default search action
Paolo D'Arco
Person information
- affiliation: Università di Salerno, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Paolo D'Arco, Roberto De Prisco, Angel L. Pérez del Pozo:
Efficient and reliable post-quantum authentication. Theor. Comput. Sci. 1003: 114597 (2024) - 2023
- [j27]Paolo D'Arco, Zahra Ebadi Ansaroudi, Francesco Mogavero:
Multi-stage Proof-of-Works: Properties and vulnerabilities. Theor. Comput. Sci. 976: 114108 (2023) - 2022
- [j26]Paolo D'Arco, Roberto De Prisco, Zahra Ebadi Ansaroudi, Rocco Zaccagnino:
Gossamer: weaknesses and performance. Int. J. Inf. Sec. 21(3): 669-687 (2022) - 2021
- [j25]Paolo D'Arco, Roberto De Prisco, Alfredo De Santis:
Secret sharing schemes for infinite sets of participants: A new design technique. Theor. Comput. Sci. 859: 149-161 (2021) - [c34]Paolo D'Arco, Francesco Mogavero:
On (Multi-stage) Proof-of-Works. BLOCKCHAIN 2021: 91-105 - [c33]Paolo D'Arco, Zahra Ebadi Ansaroudi:
Security Attacks on Multi-Stage Proof-of-Work. PerCom Workshops 2021: 698-703 - [p1]Xavier Carpent, Paolo D'Arco, Roberto De Prisco:
Ultra-lightweight Authentication. Security of Ubiquitous Computing Systems 2021: 99-112 - 2020
- [c32]Paolo D'Arco, Zahra Ebadi Ansaroudi:
Secret Disclosure Attacks on a Recent Ultralightweight Mutual RFID Authentication Protocol for Blockchain-Enabled Supply Chains. SoCPaR 2020: 880-890 - [i6]Paolo D'Arco, Francesco Mogavero:
On (multi-stage) Proof-of-Work blockchain protocols. IACR Cryptol. ePrint Arch. 2020: 1262 (2020)
2010 – 2019
- 2019
- [c31]Paolo D'Arco, Marco Nilo:
A New Instance of a Lightweight Authentication Protocol Based on the LPN Problem. I-SPAN 2019: 118-132 - 2018
- [c30]Paolo D'Arco, Roberto De Prisco, Alfredo De Santis:
On the Equivalence of 2-Threshold Secret Sharing Schemes and Prefix Codes. CSS 2018: 157-167 - [c29]Paolo D'Arco, Roberto De Prisco, Angel L. Pérez del Pozo:
An Efficient and Reliable Two-Level Lightweight Authentication Protocol. CSS 2018: 168-180 - [c28]Paolo D'Arco, Roberto De Prisco, Alfredo De Santis, Angel L. Pérez del Pozo, Ugo Vaccaro:
Probabilistic Secret Sharing. MFCS 2018: 64:1-64:16 - [c27]Paolo D'Arco, Roberto De Prisco:
Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols. SEC 2018: 3-17 - [c26]Paolo D'Arco:
Ultralightweight Cryptography - Some Thoughts on Ten Years of Efforts. SecITC 2018: 1-16 - 2017
- [j24]Paolo D'Arco, María Isabel González Vasco, Angel L. Pérez del Pozo, Claudio Soriente, Rainer Steinwandt:
Private set intersection: New generic constructions and feasibility results. Adv. Math. Commun. 11(3): 481-502 (2017) - [j23]Arcangelo Castiglione, Paolo D'Arco, Alfredo De Santis, Rosario Russo:
Secure group communication schemes for dynamic heterogeneous distributed computing. Future Gener. Comput. Syst. 74: 313-324 (2017) - 2016
- [j22]Paolo D'Arco, Navid Nasr Esfahani, Douglas R. Stinson:
All or Nothing at All. Electron. J. Comb. 23(4): 4 (2016) - [j21]Paolo D'Arco, Roberto De Prisco:
Secure computation without computers. Theor. Comput. Sci. 651: 11-36 (2016) - [c25]Paolo D'Arco, Roberto De Prisco, Yvo Desmedt:
Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography. ICITS 2016: 95-113 - [c24]Paolo D'Arco, Roberto De Prisco:
Visual Cryptography - Models, Issues, Applications and New Directions. SECITC 2016: 20-39 - 2015
- [j20]Paolo D'Arco, Alfredo De Santis:
