Carlo Blundo

According to our database1, Carlo Blundo authored at least 115 papers between 1992 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
PostProcessing in Constrained Role Mining.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2018, 2018

2017
An AmI-based and privacy-preserving shopping mall model.
HCIS, 2017

PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
A private Intelligent Shopping Mall.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

2014
EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity.
Journal of Computer Security, 2014

2013
Certified Information Access.
Journal of Systems and Software, 2013

2012
Constrained Role Mining
CoRR, 2012

Constrained Role Mining.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2011
Private Information Retrieval.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Innovative approaches for security of small artefacts.
Computer Science Review, 2011

EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity
CoRR, 2011

2010
Web Services Invocation over Bluetooth.
Wireless Sensor Network, 2010

Predicate Encryption with Partial Public Keys.
IACR Cryptology ePrint Archive, 2010

Managing key hierarchies for access control enforcement: Heuristic approaches.
Computers & Security, 2010

A simple role mining algorithm.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports.
Proceedings of the Financial Cryptography and Data Security, 2010

Predicate Encryption with Partial Public Keys.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

2009
Untraceable Tags based on Mild Assumptions.
IACR Cryptology ePrint Archive, 2009

Efficient Key Management for Enforcing Access Control in Outsourced Scenarios.
Proceedings of the Emerging Challenges for Security, 2009

Private-Key Hidden Vector Encryption with Key Privacy.
Proceedings of the Theoretical Computer Science, 11th Italian Conference, 2009

Untraceable Tags Based on Mild Assumptions.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

Private-Key Hidden Vector Encryption with Key Confidentiality.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
Improved Security Notions and Protocols for Non-transferable Identification.
Proceedings of the Computer Security, 2008

A Distributed Implementation of the Certified Information Access Service.
Proceedings of the Computer Security, 2008

Validating Orchestration of Web Services with BPEL and Aggregate Signatures.
Proceedings of the ECOWS 2008, 2008

2007
On Unconditionally Secure Distributed Oblivious Transfer.
J. Cryptology, 2007

Low-randomness constant-round private XOR computations.
Int. J. Inf. Sec., 2007

A Bluetooth-Based JXME Infrastructure.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

A J2ME transparent middleware to support HTTP connections over Bluetooth.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

2006
On Self-Healing Key Distribution Schemes.
IEEE Trans. Information Theory, 2006

Visual cryptography schemes with optimal pixel expansion.
Theor. Comput. Sci., 2006

Visual Cryptography Schemes with Optimal Pixel Expansion.
IACR Cryptology ePrint Archive, 2006

Performance evaluation of web services invocation over Bluetooth.
Proceedings of the 1st ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2006

A Web Service Based Micro-payment System.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

A Lightweight Framework forWeb Services Invocation over Bluetooth.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

2005
Analysis and Design of Distributed Key Distribution Centers.
J. Cryptology, 2005

Secure E-Coupons.
Electronic Commerce Research, 2005

A Lightweight Approach to Authenticated Web Caching.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January, 2005

Randomness in self-healing key distribution schemes.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

2004
Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures.
Theor. Comput. Sci., 2004

HYPPOCRATES: a new proactive password checker.
Journal of Systems and Software, 2004

Modeling A Certified Email Protocol using I/O Automata.
Electr. Notes Theor. Comput. Sci., 2004

A Linear Algebraic Approach to Metering Schemes.
Des. Codes Cryptogr., 2004

Design of Self-Healing Key Distribution Schemes.
Des. Codes Cryptogr., 2004

A Software Infrastructure for Authenticated Web Metering.
IEEE Computer, 2004

A Platform for Secure E-Gambling.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Definitions and Bounds for Self-Healing Key Distribution Schemes.
Proceedings of the Automata, Languages and Programming: 31st International Colloquium, 2004

A Framework for Authenticated Web Services.
Proceedings of the Web Services, European Conference, 2004

2003
Contrast Optimal Threshold Visual Cryptography Schemes.
SIAM J. Discrete Math., 2003

A Ramp Model for Distributed Key Distribution Schemes.
Discrete Applied Mathematics, 2003

Hiding Information in Image Mosaics.
Comput. J., 2003

A flaw in a self-healing key distribution scheme.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

A New Self-Healing Key Distribution Scheme.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Certified Email: Design and Implementation of a New Optimistic Protocol..
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

2002
A note on optimal metering schemes.
Inf. Process. Lett., 2002

Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes.
Des. Codes Cryptogr., 2002

A lightweight protocol for the generation and distribution of secure e-coupons.
Proceedings of the Eleventh International World Wide Web Conference, 2002

SAWM: a tool for secure and authenticated web metering.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

New Results on Unconditionally Secure Distributed Oblivious Transfer.
Proceedings of the Selected Areas in Cryptography, 2002

A Novel Approach to Proactive Password Checking.
Proceedings of the Infrastructure Security, International Conference, 2002

