Paolo D’Arco was born in Salerno (Italy) on July 7th, 1972. He received a Masterdegree (with honors) in Computer Science, from the University of Salerno, in May 1997. From the same university, in February 2002, he received a PhD in Computer Science,defending a thesis in cryptography. During the PhD program he attended a few schoolsfor PhD students on algorithms and cryptography. In the last year of the program hespent a semester studying abroad at the University of Waterloo, in Ontario, (Canada). He also had two short-term visits at the University of Catalunya in Barcelona, andat Telcordia Technologies (DIMACS), in New Jersey (United States). From November2001 to October 2002, he was back at the University of Waterloo, as a post-doctoralfellow at the Centre for Applied Cryptographic Research (CACR), in the Department ofCombinatorics and Optimization, under the supervision of professor Douglas Stinson. In2003 he won a competition for a permanent position at the University of Salerno, wherecurrently he is assistant professor at the Faculty of Science.
His main research interests are cryptography, algorithms and data security. He has
worked on the design and the analysis of unconditionally secure cryptographic primi-tives and protocols, (e.g., secret sharing schemes, key distribution, distributed oblivioustransfer, private information retrieval from a database) and on some computationally se-cure scheme (e.g., robust and distributed broadcast schemes, anonymous communicationschemes, rfid authentication). In some papers he has also done some crypto-analysis ofnew protocols. Regarding data security, he has mainly worked on techniques for proactivepassword checking. Currently, he is interested in efficient protocols for secure two-partyand multi-party computation.
Since 2005 he has joined 30 program committees of international conferences, and he
has been invited speaker at the Smart University (2007), at the Third Pythagorean Con-ference on Geometry, Combinatorial Design and Cryptology (2003), and at the SummerMeeting of the Canadian Mathematical Society (CMS) (2002). Since December 2008he is a member of the PhD Faculty Board for the PhD program in Computer Science,at the University of Salerno. From 2004 to 2009 he has taught courses in algorithmsand data structures, operating systems, network and network security, for undergrad-uate programs in Computer Science. He has been tutoring more than 40 students fortheir end-of-degree exams, and co-tutoring a PhD student. Since 2005 he is tutor forthe department for the Erasmus student-exchange program. He has leaded two projectsfor young researchers (years 2001 and 2002) which received two-year funds, and he hasactively participated in national and international research projects (e.g. joint actionsItaly-Spain). He has also been involved in three Italian PRIN projects on encrypteddatabases, user privacy and genomic computing, funded for the periods 2006-2008, 2008-2010, and 2012-2014, respectively. He has been a member of the network of excellence incryptography ECRYPT, IST-2002-507932, and of the network ECRYPT II, ICT-2007-216646, funded for the periods 2004-2008 and 2008-2012, respectively. He has also beena member of the local organizing committees for the conferences Security in Communi-cation Networks, years 1999, 2002, 2004, 2010 and 2012, and of the 17th InternationalSymposium on Distributed Computing, in 2003. He has published 40 papers in inter-national journals and in the proceedings of conferences in theoretical computer science,cryptography and data security.
First Name: PaoloFamily Name: D’ArcoBirth Date: July 7, 1972Birth Place: Salerno (Italy)Citizenship: Italian
AddressDipartimento di InformaticaUniversit`
Via Giovanni Paolo II, 13284084 Fisciano (SA)
Phone: +39 089 969718Fax: +39 089 969600E-mail: pdarco@unisa.itURL: http://www.di.unisa.it/professori/paodar
Assistant Professor at Dipartimento di Informatica, Universit`
Cryptography, algorithms, and data security.
• Post-Doctoral Fellowship received by the Italian Centro di Competenza RCOST,
a del Sannio, Italy, for a project in the Information and Commu-
nication Technology area. Period: July 2004 - December 2004.
• Post-Doctoral Fellowship received by Facolt`
partimento di Informatica ed Applicazioni of the Universit`
• Post-Doctoral Fellowship received by the Centre for Applied Cryptographic Re-
search (CACR), at the Department of Combinatorics and Optimization of theUniversity of Waterloo, Ontario, Canada. Advisor: Prof. Douglas R. Stinson. Period: November 2001 - October 2002.
• In February 2012 and in May 2011, visiting researcher at the Mathematical Cryp-
tology Group at the Universidad Rey Juan Carlos, Madrid, Spain.