Anonymous protocols: Notions and equivalence. Theor. Comput. Sci. 581: 9-25 (2015) - [i5]Paolo D'Arco, Navid Nasr Esfahani, Douglas R. Stinson:
All or Nothing at All. CoRR abs/1510.03655 (2015) - [i4]Paolo D'Arco, Navid Nasr Esfahani, Douglas R. Stinson:
All or Nothing at All. IACR Cryptol. ePrint Arch. 2015: 998 (2015) - 2014
- [j19]Paolo D'Arco, Roberto De Prisco, Alfredo De Santis:
Measure-independent characterization of contrast optimal visual cryptography schemes. J. Syst. Softw. 95: 89-99 (2014) - 2013
- [j18]Paolo D'Arco, Angel L. Pérez del Pozo:
Toward tracing and revoking schemes secure against collusion and any form of secret information leakage. Int. J. Inf. Sec. 12(1): 1-17 (2013) - [c23]Paolo D'Arco, Roberto De Prisco:
Secure Two-Party Computation: A Visual Way. ICITS 2013: 18-38 - [c22]Paolo D'Arco, Roberto De Prisco, Alfredo De Santis:
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes. ICITS 2013: 39-55 - [c21]Paolo D'Arco, Alfredo De Santis:
Key privacy and anonymous protocols. PST 2013: 11-18 - [i3]Paolo D'Arco, Roberto De Prisco:
Secure two-party computation: a visual way. IACR Cryptol. ePrint Arch. 2013: 257 (2013) - 2012
- [c20]Paolo D'Arco, María Isabel González Vasco, Angel L. Pérez del Pozo, Claudio Soriente:
Size-Hiding in Private Set Intersection: Existential Results and Constructions. AFRICACRYPT 2012: 378-394 - 2011
- [j17]Paolo D'Arco, Alfredo De Santis:
On Ultralightweight RFID Authentication Protocols. IEEE Trans. Dependable Secur. Comput. 8(4): 548-563 (2011) - [c19]Paolo D'Arco, Angel L. Pérez del Pozo:
Fighting Pirates 2.0. ACNS 2011: 359-376 - [c18]Paolo D'Arco:
An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control. WISTP 2011: 69-84 - 2010
- [j16]Paolo D'Arco, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Variations on a theme by Akl and Taylor: Security and tradeoffs. Theor. Comput. Sci. 411(1): 213-227 (2010)
2000 – 2009
- 2009
- [c17]Paolo D'Arco, Alessandra Scafuro, Ivan Visconti:
Revisiting DoS Attacks and Privacy in RFID-Enabled Networks. ALGOSENSORS 2009: 76-87 - [c16]Paolo D'Arco, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants. MFCS 2009: 247-257 - 2008
- [c15]Paolo D'Arco, Alfredo De Santis:
Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol. AFRICACRYPT 2008: 27-39 - [i2]Paolo D'Arco, Alfredo De Santis:
From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2008: 470 (2008) - 2007
- [j15]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson:
On Unconditionally Secure Distributed Oblivious Transfer. J. Cryptol. 20(3): 323-373 (2007) - [c14]Paolo D'Arco, Alfredo De Santis:
Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation. ICITS 2007: 46-64 - 2006
- [j14]Paolo D'Arco, Wataru Kishimoto, Douglas R. Stinson:
Properties and constraints of cheating-immune secret sharing schemes. Discret. Appl. Math. 154(2): 219-233 (2006) - [j13]Stelvio Cimato, Antonella Cresti, Paolo D'Arco:
A unified model for unconditionally secure key distribution. J. Comput. Secur. 14(1): 45-64 (2006) - [j12]Angelo Ciaramella, Paolo D'Arco, Alfredo De Santis, Clemente Galdi, Roberto Tagliaferri:
Neural Network Techniques for Proactive Password Checking. IEEE Trans. Dependable Secur. Comput. 3(4): 327-339 (2006) - [j11]Carlo Blundo, Paolo D'Arco, Alfredo De Santis:
On Self-Healing Key Distribution Schemes. IEEE Trans. Inf. Theory 52(12): 5455-5467 (2006) - 2005
- [j10]Carlo Blundo, Paolo D'Arco:
