Follow
Carlo Blundo
Carlo Blundo
Professor of Computer Science, Università di Salerno
Verified email at unisa.it
Title
Cited by
Cited by
Year
Perfectly-secure key distribution for dynamic conferences
C Blundo, A De Santis, A Herzberg, S Kutten, U Vaccaro, M Yung
Advances in Cryptology—CRYPTO’92: 12th Annual International Cryptology …, 1993
15011993
Visual cryptography for general access structures
G Ateniese, C Blundo, A De Santis, DR Stinson
Information and computation 129 (2), 86-106, 1996
9491996
Extended capabilities for visual cryptography
G Ateniese, C Blundo, A De Santis, DR Stinson
Theoretical Computer Science 250 (1-2), 143-161, 2001
6642001
On the contrast in visual cryptography schemes
C Blundo, A De Santis, DR Stinson
Journal of Cryptology 12 (4), 261-289, 1999
3831999
Perfectly secure key distribution for dynamic conferences
C Blundo, A De Santis, A Herzberg, S Kutten, U Vaccaro, M Yung
Information and Computation 146 (1), 1-23, 1998
3361998
Visual cryptography for grey level images
C Blundo, A De Santis, M Naor
Information Processing Letters 75 (6), 255-259, 2000
3072000
Contrast optimal threshold visual cryptography schemes
C Blundo, P D'Arco, A De Santis, DR Stinson
SIAM Journal on Discrete Mathematics 16 (2), 224-261, 2003
2622003
Improved schemes for visual cryptography
C Blundo, AD Bonis, AD Santis
Designs, Codes and Cryptography 24, 255-278, 2001
2112001
Graph decompositions and secret sharing schemes
C Blundo, A De Santis, DR Stinson, U Vaccaro
Journal of cryptology 8 (1), 39-64, 1995
1951995
Constructions and bounds for visual cryptography
G Ateniese, C Blundo, A De Santis, DR Stinson
International Colloquium on Automata, Languages, and Programming, 416-428, 1996
1831996
Space requirements for broadcast encryption
C Blundo, A Cresti
Workshop on the Theory and Application of of Cryptographic Techniques, 287-298, 1994
1651994
Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution
C Blundo, LAF Mattos, DR Stinson
Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology …, 1996
1521996
Tight bounds on the information rate of secret sharing schemes
C Blundo, AD Santis, RD Simone, U Vaccaro
Designs, Codes and Cryptography 11, 107-110, 1997
1511997
Multi-secret sharing schemes
C Blundo, A De Santis, G Di Crescenzo, AG Gaggia, U Vaccaro
Annual International Cryptology Conference, 150-163, 1994
1471994
Design of self-healing key distribution schemes
C Blundo, P D’arco, A De Santis, M Listo
Designs, Codes and Cryptography 32, 15-44, 2004
1342004
Visual cryptography schemes with perfect reconstruction of black pixels
C Blundo, A De Santis
Computers & Graphics 22 (4), 449-455, 1998
1151998
Fully dynamic secret sharing schemes
C Blundo, A Cresti, A De Santis, U Vaccaro
Annual International Cryptology Conference, 110-125, 1993
981993
On the information rate of secret sharing schemes
C Blundo, A De Santis, L Gargano, U Vaccaro
Annual International Cryptology Conference, 148-167, 1992
971992
EsPRESSo: efficient privacy-preserving evaluation of sample set similarity
C Blundo, E De Cristofaro, P Gasti
International Workshop on Data Privacy Management, 89-103, 2012
962012
Visual cryptography schemes with optimal pixel expansion
C Blundo, S Cimato, A De Santis
Theoretical Computer Science 369 (1-3), 169-182, 2006
902006
The system can't perform the operation now. Try again later.
Articles 1–20