• In October 2006 participant at the Autumn International School on Zero Knowl-
edge: Foundations and Applications, Bertinoro, Bologna, Italy.
• On February 2002, PhD in Computer Science (Dottorato di Ricerca in Informatica)
a degli Studi di Salerno, with a Thesis in Cryptography. Title:
Distribution and Obliviousness. The Key Establishment Problem. Advisor: Prof. Carlo Blundo.
• From January 2001 to May 2001, visiting researcher at the Centre for Applied
Cryptographic Research, in the Department of Combinatorics and Optimization ofthe University of Waterloo, Ontario, Canada.
• In June 2001, visiting researcher at DIMACS (Telcordia Tecnologies), New Jersey,
• In November 2000, visiting researcher at the Departament de Matem`
• In July 2000, participant at the 12th International School for Computer Science
Researchers on E-commerce and On-line Algorithms, Lipari, Italy, 2000. Lecturesgiven by: S. Micali, M. Bellare, T. Rabin, M. Yung, A. Borodin, A. Blum e J. Kleinberg.
• In June 1999, participant at the 5th International Summer School on Distributed
Computing: Advanced Distributed Computing, Siena, Italy. Lectures given by: S. Dolev, C. Dwork, D. Peleg e N. Santoro
• In July 1998 participant at the 10th International School for Computer Science
Researchers on Distributed Systems and Security, Lipari, Italy. Lectures given by:A. Shamir, A. De Santis, S. Micali, P. Rogaway, R. Gennaro, M. Herlihy, L. Shrirae Y. Afek.
• On May 1997, Master (with Honors) in Computer Science (Laurea cum laude in
Scienze dell’Informazione) at the Universit`
a degli Studi di Salerno, with a thesis (in
Italian) in Cryptography. Title: Crittografia Visuale. Il Contrasto negli Schemi aSoglia (Visual Cryptography. The Contrast in Threshold Schemes). Advisor: Prof. Alfredo De Santis.
Italian (mother tongue) and English (fluent).
1. Program Committee member of the 16th International Conference on Information
Security and Cryptology (ICISC 2013), November 27 - 29, 2013, Seoul, Korea.
2. Program Committee member of the 10th European Workshop: Research and Ap-
plications (EUROPKI 2013), September 12-13, 2013, Rhul, Egham, UK.
3. Program Committee member of the International Conference on Intelligence Fu-
sion (ICIF 2013), June 27-29, 2013, Jeju Island, Korea.
4. Program Committee member of the 9th Workshop on Rfid Security (RFIDSEC
2013), July 9-11, 2013, Graz, Austria.
5. Program Committee member of the 15th International Conference on Information
Security and Cryptology (ICISC 2012), November 28-30, 2012, Seoul, Corea.
6. Program Committee member of the 9th European Workshop on PKI: Research and
Applications (EUROPKI 2012), September 13-14, 2012, Pisa, Italia
7. Editorial board member for the Special Issue on Security and Privacy in Complex
Systems, IEEE Systems Journal, period: 10/2011 – 10/2012.
8. Program Committee member of the International Conference on Information Se-
curity and Cryptology (ICISC 2011), November 30 - December 2, 2011, Seoul,Korea.
9. Program Committee member of the International Conference on Computer Con-
vergence Technology (ICCCT 2011), October 20 − 22, 2011, Seoul, Korea.
10. Program Committee member of the 2nd International Conference on Security-
enriched Urban Computing and Smart Grids (SUCOMS 2011), September 21 − 23,2011, Hualien, Taiwan.
11. Program Committee member of the 8th European Workshop on PKI, Services and
Applications (EUROPKI 2011), September 15 − 16, 2011, Leuven, Belgium.
12. Program Committee member of the International Conference on Security and
Cryptography (SECRYPT 2011), July 16 − 18, 2011, Seville, Spain.
13. Program Committee member of the 5-th International Conference on Information
Theoretic Security (ICITS 2011), May 21 − 24, 2011, Amsterdam, Holland.
14. Program Committee member of the 14th International Conference on Practice and
Theory in Public Key Cryptography (PKC 2011), March 6 − 9, 2011, Taormina,Italy.
15. Program Committee member of the International Conference on Information Se-
curity and Cryptology (ICISC 2010), December 1 − 3, 2010, Seoul, Korea.