Analysis and Design of Distributed Key Distribution Centers. J. Cryptol. 18(4): 391-414 (2005) - [j9]Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Ljupco Kocarev:
Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. I Regul. Pap. 52-I(7): 1382-1393 (2005) - 2004
- [j8]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Massimiliano Listo:
Design of Self-Healing Key Distribution Schemes. Des. Codes Cryptogr. 32(1-3): 15-44 (2004) - [j7]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi:
HYPPOCRATES: a new proactive password checker. J. Syst. Softw. 71(1-2): 163-175 (2004) - [j6]Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró:
Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures. Theor. Comput. Sci. 320(2-3): 269-291 (2004) - [c13]Carlo Blundo, Paolo D'Arco, Alfredo De Santis:
Definitions and Bounds for Self-Healing Key Distribution Schemes. ICALP 2004: 234-245 - [i1]Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Ljupco Kocarev:
Security of public key cryptosystems based on Chebyshev Polynomials. CoRR cs.CR/0411030 (2004) - 2003
- [j5]Carlo Blundo, Paolo D'Arco, Carles Padró:
A Ramp Model for Distributed Key Distribution Schemes. Discret. Appl. Math. 128(1): 47-64 (2003) - [j4]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson:
Contrast Optimal Threshold Visual Cryptography Schemes. SIAM J. Discret. Math. 16(2): 224-261 (2003) - [c12]Paolo D'Arco, Douglas R. Stinson:
Fault Tolerant and DistributedBroadcast Encryption. CT-RSA 2003: 263-280 - [c11]Stelvio Cimato, Paolo D'Arco, Ivan Visconti:
Anonymous Group Communication in Mobile Networks. ICTCS 2003: 316-328 - [c10]Carlo Blundo, Paolo D'Arco, Massimiliano Listo:
A New Self-Healing Key Distribution Scheme. ISCC 2003: 803-808 - [c9]Carlo Blundo, Paolo D'Arco, Massimiliano Listo:
A flaw in a self-healing key distribution scheme. ITW 2003: 163-166 - 2002
- [c8]Paolo D'Arco, Douglas R. Stinson:
On Unconditionally Secure Robust Distributed Key Distribution Centers. ASIACRYPT 2002: 346-363 - [c7]Carlo Blundo, Paolo D'Arco:
The Key Establishment Problem. FOSAD 2002: 44-90 - [c6]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi:
A Novel Approach to Proactive Password Checking. InfraSec 2002: 30-39 - [c5]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson:
New Results on Unconditionally Secure Distributed Oblivious Transfer. Selected Areas in Cryptography 2002: 291-309 - 2001
- [j3]Carlo Blundo, Paolo D'Arco, Carles Padró:
A Ramp Model for Distributed Key Distribution Schemes. Electron. Notes Discret. Math. 6: 45-54 (2001) - [j2]Carlo Blundo, Paolo D'Arco, Alfredo De Santis:
A t-private k-database information retrieval scheme. Int. J. Inf. Sec. 1(1): 64-68 (2001) - [c4]Paolo D'Arco:
On the Distribution of a Key Distribution Center. ICTCS 2001: 357-369 - [c3]Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró:
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. ISC 2001: 1-17 - [c2]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi:
Hyppocrates. ISC 2001: 63-80 - [c1]Paolo D'Arco, Douglas R. Stinson:
Generalized Zig-zag Functions and Oblivious Transfer Reductions. Selected Areas in Cryptography 2001: 87-102
1990 – 1999
- 1999
- [j1]Carlo Blundo, Paolo D'Arco, Antonio Giorgio Gaggia:
A tau-Restricted Key Agreement Scheme. Comput. J. 42(1): 51-61 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-11 20:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint