Paolo D'Arco

Orcid: 0000-0002-9271-4240

Affiliations:
  • Università di Salerno, Italy


According to our database1, Paolo D'Arco authored at least 62 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient and reliable post-quantum authentication.
Theor. Comput. Sci., 2024

2023
Multi-stage Proof-of-Works: Properties and vulnerabilities.
Theor. Comput. Sci., October, 2023

2022
Gossamer: weaknesses and performance.
Int. J. Inf. Sec., 2022

2021
Secret sharing schemes for infinite sets of participants: A new design technique.
Theor. Comput. Sci., 2021

Security Attacks on Multi-Stage Proof-of-Work.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

On (Multi-stage) Proof-of-Works.
Proceedings of the Blockchain and Applications - 3rd International Congress, 2021

Ultra-lightweight Authentication.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
On (multi-stage) Proof-of-Work blockchain protocols.
IACR Cryptol. ePrint Arch., 2020

Secret Disclosure Attacks on a Recent Ultralightweight Mutual RFID Authentication Protocol for Blockchain-Enabled Supply Chains.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

2019
A New Instance of a Lightweight Authentication Protocol Based on the LPN Problem.
Proceedings of the Pervasive Systems, Algorithms and Networks, 2019

2018
Ultralightweight Cryptography - Some Thoughts on Ten Years of Efforts.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Probabilistic Secret Sharing.
Proceedings of the 43rd International Symposium on Mathematical Foundations of Computer Science, 2018

On the Equivalence of 2-Threshold Secret Sharing Schemes and Prefix Codes.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

An Efficient and Reliable Two-Level Lightweight Authentication Protocol.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

2017
Secure group communication schemes for dynamic heterogeneous distributed computing.
Future Gener. Comput. Syst., 2017

Private set intersection: New generic constructions and feasibility results.
Adv. Math. Commun., 2017

2016
Secure computation without computers.
Theor. Comput. Sci., 2016

All or Nothing at All.
Electron. J. Comb., 2016

Visual Cryptography - Models, Issues, Applications and New Directions.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2016

Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography.
Proceedings of the Information Theoretic Security - 9th International Conference, 2016

2015
Anonymous protocols: Notions and equivalence.
Theor. Comput. Sci., 2015

2014
Measure-independent characterization of contrast optimal visual cryptography schemes.
J. Syst. Softw., 2014

2013
Toward tracing and revoking schemes secure against collusion and any form of secret information leakage.
Int. J. Inf. Sec., 2013

Secure two-party computation: a visual way.
IACR Cryptol. ePrint Arch., 2013

Key privacy and anonymous protocols.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

2012
Size-Hiding in Private Set Intersection: Existential Results and Constructions.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
On Ultralightweight RFID Authentication Protocols.
IEEE Trans. Dependable Secur. Comput., 2011

An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

Fighting Pirates 2.0.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Variations on a theme by Akl and Taylor: Security and tradeoffs.
Theor. Comput. Sci., 2010

2009
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants.
Proceedings of the Mathematical Foundations of Computer Science 2009, 2009

Revisiting DoS Attacks and Privacy in RFID-Enabled Networks.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2009

2008
From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol.
IACR Cryptol. ePrint Arch., 2008

Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol.
Proceedings of the Progress in Cryptology, 2008

2007
On Unconditionally Secure Distributed Oblivious Transfer.
J. Cryptol., 2007

Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

2006
On Self-Healing Key Distribution Schemes.
IEEE Trans. Inf. Theory, 2006

Neural Network Techniques for Proactive Password Checking.
IEEE Trans. Dependable Secur. Comput., 2006

A unified model for unconditionally secure key distribution.
J. Comput. Secur., 2006

Properties and constraints of cheating-immune secret sharing schemes.
Discret. Appl. Math., 2006

2005
Security of public-key cryptosystems based on Chebyshev polynomials.
IEEE Trans. Circuits Syst. I Regul. Pap., 2005

Analysis and Design of Distributed Key Distribution Centers.
J. Cryptol., 2005

2004
Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures.
Theor. Comput. Sci., 2004

H<sub>YPPOCRATES</sub>: a new proactive password checker.
J. Syst. Softw., 2004

Design of Self-Healing Key Distribution Schemes.
Des. Codes Cryptogr., 2004

Definitions and Bounds for Self-Healing Key Distribution Schemes.
Proceedings of the Automata, Languages and Programming: 31st International Colloquium, 2004

2003
Contrast Optimal Threshold Visual Cryptography Schemes.
SIAM J. Discret. Math., 2003

A Ramp Model for Distributed Key Distribution Schemes.
Discret. Appl. Math., 2003

A flaw in a self-healing key distribution scheme.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

A New Self-Healing Key Distribution Scheme.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Anonymous Group Communication in Mobile Networks.
Proceedings of the Theoretical Computer Science, 8th Italian Conference, 2003

Fault Tolerant and DistributedBroadcast Encryption.
Proceedings of the Topics in Cryptology, 2003

2002
New Results on Unconditionally Secure Distributed Oblivious Transfer.
Proceedings of the Selected Areas in Cryptography, 2002

A Novel Approach to Proactive Password Checking.
Proceedings of the Infrastructure Security, International Conference, 2002

The Key Establishment Problem.
Proceedings of the Foundations of Security Analysis and Design II, 2002

On Unconditionally Secure Robust Distributed Key Distribution Centers.
Proceedings of the Advances in Cryptology, 2002

2001
A t-private k-database information retrieval scheme.
Int. J. Inf. Sec., 2001

Generalized Zig-zag Functions and Oblivious Transfer Reductions.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

Hyppocrates.
Proceedings of the Information Security, 4th International Conference, 2001

On the Distribution of a Key Distribution Center.
Proceedings of the Theoretical Computer Science, 7th Italian Conference, 2001

1999
A tau-Restricted Key Agreement Scheme.
Comput. J., 1999


  Loading...