16. Program Committee member of the International Conference on Security Technol-
ogy (SecTech 2010), November 11 − 13, 2010, Bali, Indonesia.
17. Program Committee member of the First International Conference on Security-
enriched Urban Computing and Smart Grid (SUCOMS 2010), September 15 − 17,2010, Daejeon, Korea.
18. Program Committee member of the International Conference on Security and
Cryptography (SECRYPT 2010), July 26 − 28, 2009, Athens, Greece.
19. Program Committee member of the The 4th International Conference on Informa-
tion Security and Assurance (ISA 2010), June 23 − 25, 2010, Miyazaki, Japan.
20. Program Committee member of the International Conference on Security Technol-
ogy (SecTech 2009), December 10 − 12, 2009, Jeju Island, Korea.
21. Program Committee member of the International Conference on Information The-
oretic Security (ICITS 2009), December 2 − 5, 2009, Shizuoka, Japan.
22. Program Committee member of the International Conference on Information Se-
curity and Cryptology (ICISC 2009), December 2 − 4, 2009, Seoul, Korea
23. Program Committee member of the International Conference on Information Se-
curity and Cryptology (ISCISC 2009), October 7 − 8, 2009, Isfahan, Iran.
24. Program Committee member of the International Conference on Security and
Cryptography (SECRYPT 2009), July 7 − 10, 2009, Milan, Italy.
25. Program Committee member of the International Workshop on Computer Graph-
ics, Multimedia and Security (CGMS-09), June 25 − 27, 2009, Korea University,Seoul, Korea.
26. Program Committee member of the International Conference on Information Se-
curity and Cryptology (ICISC 2008), December 3 − 5, 2008, Seoul, Korea
27. Program Committee member of the International Conference on Information The-
oretic Security (ICITS 2008), August 10 − 13, 2008, Calgary, Canada.
28. Program Committee member of the International Conference on Information Se-
curity and Cryptology (ICISC 2007), November 29 − 30, 2007, Seoul, Korea.
29. Program Committee member of the International Conference on Security and
Cryptography (SECRYPT 2007), July 28 − 31, 2007, Barcelona, Spain.
30. Program Committee member of the International Conference on Security and
Cryptography (SECRYPT 2006), August 7-10, 2006, Setubal, Portugal.
31. Program Committee member of the 6-th Workshop on Information Security Ap-
plications (WISA 2005), August 22-24, 2005, Jeju Island, Korea.
1. Invited Speaker at the Smart University, track Digital Rights Management, From
Research to Implementations, September 17-20, 2007, Sophia Antipolis, FrenchRiviera. Title fo the Lecture: After the Gutman report: Perspectives of OS-levelsupport for DRMs.
2. Invited Speaker at the Third Pythagorean Conference on Geometry, Combinatorial
Design and Cryptology, Rhodes, Greece, June 1-7, 2003. Title of the Lecture: KeyDistribution with Key-Recovery Techniques over Unreliable Networks.
3. Invited Speaker at the Summer Meeting of the Canadian Mathematical Society
(CMS), University of Laval, Quebec City, Quebec, Canada, June 15-17, 2002. Titleof the Lecture: Distributed Oblivious Transfer and Applications to Cryptography.
• Unix Network Programming, undergraduate, 2009-2010, 2011-2012, 2012-2013, Uni-
• Network Security Complements, undergraduate, 2006-2007, 2007-2008, 2008-2009,
2009-2010, 2011-2012, 2012-2013, University of Salerno.
• Operating System, undergraduate, 2005-2006, 2006-2007, 2007-2008, 2008-2009,
• Algorithms, undergraduate, 2004-2005, University of Salerno.
1. Coordinator of the Italian Project Sistemi per il controllo proattivo di password
(Proactive Password Checking Systems). The project received a two-year grant inJune 2001 from the Ministero della Universit`
Ministry of University and Scientific Research).
2. Coordinator of the Italian Project Oblivious Transfer e Applicazioni al Commercio
Elettronico (Oblivious Transfer and Applications to e-Commerce). The projectreceived a two-year grant in June 2002 from the Ministero della Universit`
Ricerca Scientifica (Italian Ministry of University and Scientific Research). .
