Carlo Blundo

From MaRDI portal
Revision as of 17:56, 9 December 2023 by AuthorDisambiguator (talk | contribs) (AuthorDisambiguator moved page Carlo Blundo to Carlo Blundo: Duplicate)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:240096

Available identifiers

zbMath Open blundo.carloDBLPb/CarloBlundoWikidataQ61050135 ScholiaQ61050135MaRDI QIDQ240096

List of research outcomes

PublicationDate of PublicationType
Randomness in distribution protocols2019-04-29Paper
On the number of random bits in totally private computation2019-01-10Paper
Visual cryptography for grey level images2016-06-16Paper
On secret sharing schemes2016-06-09Paper
Lower bounds for robust secret sharing schemes2016-05-26Paper
Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution2015-11-11Paper
Innovative approaches for security of small artefacts2014-10-24Paper
Predicate Encryption with Partial Public Keys2010-12-07Paper
Foundations of Security Analysis and Design II2009-05-14Paper
On Self-Healing Key Distribution Schemes2008-12-21Paper
On unconditionally secure distributed oblivious transfer2007-08-20Paper
Visual cryptography schemes with optimal pixel expansion2007-01-09Paper
Visual cryptography for general access structures2006-10-10Paper
Analysis and design of distributed key distribution centers2006-08-14Paper
Automata, Languages and Programming2005-08-24Paper
A linear algebraic approach to metering schemes2005-01-17Paper
https://portal.mardi4nfdi.de/entity/Q48188542004-09-24Paper
Design of self-healing key distribution schemes2004-08-16Paper
Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures2004-08-10Paper
https://portal.mardi4nfdi.de/entity/Q44483832004-02-18Paper
https://portal.mardi4nfdi.de/entity/Q44483872004-02-18Paper
Bounds and constructions for metering schemes.2004-01-26Paper
Contrast Optimal Threshold Visual Cryptography Schemes2004-01-08Paper
Hiding Information in Image Mosaics2003-10-29Paper
https://portal.mardi4nfdi.de/entity/Q44138692003-07-21Paper
A ramp model for distributed key distribution schemes2003-06-10Paper
A note on optimal metering schemes.2003-01-21Paper
https://portal.mardi4nfdi.de/entity/Q45364222002-11-25Paper
Constructions and bounds for unconditionally secure non-interactive commitment schemes2002-08-21Paper
Probability of shares in secret sharing schemes2002-07-25Paper
Randomness complexity of private computation2002-04-21Paper
Improved schemes for visual cryptography2002-04-15Paper
https://portal.mardi4nfdi.de/entity/Q27668742002-01-28Paper
https://portal.mardi4nfdi.de/entity/Q27627502002-01-09Paper
https://portal.mardi4nfdi.de/entity/Q27413942001-10-14Paper
A t-private k-database information retrieval scheme2001-01-01Paper
Extended capabilities for visual cryptography2000-12-12Paper
On the contrast in visual cryptography schemes2000-09-24Paper
Anonymous secret sharing schemes2000-09-05Paper
https://portal.mardi4nfdi.de/entity/Q49544142000-06-07Paper
On a fallacious bound for authentication codes2000-05-22Paper
https://portal.mardi4nfdi.de/entity/Q49406932000-03-01Paper
A  -restricted key agreement scheme1999-09-22Paper
Perfectly secure key distribution for dynamic conferences1999-03-30Paper
Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution1999-01-20Paper
Unconditional secure conference key distribution schemes with disenrollment capability1999-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43657251998-04-22Paper
On the dealer's randomness required in secret sharing schemes1998-04-13Paper
https://portal.mardi4nfdi.de/entity/Q43657481998-01-14Paper
Tight bounds on the information rate of secret sharing schemes1997-12-18Paper
Randomness in distribution protocols1997-10-13Paper
https://portal.mardi4nfdi.de/entity/Q43417371997-07-20Paper
On the information rate of secret sharing schemes1997-02-28Paper
Fully dynamic secret sharing schemes1997-02-27Paper
A note on dynamic threshold schemes1997-02-27Paper
New bounds on the expected length of one-to-one codes1996-12-01Paper
New bounds on the information rate of secret sharing schemes1995-12-17Paper
Graph decompositions and secret sharing schemes1995-07-16Paper
https://portal.mardi4nfdi.de/entity/Q43187161995-07-16Paper
https://portal.mardi4nfdi.de/entity/Q43186911995-03-30Paper
https://portal.mardi4nfdi.de/entity/Q42815711994-10-04Paper
https://portal.mardi4nfdi.de/entity/Q42796561994-02-22Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Carlo Blundo