Paolo D'Arco

According to our database1, Paolo D'Arco authored at least 54 papers between 1999 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Ultralightweight Cryptography - Some Thoughts on Ten Years of Efforts.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Probabilistic Secret Sharing.
Proceedings of the 43rd International Symposium on Mathematical Foundations of Computer Science, 2018

On the Equivalence of 2-Threshold Secret Sharing Schemes and Prefix Codes.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

An Efficient and Reliable Two-Level Lightweight Authentication Protocol.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

2017
Secure group communication schemes for dynamic heterogeneous distributed computing.
Future Generation Comp. Syst., 2017

Private set intersection: New generic constructions and feasibility results.
Adv. in Math. of Comm., 2017

2016
Secure computation without computers.
Theor. Comput. Sci., 2016

All or Nothing at All.
Electr. J. Comb., 2016

Visual Cryptography - Models, Issues, Applications and New Directions.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2016

Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography.
Proceedings of the Information Theoretic Security - 9th International Conference, 2016

2015
Anonymous protocols: Notions and equivalence.
Theor. Comput. Sci., 2015

All or Nothing at All.
IACR Cryptology ePrint Archive, 2015

2013
Toward tracing and revoking schemes secure against collusion and any form of secret information leakage.
Int. J. Inf. Sec., 2013

Key privacy and anonymous protocols.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes.
Proceedings of the Information Theoretic Security - 7th International Conference, 2013

Secure Two-Party Computation: A Visual Way.
Proceedings of the Information Theoretic Security - 7th International Conference, 2013

2012
Size-Hiding in Private Set Intersection: Existential Results and Constructions.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
On Ultralightweight RFID Authentication Protocols.
IEEE Trans. Dependable Sec. Comput., 2011

An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

Fighting Pirates 2.0.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Variations on a theme by Akl and Taylor: Security and tradeoffs.
Theor. Comput. Sci., 2010

2009
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants.
Proceedings of the Mathematical Foundations of Computer Science 2009, 2009

Revisiting DoS Attacks and Privacy in RFID-Enabled Networks.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2009

2008
From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol.
IACR Cryptology ePrint Archive, 2008

Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol.
Proceedings of the Progress in Cryptology, 2008

2007
On Unconditionally Secure Distributed Oblivious Transfer.
J. Cryptology, 2007

Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

2006
On Self-Healing Key Distribution Schemes.
IEEE Trans. Information Theory, 2006

Neural Network Techniques for Proactive Password Checking.
IEEE Trans. Dependable Sec. Comput., 2006

A unified model for unconditionally secure key distribution.
Journal of Computer Security, 2006

Properties and constraints of cheating-immune secret sharing schemes.
Discrete Applied Mathematics, 2006

2005
Security of public-key cryptosystems based on Chebyshev polynomials.
IEEE Trans. on Circuits and Systems, 2005

Analysis and Design of Distributed Key Distribution Centers.
J. Cryptology, 2005

2004
HYPPOCRATES: a new proactive password checker.
Journal of Systems and Software, 2004

Design of Self-Healing Key Distribution Schemes.
Des. Codes Cryptography, 2004

Definitions and Bounds for Self-Healing Key Distribution Schemes.
Proceedings of the Automata, Languages and Programming: 31st International Colloquium, 2004

2003
Contrast Optimal Threshold Visual Cryptography Schemes.
SIAM J. Discrete Math., 2003

A Ramp Model for Distributed Key Distribution Schemes.
Discrete Applied Mathematics, 2003

A flaw in a self-healing key distribution scheme.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

A New Self-Healing Key Distribution Scheme.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Anonymous Group Communication in Mobile Networks.
Proceedings of the Theoretical Computer Science, 8th Italian Conference, 2003

Fault Tolerant and DistributedBroadcast Encryption.
Proceedings of the Topics in Cryptology, 2003

2002
New Results on Unconditionally Secure Distributed Oblivious Transfer.
Proceedings of the Selected Areas in Cryptography, 2002

A Novel Approach to Proactive Password Checking.
Proceedings of the Infrastructure Security, International Conference, 2002

The Key Establishment Problem.
Proceedings of the Foundations of Security Analysis and Design II, 2002

On Unconditionally Secure Robust Distributed Key Distribution Centers.
Proceedings of the Advances in Cryptology, 2002

2001
A t-private k-database information retrieval scheme.
Int. J. Inf. Sec., 2001

A Ramp Model for Distributed Key Distribution Schemes.
Electronic Notes in Discrete Mathematics, 2001

Generalized Zig-zag Functions and Oblivious Transfer Reductions.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

Hyppocrates.
Proceedings of the Information Security, 4th International Conference, 2001

Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures.
Proceedings of the Information Security, 4th International Conference, 2001

On the Distribution of a Key Distribution Center.
Proceedings of the Theoretical Computer Science, 7th Italian Conference, 2001

1999
A tau-Restricted Key Agreement Scheme.
Comput. J., 1999


  Loading...