The Key Establishment Problem.
Proceedings of the Foundations of Security Analysis and Design II, 2002

2001
Extended capabilities for visual cryptography.
Theor. Comput. Sci., 2001

A t-private k-database information retrieval scheme.
Int. J. Inf. Sec., 2001

A Linear Algebraic Approach to Metering Schemes.
IACR Cryptology ePrint Archive, 2001

A Ramp Model for Distributed Key Distribution Schemes.
Electronic Notes in Discrete Mathematics, 2001

Improved Schemes for Visual Cryptography.
Des. Codes Cryptogr., 2001

Hyppocrates.
Proceedings of the Information Security, 4th International Conference, 2001

Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures.
Proceedings of the Information Security, 4th International Conference, 2001

2000
Visual cryptography for grey level images.
Inf. Process. Lett., 2000

Constructions and Bounds for Unconditionally Secure Commitment Schemes.
IACR Cryptology ePrint Archive, 2000

Metering Schemes with Pricing.
Proceedings of the Distributed Computing, 14th International Conference, 2000

Dynamic Multi-threshold Metering Schemes.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

Steganography Using Modern Arts.
Proceedings of the Theoretical Computer Science, 2000

1999
Randomness in Multi-Secret Sharing Schemes.
J. UCS, 1999

On the Contrast in Visual Cryptography Schemes.
J. Cryptology, 1999

On a Fallacious Bound for Authentication Codes.
J. Cryptology, 1999

A Note on the Randomness in Dynamic Threshold Schemes.
Journal of Computer Security, 1999

Unconditional Secure Conference Key Distribution Schemes with Disenrollment Capability.
Inf. Sci., 1999

Probability of Shares in Secret Sharing Schemes.
Inf. Process. Lett., 1999

A tau-Restricted Key Agreement Scheme.
Comput. J., 1999

Randomness Complexity of Private Computation.
Computational Complexity, 1999

Randomness Recycling in Constant-Round Private Computations (extended Abstract).
Proceedings of the Distributed Computing, 1999

1998
Generalized Beimel-Chor Schemes for Broadcast Encryption and Interactive Key Distribution.
Theor. Comput. Sci., 1998

On Secret Sharing Schemes.
Inf. Process. Lett., 1998

Perfectly Secure Key Distribution for Dynamic Conferences.
Inf. Comput., 1998

Visual cryptography schemes with perfect reconstruction of black pixels.
Computers & Graphics, 1998

1997
Lower Bounds for Robust Secret Sharing Schemes.
Inf. Process. Lett., 1997

Tight Bounds on the Information Rate of Secret Sharing Schemes.
Des. Codes Cryptogr., 1997

On the Dealer's Randomness Required in Secret Sharing Schemes.
Des. Codes Cryptogr., 1997

Anonymous Secret Sharing Schemes.
Discrete Applied Mathematics, 1997

1996
New bounds on the expected length of one-to-one codes.
IEEE Trans. Information Theory, 1996

On the Information Rate of Secret Sharing Schemes.
Theor. Comput. Sci., 1996

Fully Dynamic Secret Sharing Schemes.
Theor. Comput. Sci., 1996

Randomness in Distribution Protocols.
Inf. Comput., 1996

Visual Cryptography for General Access Structures.
Inf. Comput., 1996

On the Contrast in Visual Cryptography Schemes.
IACR Cryptology ePrint Archive, 1996

Visual Cryptography for General Access Structures
Electronic Colloquium on Computational Complexity (ECCC), 1996

Constructions and Bounds for Visual Cryptography.
Proceedings of the Automata, Languages and Programming, 23rd International Colloquium, 1996

Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution.
Proceedings of the Advances in Cryptology, 1996

1995
New bounds on the information rate of secret sharing schemes.
IEEE Trans. Information Theory, 1995

Graph Decompositions and Secret Sharing Schemes.
J. Cryptology, 1995

Multiple Key Distribution Maintaining User Anonymity via Broadcast Channels.
Journal of Computer Security, 1995

A Note on Dynamic Threshold Schemes.
Inf. Process. Lett., 1995

On the Number of Random Bits in Totally Private Computation.
Proceedings of the Automata, Languages and Programming, 22nd International Colloquium, 1995

1994
Randomness in Distributed Protocols.
Proceedings of the Automata, Languages and Programming, 21st International Colloquium, 1994

On the Dealer's Randomness Required in Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 1994

Space Requirements for Broadcast Encryption.
Proceedings of the Advances in Cryptology, 1994

Multi-Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 1994

1993
Efficient Sharing of Many Secrets.
Proceedings of the STACS 93, 1993

Secret Sharing Schemes with Veto Capabilities.
Proceedings of the Algebraic Coding, 1993

Fully Dynamic Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 1993

1992
Graph Decompositions and Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 1992

Perfectly-Secure Key Distribution for Dynamic Conferences.
Proceedings of the Advances in Cryptology, 1992

On the Information Rate of Secret Sharing Schemes (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992


  Loading...