Person:240096: Difference between revisions

From MaRDI portal
Person:240096
Created automatically from import230924090903
 
m AuthorDisambiguator moved page Carlo Blundo to Carlo Blundo: Duplicate
 
(No difference)

Latest revision as of 17:56, 9 December 2023

Available identifiers

zbMath Open blundo.carloDBLPb/CarloBlundoWikidataQ61050135 ScholiaQ61050135MaRDI QIDQ240096

List of research outcomes





PublicationDate of PublicationType
Randomness in distribution protocols2019-04-29Paper
On the number of random bits in totally private computation2019-01-10Paper
Visual cryptography for grey level images2016-06-16Paper
On secret sharing schemes2016-06-09Paper
Lower bounds for robust secret sharing schemes2016-05-26Paper
Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution2015-11-11Paper
Innovative approaches for security of small artefacts2014-10-24Paper
Predicate Encryption with Partial Public Keys2010-12-07Paper
Foundations of Security Analysis and Design II2009-05-14Paper
On Self-Healing Key Distribution Schemes2008-12-21Paper
On unconditionally secure distributed oblivious transfer2007-08-20Paper
Visual cryptography schemes with optimal pixel expansion2007-01-09Paper
Visual cryptography for general access structures2006-10-10Paper
Analysis and design of distributed key distribution centers2006-08-14Paper
Automata, Languages and Programming2005-08-24Paper
A linear algebraic approach to metering schemes2005-01-17Paper
https://portal.mardi4nfdi.de/entity/Q48188542004-09-24Paper
Design of self-healing key distribution schemes2004-08-16Paper
Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures2004-08-10Paper
https://portal.mardi4nfdi.de/entity/Q44483832004-02-18Paper
https://portal.mardi4nfdi.de/entity/Q44483872004-02-18Paper
Bounds and constructions for metering schemes.2004-01-26Paper
Contrast Optimal Threshold Visual Cryptography Schemes2004-01-08Paper
Hiding Information in Image Mosaics2003-10-29Paper
https://portal.mardi4nfdi.de/entity/Q44138692003-07-21Paper
A ramp model for distributed key distribution schemes2003-06-10Paper
A note on optimal metering schemes.2003-01-21Paper
https://portal.mardi4nfdi.de/entity/Q45364222002-11-25Paper
Constructions and bounds for unconditionally secure non-interactive commitment schemes2002-08-21Paper
Probability of shares in secret sharing schemes2002-07-25Paper
Randomness complexity of private computation2002-04-21Paper
Improved schemes for visual cryptography2002-04-15Paper
https://portal.mardi4nfdi.de/entity/Q27668742002-01-28Paper
https://portal.mardi4nfdi.de/entity/Q27627502002-01-09Paper
https://portal.mardi4nfdi.de/entity/Q27413942001-10-14Paper
A t-private k-database information retrieval scheme2001-01-01Paper
Extended capabilities for visual cryptography2000-12-12Paper
On the contrast in visual cryptography schemes2000-09-24Paper
Anonymous secret sharing schemes2000-09-05Paper
https://portal.mardi4nfdi.de/entity/Q49544142000-06-07Paper
On a fallacious bound for authentication codes2000-05-22Paper
https://portal.mardi4nfdi.de/entity/Q49406932000-03-01Paper
A  -restricted key agreement scheme1999-09-22Paper
Perfectly secure key distribution for dynamic conferences1999-03-30Paper
Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution1999-01-20Paper
Unconditional secure conference key distribution schemes with disenrollment capability1999-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43657251998-04-22Paper
On the dealer's randomness required in secret sharing schemes1998-04-13Paper
https://portal.mardi4nfdi.de/entity/Q43657481998-01-14Paper
Tight bounds on the information rate of secret sharing schemes1997-12-18Paper
Randomness in distribution protocols1997-10-13Paper
https://portal.mardi4nfdi.de/entity/Q43417371997-07-20Paper
On the information rate of secret sharing schemes1997-02-28Paper
Fully dynamic secret sharing schemes1997-02-27Paper
A note on dynamic threshold schemes1997-02-27Paper
New bounds on the expected length of one-to-one codes1996-12-01Paper
New bounds on the information rate of secret sharing schemes1995-12-17Paper
Graph decompositions and secret sharing schemes1995-07-16Paper
https://portal.mardi4nfdi.de/entity/Q43187161995-07-16Paper
https://portal.mardi4nfdi.de/entity/Q43186911995-03-30Paper
https://portal.mardi4nfdi.de/entity/Q42815711994-10-04Paper
https://portal.mardi4nfdi.de/entity/Q42796561994-02-22Paper

Research outcomes over time

This page was built for person: Carlo Blundo