Follow
Carlo Blundo
Carlo Blundo
Professor of Computer Science, Università di Salerno
Verified email at unisa.it
Title
Cited by
Cited by
Year
Perfectly-secure key distribution for dynamic conferences
C Blundo, A De Santis, A Herzberg, S Kutten, U Vaccaro, M Yung
Advances in Cryptology—CRYPTO’92: 12th Annual International Cryptology …, 1993
14921993
Visual cryptography for general access structures
G Ateniese, C Blundo, A De Santis, DR Stinson
Information and computation 129 (2), 86-106, 1996
9471996
Extended capabilities for visual cryptography
G Ateniese, C Blundo, A De Santis, DR Stinson
Theoretical Computer Science 250 (1-2), 143-161, 2001
6442001
On the contrast in visual cryptography schemes
C Blundo, A De Santis, DR Stinson
Journal of Cryptology 12 (4), 261-289, 1999
3781999
Perfectly secure key distribution for dynamic conferences
C Blundo, A De Santis, A Herzberg, S Kutten, U Vaccaro, M Yung
Information and Computation 146 (1), 1-23, 1998
3331998
Visual cryptography for grey level images
C Blundo, A De Santis, M Naor
Information Processing Letters 75 (6), 255-259, 2000
3032000
Contrast optimal threshold visual cryptography schemes
C Blundo, P D'Arco, A De Santis, DR Stinson
SIAM Journal on Discrete Mathematics 16 (2), 224-261, 2003
2582003
Improved schemes for visual cryptography
C Blundo, AD Bonis, AD Santis
Designs, Codes and Cryptography 24, 255-278, 2001
2082001
Graph decompositions and secret sharing schemes
C Blundo, A De Santis, DR Stinson, U Vaccaro
Journal of cryptology 8 (1), 39-64, 1995
1961995
Constructions and bounds for visual cryptography
G Ateniese, C Blundo, A De Santis, DR Stinson
International Colloquium on Automata, Languages, and Programming, 416-428, 1996
1811996
Space requirements for broadcast encryption
C Blundo, A Cresti
Workshop on the Theory and Application of of Cryptographic Techniques, 287-298, 1994
1661994
Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution
C Blundo, LAF Mattos, DR Stinson
Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology …, 1996
1531996
Tight bounds on the information rate of secret sharing schemes
C Blundo, AD Santis, RD Simone, U Vaccaro
Designs, Codes and Cryptography 11, 107-110, 1997
1501997
Multi-secret sharing schemes
C Blundo, A De Santis, G Di Crescenzo, AG Gaggia, U Vaccaro
Annual International Cryptology Conference, 150-163, 1994
1461994
Design of self-healing key distribution schemes
C Blundo, P D’arco, A De Santis, M Listo
Designs, Codes and Cryptography 32, 15-44, 2004
1342004
Visual cryptography schemes with perfect reconstruction of black pixels
C Blundo, A De Santis
Computers & Graphics 22 (4), 449-455, 1998
1101998
Fully dynamic secret sharing schemes
C Blundo, A Cresti, A De Santis, U Vaccaro
Annual International Cryptology Conference, 110-125, 1993
971993
On the information rate of secret sharing schemes
C Blundo, A De Santis, L Gargano, U Vaccaro
Annual International Cryptology Conference, 148-167, 1992
971992
EsPRESSo: efficient privacy-preserving evaluation of sample set similarity
C Blundo, E De Cristofaro, P Gasti
International Workshop on Data Privacy Management, 89-103, 2012
912012
Visual cryptography schemes with optimal pixel expansion
C Blundo, S Cimato, A De Santis
Theoretical Computer Science 369 (1-3), 169-182, 2006
882006
The system can't perform the operation now. Try again later.
Articles 1–20