Carlo Blundo
Orcid: 0000-0002-8225-3401Affiliations:
- University of Salerno, Italy
According to our database1,
Carlo Blundo
authored at least 109 papers
between 1992 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2023
J. Inf. Secur. Appl., November, 2023
J. Ambient Intell. Humaniz. Comput., 2023
A Time-Aware Approach for MOOC Dropout Prediction Based on Rule Induction and Sequential Three-Way Decisions.
IEEE Access, 2023
2022
Int. J. Intell. Syst., 2022
Comput. J., 2022
Sequential Three-Way Decisions for Reducing Uncertainty in Dropout Prediction for Online Courses.
Proceedings of the Advanced Information Networking and Applications, 2022
2020
2019
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019
2018
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2018, 2018
2017
Hum. centric Comput. Inf. Sci., 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
2016
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
2014
J. Comput. Secur., 2014
2013
2012
Proceedings of the Security and Trust Management - 8th International Workshop, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
2010
Comput. Secur., 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Financial Cryptography and Data Security, 2010
2009
Proceedings of the Emerging Challenges for Security, 2009
Private-Key Hidden Vector Encryption with Key Privacy.
Proceedings of the Theoretical Computer Science, 11th Italian Conference, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
Proceedings of the Computer Security, 2008
Proceedings of the Computer Security, 2008
Proceedings of the ECOWS 2008, 2008
2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
2006
Proceedings of the 1st ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2006
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006
2005
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January, 2005
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005
2004
Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures.
Theor. Comput. Sci., 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Automata, Languages and Programming: 31st International Colloquium, 2004
Proceedings of the Web Services, European Conference, 2004
2003
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
2002
Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes.
Des. Codes Cryptogr., 2002
Proceedings of the Eleventh International World Wide Web Conference, 2002
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002
Proceedings of the Selected Areas in Cryptography, 2002
Proceedings of the Infrastructure Security, International Conference, 2002
Proceedings of the Foundations of Security Analysis and Design II, 2002
2001
Improved Schemes for Visual Cryptography.
Des. Codes Cryptogr., 2001
Proceedings of the Information Security, 4th International Conference, 2001
2000
IACR Cryptol. ePrint Arch., 2000
Proceedings of the Distributed Computing, 14th International Conference, 2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Theoretical Computer Science, 2000
1999
Unconditional Secure Conference Key Distribution Schemes with Disenrollment Capability.
Inf. Sci., 1999
Proceedings of the Distributed Computing, 1999
1998
Generalized Beimel-Chor Schemes for Broadcast Encryption and Interactive Key Distribution.
Theor. Comput. Sci., 1998
Comput. Graph., 1998
1997
Des. Codes Cryptogr., 1997
Des. Codes Cryptogr., 1997
1996
Electron. Colloquium Comput. Complex., 1996
Proceedings of the Automata, Languages and Programming, 23rd International Colloquium, 1996
Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution.
Proceedings of the Advances in Cryptology, 1996
1995
IEEE Trans. Inf. Theory, 1995
J. Comput. Secur., 1995
Proceedings of the Automata, Languages and Programming, 22nd International Colloquium, 1995
1994
Proceedings of the Automata, Languages and Programming, 21st International Colloquium, 1994
Proceedings of the Advances in Cryptology, 1994
1993
Proceedings of the Algebraic Coding, 1993
1992
Proceedings of the Advances in Cryptology, 1992