The following pages link to Paolo D'Arco (Q517014):
Displaying 40 items.
- Secure computation without computers (Q517015) (← links)
- Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures (Q596095) (← links)
- All or nothing at all (Q727180) (← links)
- Variations on a theme by Akl and Taylor: security and tradeoffs (Q1041239) (← links)
- A ramp model for distributed key distribution schemes (Q1811091) (← links)
- Design of self-healing key distribution schemes (Q1877337) (← links)
- Secret sharing schemes for infinite sets of participants: a new design technique (Q2227498) (← links)
- Anonymous protocols: notions and equivalence (Q2345446) (← links)
- Private set intersection: new generic constructions and feasibility results (Q2408281) (← links)
- Properties and constraints of cheating-immune secret sharing schemes (Q2489917) (← links)
- Analysis and design of distributed key distribution centers (Q2499262) (← links)
- On unconditionally secure distributed oblivious transfer (Q2642256) (← links)
- (Q2741394) (← links)
- Size-Hiding in Private Set Intersection: Existential Results and Constructions (Q2900635) (← links)
- Secure Two-Party Computation: A Visual Way (Q2948250) (← links)
- Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes (Q2948251) (← links)
- Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography (Q2953811) (← links)
- Fighting Pirates 2.0 (Q3011310) (← links)
- Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants (Q3182929) (← links)
- Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol (Q3506370) (← links)
- On Self-Healing Key Distribution Schemes (Q3548035) (← links)
- Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation (Q3649186) (← links)
- A -restricted key agreement scheme (Q4262745) (← links)
- On Unconditionally Secure Robust Distributed Key Distribution Centers (Q4412808) (← links)
- (Q4413869) (← links)
- (Q4418542) (← links)
- Contrast Optimal Threshold Visual Cryptography Schemes (Q4443082) (← links)
- (Q4448376) (← links)
- (Q4448383) (← links)
- (Q4448387) (← links)
- Security of public-key cryptosystems based on Chebyshev polynomials (Q4590397) (← links)
- A t-private k-database information retrieval scheme (Q4707240) (← links)
- (Q4736424) (← links)
- Probabilistic secret sharing (Q5005168) (← links)
- Automata, Languages and Programming (Q5466465) (← links)
- Theoretical Computer Science (Q5897369) (← links)
- Foundations of Security Analysis and Design II (Q5901851) (← links)
- Multi-stage proof-of-works: properties and vulnerabilities (Q6077060) (← links)
- Efficient and reliable post-quantum authentication (Q6549669) (← links)
- Private computations on set intersection (Q6613361) (← links)