3. Member of Progetto ex 60% - Universit`
a di Salerno, anno 1998. Title: Algoritmi:
4. Member of Progetto ex 60% - Universit`
a di Salerno, anno 1999. Title: Algoritmi:
Animazione, Compressione e Sicurezza con Applicazioni su Internet.
5. Member of Progetto ex 60% - Universit`
a di Salerno, anno 2000. Title: Sicurezza,
Codici e Compressione: Progetto, Analisi e Realizzazione.
6. Member of the Joint Action Italy–Spain - MIUR, anno 2000. Title: Schemi per la
Distribuzione di Chiavi Crittografiche.
7. Member of Progetto Giovani Ricercatori CNR Agenzia 2000: Title: Pubblicit`
Online: Nuove Misure per Nuovi Media. Auditing ed Accounting Sicuro sul Web.
8. Member of Progetto ex 60% - Universit`
putazione, Comunicazione e Sicurezza in Reti di Calcolatori.
9. Member of Progetto ex 40% - MURST, anno 2001: MEFISTO: Metodi Formali per
la Sicurezza (coordinatore scientifico: Prof. R. Gorrieri, Universit`
10. Member of Progetto ex 60% - Universit`
a di Salerno, anno 2002. Title: Sicurezza e
Algoritmi in Protocolli di Comunicazione.
11. Member of Progetto ex 60% - Universit`
a di Salerno, anno 2003. Title: Sicurezza
12. Member of the European Network of Excellence in Cryptology - ECRYPT, IST-
13. Member of Progetto ex 60% - Universit`
a di Salerno, anno 2004. Title: Sicurezza
Dati, Computazione Distribuita e Compressione Dati.
14. Member of Progetto ex 60% - Universit`
a di Salerno, anno 2005. Title: Sicurezza,
15. Member of Progetto ex 60% - Universit`
a di Salerno, anno 2006: Title: Sicurezza
delle reti, animazione di protocolli crittografici e algoritmi .
a di Salerno, 2006-2008. Title: Progettazione, analisi ed implementazione di
protocolli crittografici per la protezione dei dati sensibili e la gestione dei privilegiper il controllo degli accessi in basi di dati distribuite.
17. Member of Progetto ex 60% - Universit`
a di Salerno, anno 2007. Title: Protocolli
crittografici e algoritmi di compressione.
18. Member of the European Network of Excellence in Cryptology - ECRYPT II, ICT-
19. Member of Progetto ex 60% - Universit`
a di Salerno, anno 2008. Title: Sicurezza,
privatezza e compressione in documenti multimediali e tecnologia Rfid.
a di Salerno, 2008-2010. Title: Progettazione ed analisi di protocolli crittografici
per la tutela della privacy personale e dei dati in basi di dati e dispositivi mobili.
21. Member of Progetto ex 60% - Universit`
a di Salerno, anno 2009: Algoritmi per la
privacy, la compressione dati e la composizione musicale.
22. Member of Progetto ex 60% - Universit`
23. Member of Progetto ex 60% - Universit`
a di Salerno, anno 2011: Algoritmi e com-
24. Member of Progetto ex 60% - Universit`
a di Salerno, anno 2012: Protocolli sicuri,
metodi per la digital forensics, tecniche di compressione e algoritmi per la musi-matica.
25. Spanish project supported by ”Ministerio de Economa y Competitividad”, Grant
MTM-2012-15167, anni 2011/2013: Provable secure cryptography.
26. Member of Progetto PRIN: - 10 Universities and a few research institutes, years
2012/2014: Data-Centric Genomic Computing (GenData 2020).
1. Member of the local organizing committee for the conference SCN 12, Security and
Cryptography for Networks, Amalfi (SA), September 5–7, 2012.
2. Member of the local organizing committee for the conference SCN 10, Security and
Cryptography for Networks, Amalfi (SA), September 13–15, 2010.
3. Member of the local organizing committee for the conference SCN 04, Security in
Communication Networks, Amalfi (SA), September 8–10, 2004.
4. Member of the local organizing committee for the conference DISC 2003, 17th
International Symposium on Distributed Computing, Sorrento (NA), Ottobre 1–3,2003.
5. Member of the local organizing committee for the conference SCN 02, Security in
Communication Networks, Amalfi (SA), September 12–13, 2002.
6. Member of the local organizing committee for the conference SCN 99, Security in
Communication Networks, Amalfi (SA), September 16–17, 1999.
• IACR (International Association for Cryptologic Research)
• EATCS (European Association for Theoretical Computer Science)
• Journals for which papers have been reviewed: ACM Transactions on Information
and System Security, Siam Journal on Discrete Mathematics, IEEE Transactionson Information Theory, IEEE Transactions on Dependable and Secure Computing,IEEE Transactions on Industrial Informatics, IEEE Transactions on InformationForensics and Security, IEEE Transactions on Parallel and Distributed Systems,IEEE Transactions on Signal Processing, IEEE Transactions on Circuits and Sys-tems, IEEE Transactions on Wireless Communications, Theoretical Computer Sci-ence, Journal of Theoretical Informatics and Applications, Information and Com-putation, Journal of Mathematical Cryptology, Journal of Systems and Software,Information Processing Letters, Design, Codes and Cryptography, AustralasianJournal of Combinatorics, Journal of Network Security.
• Conferences for which papers have been reviewed: ESORICS 2012, SAC 2011,
DISC 2011, ESORICS 2011, ASIACRYPT 2010, PKC2010, ESORICS 2010, ICALP2010, ASIACRYPT 2009, PKC 2009, ASIACRYPT 2008, DISC 2008, ASIACCS2008, ICISC 2007, ICICS 2006, PKC 2006, SPA 2005, ICALP 2005, SIROCCO2005, STACS 2005, WMAN 2005, SAC 2004, DISC 2003, DNS 2003, PODC 2003,ASIACRYPT 2003, ESORICS 2002, SAC02, SCN02, IEEE ISIT2002, CRYPTO2001, EUROCRYPT 2001, IEEE ISIT2000, CIAC 2000, SCN99, EUROCRYPT1999.
• From January 2005 external reviewer for the Research Grants Council (RGC) of
Towards tracing and revoking schemes secure against collusion and any form of
secret information leakage. International Journal of Information Security, Vol. 12, N. 1, pp. 1-17, Springer-Verlag, 2013.
On Ultra-Lightweight RFID Authentication Protocols.
IEEE Transactions on Dependable and Secure Computing, Vol. 8, N. 4, pp. 548-563, 2011.
3. P. D’Arco, A. De Santis, A. L. Ferrara and B. Masucci.
Variations on a Theme by Akl and Taylor: Security and Tradeoffs.
Theoretical Computer Science, N. 441, pp. 213–227, 2010.
4. C. Blundo, P. D’Arco, A. De Santis, and D. Stinson.
On Unconditionally Secure Distributed Oblivious Transfer.
Journal of Cryptology, Vol 20, N. 3, pp. 323-375, 2007.
5. C. Blundo, P. D’Arco, and A. De Santis.
On Self-healing Key Distribution Schemes.
IEEE Transactions on Information Theory, Vol. 52, N. 12, pp., 5455-5468, 2006.
6. A. Ciaramella, P. D’Arco, A. De Santis, C. Galdi, and R. Tagliaferri.
Neural Network Techniques for Proactive Password Checking.
IEEE Transactions on Dependable and Secure Computing, Vol. 3, N. 4, pp. 219-233, 2006.
7. S. Cimato, A. Cresti, e P. D’Arco.
A Unified Model for Unconditionally Secure Key Distribution.
Journal of Computer Security, Vol. 14, n.1, pp. 45–64, 2006.
8. P. D’Arco, W. Kishimoto, and D. Stinson.
Properties and Constraints of Cheating-Immune Secret Sharing Scheme.
Discrete Applied Mathematics, Vol. 154, pp. 219–233, 2006.
9. P. Bergamo, P. D’Arco, A. De Santis, and L. Kocarev.
Security of Public Key Cryptosystems based on Chebyshev Polynomials.
IEEE Transactions on Circuits and Systems I, Vol. 52, N. 7, pp. 1382–1393, 2005.
Analysis and Design of Distributed Key Distribution Centers.
Journal of Cryptology, Vol. 18, N. 4, pp. , 391–414, 2005.
11. C. Blundo, P. D’Arco V. Daza and C. Padr`
Bounds and Constructions for Unconditionally Secure Distributed Key Distribu-
tion Schemes for General Access Structures. Theoretical Computer Science, Vol. 320, pp. 269–291, 2004.
12. C. Blundo, P. D’Arco, A. De Santis, and M. Listo.
Design of Self-healing Key Distribution Schemes.
Design, Codes, and Cryptography, Vol. 32, pp. 15–44, 2004
13. C. Blundo, P. D’Arco, A. De Santis and C. Galdi.
Hyppocrates: A New Proactive Password Checker.
Journal of Systems and Software, Vol. 71, pp. 163–175, 2004.
14. C. Blundo, P. D’Arco, A. De Santis, and D. R. Stinson.
Contrast Optimal Threshold Visual Cryptography Schemes.
SIAM Journal on Discrete Mathematics, Vol. 16, Issue 2, pp. 224–261, 2003.
A Ramp Model for Distributed Key Distribution Schemes.
Discrete Applied Mathematics, Vol. 128, pp. 47–64, 2003.
16. C. Blundo, P. D’Arco and A. De Santis.
A t-Private k-Database Information Retrieval Scheme.
International Journal of Information Security (IJIS), Vol. 1, Issue 1, pp. 64-68,2001.
17. C. Blundo, P. D’Arco and A. Giorgio Gaggia.
A τ -Restricted Key Agreement Scheme.
The Computer Journal, Vol. 42, Issue 1, pp. 51-61, 1999.
Proc. of the IEEE 11th International Conference on Privacy, Security and Trust(PST2013), July 10-12, 2013. ISBN 978-1-4673-5839-2.
19. P. D’Arco, M. I. Gonzalez Vasco, A. L. Perez del Pozo, and C. Soriente
Size-Hiding in Private Set Intersection: Existential Results and Constructions
Proc. of the 5th International Conference on Cryptology (Africacrypt 2012). Lec-ture Notes in Computer Science, Vol. 7374, pp. 378-394, Springer Verlag, 2012.
20. P. D’Arco and Angel L. Perez del Pozo
Proceedings of the 9th International Conference on Applied Cryptography andNetwork Security (ACNS 2011). Lecture Notes in Computer Science, Vol. 6715,pp. 359-376, Springer Verlag, 2011.
An Almost-Optimal Forward-Private Rfid Mutual Authentication Protocol with
Tag Control. Proceedings of the 5th Workshop in Information Security Theory and Practise(WISTP 2011), Lecture Notes in Computer Science, Vol. 6633, pp. 69-84, SpringerVerlag, 2011.
22. P. D’Arco, A. De Santis, A. L. Ferrara, and B. Masucci.
Security and Tradeoffs of the Akl-Taylor Scheme and its Variants.
Proc. of the 34th International Symposium on Mathematical Foundations of Com-puter Science (MFCS 2009). Lecture Notes in Computer Science, Vol. 5734, pp. 247-257, Springer Verlag, 2009.
23. P. D’Arco, A. Scafuro and I. Visconti.
Semi-Destructive Privacy in RFID Systems.
Proc. of the 5-th Workshop on RFID Security (RFIDSec ’09).
24. P. D’Arco, A. Scafuro and I. Visconti.
Revisiting DoS Attacks and Privacy in RFID-Enabled Networks.
Proc. of the 5th International Workshop on Algorithmic Aspects of Wireless SensorNetworks (ALGOSENSORS ’09). Lecture Notes in Computer Science, Vol.5304,pp. 76–87, 2009.
Weaknesses in a Recent Ultra-lightweight RFID Authentication Protocol.
Progress in Cryptology - AfricaCrypt 2008, Lecture Notes in Computer Science,Vol. 5023, pp. 27–39, 2008.
Optimising SD and LSD in presence of non-uniform probabilities of revocation.
Proc. of the 1st International Conference on Information Theoretic Security (IC-ITS07) Lecture Notes in Computer Science, Vol. 4883, pp. 46–64, 2009.
27. C. Blundo, P. D’Arco, and A. De Santis.
Definitions and Bounds for Self-healing Key Distribution.
Proc. of the 31st International Colloquium on Automata, Languages, and Pro-gramming (ICALP 2004). Lecture Notes in Computer Science, Vol. 3142, pp. 234-246, Springer-Verlag, 2004.
28. S. Cimato, P. D’Arco, and I. Visconti.
Anonymous Group Communication for Mobile Networks.
