret Sharing Schemes.
J. Cryptol., 1995

Multiple Key Distribution Maintaining User Anonymity via Broadcast Channels.
J. Comput. Secur., 1995

A Note on Dynamic Threshold Schemes.
Inf. Process. Lett., 1995

On the Number of Random Bits in Totally Private Computation.
Proceedings of the Automata, Languages and Programming, 22nd International Colloquium, 1995

1994
Randomness in Distributed Protocols.
Proceedings of the Automata, Languages and Programming, 21st International Colloquium, 1994

Space Requirements for Broadcast Encryption.
Proceedings of the Advances in Cryptology, 1994

Multi-Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 1994

1993
Efficient Sharing of Many Secrets.
Proceedings of the STACS 93, 1993

Secret Sharing Schemes with Veto Capabilities.
Proceedings of the Algebraic Coding, 1993

1992
On the Information Rate of Secret Sharing Schemes (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992


  Loading...