default search action
Paolo D'Arco
- > Home > Persons > Paolo D'Arco
Publications
- 2021
- [j25]Paolo D'Arco, Roberto De Prisco, Alfredo De Santis:
Secret sharing schemes for infinite sets of participants: A new design technique. Theor. Comput. Sci. 859: 149-161 (2021) - 2018
- [c30]Paolo D'Arco, Roberto De Prisco, Alfredo De Santis:
On the Equivalence of 2-Threshold Secret Sharing Schemes and Prefix Codes. CSS 2018: 157-167 - [c28]Paolo D'Arco, Roberto De Prisco, Alfredo De Santis, Angel L. Pérez del Pozo, Ugo Vaccaro:
Probabilistic Secret Sharing. MFCS 2018: 64:1-64:16 - 2017
- [j23]Arcangelo Castiglione, Paolo D'Arco, Alfredo De Santis, Rosario Russo:
Secure group communication schemes for dynamic heterogeneous distributed computing. Future Gener. Comput. Syst. 74: 313-324 (2017) - 2015
- [j20]Paolo D'Arco, Alfredo De Santis:
Anonymous protocols: Notions and equivalence. Theor. Comput. Sci. 581: 9-25 (2015) - 2014
- [j19]Paolo D'Arco, Roberto De Prisco, Alfredo De Santis:
Measure-independent characterization of contrast optimal visual cryptography schemes. J. Syst. Softw. 95: 89-99 (2014) - 2013
- [c22]Paolo D'Arco, Roberto De Prisco, Alfredo De Santis:
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes. ICITS 2013: 39-55 - [c21]Paolo D'Arco, Alfredo De Santis:
Key privacy and anonymous protocols. PST 2013: 11-18 - 2011
- [j17]Paolo D'Arco, Alfredo De Santis:
On Ultralightweight RFID Authentication Protocols. IEEE Trans. Dependable Secur. Comput. 8(4): 548-563 (2011) - 2010
- [j16]Paolo D'Arco, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Variations on a theme by Akl and Taylor: Security and tradeoffs. Theor. Comput. Sci. 411(1): 213-227 (2010) - 2009
- [c16]Paolo D'Arco, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants. MFCS 2009: 247-257 - 2008
- [c15]Paolo D'Arco, Alfredo De Santis:
Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol. AFRICACRYPT 2008: 27-39 - [i2]Paolo D'Arco, Alfredo De Santis:
From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2008: 470 (2008) - 2007
- [j15]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson:
On Unconditionally Secure Distributed Oblivious Transfer. J. Cryptol. 20(3): 323-373 (2007) - [c14]Paolo D'Arco, Alfredo De Santis:
Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation. ICITS 2007: 46-64 - 2006
- [j12]Angelo Ciaramella, Paolo D'Arco, Alfredo De Santis, Clemente Galdi, Roberto Tagliaferri:
Neural Network Techniques for Proactive Password Checking. IEEE Trans. Dependable Secur. Comput. 3(4): 327-339 (2006) - [j11]Carlo Blundo, Paolo D'Arco, Alfredo De Santis:
On Self-Healing Key Distribution Schemes. IEEE Trans. Inf. Theory 52(12): 5455-5467 (2006) - 2005
- [j9]Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Ljupco Kocarev:
Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. I Regul. Pap. 52-I(7): 1382-1393 (2005) - 2004
- [j8]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Massimiliano Listo:
Design of Self-Healing Key Distribution Schemes. Des. Codes Cryptogr. 32(1-3): 15-44 (2004) - [j7]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi:
HYPPOCRATES: a new proactive password checker. J. Syst. Softw. 71(1-2): 163-175 (2004) - [c13]Carlo Blundo, Paolo D'Arco, Alfredo De Santis:
Definitions and Bounds for Self-Healing Key Distribution Schemes. ICALP 2004: 234-245 - [i1]Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Ljupco Kocarev:
Security of public key cryptosystems based on Chebyshev Polynomials. CoRR cs.CR/0411030 (2004) - 2003
- [j4]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson:
Contrast Optimal Threshold Visual Cryptography Schemes. SIAM J. Discret. Math. 16(2): 224-261 (2003) - 2002
- [c6]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi:
A Novel Approach to Proactive Password Checking. InfraSec 2002: 30-39 - [c5]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson:
New Results on Unconditionally Secure Distributed Oblivious Transfer. Selected Areas in Cryptography 2002: 291-309 - 2001
- [j2]Carlo Blundo, Paolo D'Arco, Alfredo De Santis:
A t-private k-database information retrieval scheme. Int. J. Inf. Sec. 1(1): 64-68 (2001) - [c2]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi:
Hyppocrates. ISC 2001: 63-80
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-11 21:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint