Name
Papers
Collaborators
CARLO BLUNDO
85
61
Citations 
PageRank 
Referers 
1901
229.50
2220
Referees 
References 
846
957
Search Limit
1001000
Title
Citations
PageRank
Year
An AmI-based and privacy-preserving shopping mall model10.352017
Certified Information Access00.342013
EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity140.632012
Constrained Role Mining30.382012
Innovative approaches for security of small artefacts00.342011
Managing key hierarchies for access control enforcement: Heuristic approaches90.792010
Predicate Encryption With Partial Public Keys90.552010
Web Services Invocation over Bluetooth00.342010
Increasing privacy threats in the cyberspace: the case of Italian e-passports20.472010
A simple role mining algorithm150.592010
Private-Key Hidden Vector Encryption with Key Confidentiality170.772009
Untraceable tags based on mild assumptions20.432009
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios90.622009
Private-Key Hidden Vector Encryption with Key Privacy.10.352009
Improved Security Notions and Protocols for Non-transferable Identification90.562008
A Distributed Implementation of the Certified Information Access Service20.402008
Validating Orchestration of Web Services with BPEL and Aggregate Signatures00.342008
A J2ME transparent middleware to support HTTP connections over Bluetooth10.372007
A Bluetooth-based JXME infrastructure10.382007
Low-randomness constant-round private XOR computations20.402007
On Unconditionally Secure Distributed Oblivious Transfer100.652007
A Lightweight Framework forWeb Services Invocation over Bluetooth50.662006
Performance evaluation of web services invocation over Bluetooth30.482006
Visual cryptography schemes with optimal pixel expansion211.002006
A Lightweight Approach to Authenticated Web Caching60.642005
Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers252.882005
Randomness in self-healing key distribution schemes30.412005
Analysis and Design of Distributed Key Distribution Centers00.342005
A Platform for Secure E-Gambling00.342004
Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures90.502004
HYPPOCRATES: a new proactive password checker110.662004
A Framework for Authenticated Web Services10.392004
A software infrastructure for authenticated Web metering30.442004
Design of Self-Healing Key Distribution Schemes653.442004
Definitions and Bounds for Self-Healing Key Distribution Schemes171.062004
Hiding Information in Image Mosaics10.372003
A New Self-Healing Key Distribution Scheme80.592003
A ramp model for distributed key distribution schemes30.382003
Theoretical Computer Science, 8th Italian Conference, ICTCS 2003, Bertinoro, Italy, October 13-15, 2003, Proceedings292.422003
A flaw in a self-healing key distribution scheme70.612003
Certified email: design and implementation of a new optimistic protocol70.582003
Bounds and constructions for metering schemes.00.342002
The Key Establishment problem30.442002
A lightweight protocol for the generation and distribution of secure e-coupons60.832002
SAWM: a tool for secure and authenticated web metering90.742002
A note on optimal metering schemes20.372002
New Results on Unconditionally Secure Distributed Oblivious Transfer140.842002
Extended capabilities for visual cryptography565.952001
A t-private k-database information retrieval scheme20.402001
A Linear Algebraic Approach to Metering Schemes00.342001
  • 1
  • 2