Proc. of the Italian Conference on Theoretical Computer Science (ICTCS 2003). Lecture Notes in Computer Science, Vol. 2814, pp. 316-328, Springer-Verlag, 2003.
29. C. Blundo, P. D’Arco, and M. Listo.
A New Self-healing Key Distribution Scheme.
Proc. of IEEE Symposium on Computers and Communications (ISCC 2003), Vol. 1, pp. 803-808, 2003.
Fault Tolerant and Distributed Broadcast Encryption.
Proc. of the Cryptographers’ Track RSA Conference 2003 (CT-RSA 2003). LectureNotes in Computer Science, Vol. 2612, pp. 262-279, Springer Verlag, 2003.
31. C. Blundo, P. D’Arco and M. Listo.
A Flaw in a Self-Healing Key Distribution Scheme.
Proc. of the 2003 IEEE Information Theory Workshop (ITW ’03), Vol. 1, pp. 163-166, 2003.
32. P. D’Arco, W. Kishimoto, and D. Stinson.
Proceedings of the International Workshop on Coding and Cryptography (WCC2003), pp. 111-120, 2003.
On Unconditionally Secure Distributed Key Distribution Centers.
Proc. of ASIACRYPT 2002. Lecture Notes in Computer Science, Vol. 2501, pp. 346-363, Springer Verlag, 2002.
34. C. Blundo, P. D’Arco, A. De Santis and D. Stinson.
New Results on Unconditionally Secure Distributed Oblivious Transfer.
Proc. of Selected Areas in Cryptography (SAC 2002). Lecture Notes in ComputerScience, Vol. 2595, pp. 291-309, Springer Verlag, 2003.
35. C. Blundo, P. D’Arco, A. De Santis and C. Galdi.
A Novel Approach to Proactive Password Checking.
Proc. of the Infrastructure Security Conference (INFRASEC 2002). Lecture Notesin Computer Science, Vol. 2437, pp.30–39, Springer Verlag, 2002.
Generalized Zig-zag Functions and Oblivious Transfer Reductions.
Proc. of Selected Areas in Cryptography (SAC2001). Lecture Notes in ComputerScience, Vol. 2259, pp. 87-102, Springer Verlag, 2002.
A Ramp Model for Distributed Key Distribution Schemes.
Proc. of the International Workshop on Coding and Cryptography (WCC2001),pp. 93-102, 2001.
38. C. Blundo, P. D’Arco, A. De Santis and C. Galdi.
Hyppocrates: A New Proactive Password Checker.
Proc. of the Information Security Conference (ISC 2001). Lecture Notes in Com-puter Science, vol. 2200, pp. 63-80, Springer Verlag, 2001.
On the Distribution of a Key Distribution Center.
Proc. of the Italian Conference on Theoretical Computer Science (ICTCS 2001). Lecture Notes in Computer Science, Vol. 2202, pp. 357-369, Springer Verlag, 2001.
40. C. Blundo, P. D’Arco V. Daza and C. Padr`
Bounds and Constructions for Unconditionally Secure Distributed Key DistributionSchemes for General Access Structures. Proc. of the Information Security Conference (ISC 2001). Lecture Notes in Com-puter Science, Vol. 2200, pp. 1-17 , Springer Verlag, 2001.
An Information Theoretic Model for Distributed Key Distribution.
Proc. of the IEEE International Symposium on Information Theory (ISIT2000),p. 267, 2000.
Lecture Notes in Computer Science (Tutorial), Vol. 2946, pp. 44 – 90, Springer-Verlag, 2004.
TESTO FIT Packing of 30's MRP: 600 for 30's Pack (inclusive all taxes ) Each Capsule Contains : Indications Libido disorders, Erectyl dysfunction, improves sperm production & sperm count Dosage: Two Cap. Preferably with hot milk before bed time OR As Advised by Physician. TESTO FIT ASHWAGANDHA: (Withinnia somnifera) is an Indian herb that is also known as
Spirometriundersökningar inom företagshälsovården vid medicinska kontroller av arbetsmiljöskäl. Förord. Innehållet i denna skrift är framtaget av docent Hans Hedenström vid avd. för klinisk fysiolo-gi, Akademiska sjukhuset, Uppsala i samarbete med docent Maria Albin, Yrkes- och miljö-medicinska kliniken, Universitetssjukhuset i Lund, överläkare Leif Aringer, Arbetsmiljöver-