AAAAAA

   
Results: 1-9 |
Results: 9

Authors: Blundo, C Bonis, AD Santis, AD
Citation: C. Blundo et al., Improved schemes for visual cryptography, DES CODES C, 24(3), 2001, pp. 255-278

Authors: Ateniese, G Blundo, C De Santis, A Stinson, DR
Citation: G. Ateniese et al., Extended capabilities for visual cryptography, THEOR COMP, 250(1-2), 2001, pp. 143-161

Authors: Blundo, C De Santis, A Naor, M
Citation: C. Blundo et al., Visual cryptography for grey level images, INF PROCESS, 75(6), 2000, pp. 255-259

Authors: Blundo, C De Santis, A Persiano, G Vaccaro, U
Citation: C. Blundo et al., Randomness complexity of private computation, COMP COMPLE, 8(2), 1999, pp. 145-168

Authors: Blundo, C De Santis, A Stinson, DR
Citation: C. Blundo et al., On the contrast in visual cryptography schemes, J CRYPTOL, 12(4), 1999, pp. 261-289

Authors: Blundo, C De Santis, A Kurosawa, K Ogata, W
Citation: C. Blundo et al., On a fallacious bound for authentication codes, J CRYPTOL, 12(3), 1999, pp. 155-159

Authors: Blundo, C Cresti, A
Citation: C. Blundo et A. Cresti, Unconditional secure conference key distribution schemes with disenrollment capability, INF SCI, 120(1-4), 1999, pp. 113-130

Authors: Blundo, C De Santis, A Gaggia, AG
Citation: C. Blundo et al., Probability of shares in secret sharing schemes, INF PROCESS, 72(5-6), 1999, pp. 169-175

Authors: Blundo, C D'Arco, P Gaggia, AG
Citation: C. Blundo et al., A tau-restricted key agreement scheme, COMPUTER J, 42(1), 1999, pp. 51-61
Risultati: 1-9 |