Personal information

Verified email domains

Activities

Employment (3)

Università degli Studi di Salerno: Fisciano, Campania, IT

2016-09-01 to present | Professor (Dipartimento di Scienze Aziendali - Management and Innovation Systems)
Employment
Source: Self-asserted source
Carlo BLUNDO

Università degli Studi di Salerno: Fisciano, IT

2015-09-01 to 2016-08-31 | Professor (Ingegneria dell'Informazione, Ingegneria Elettrica e Matematica Applicata)
Employment
Source: Self-asserted source
Carlo BLUNDO

Università degli Studi di Salerno: Fisciano, IT

2001-11-01 to 2015-08-31 | Professor (Dipartimento di Informatica)
Employment
Source: Self-asserted source
Carlo BLUNDO

Education and qualifications (1)

Università degli Studi di Salerno: Fisciano, IT

Education
Source: Self-asserted source
Carlo BLUNDO

Works (50 of 94)

Items per page:
Page 1 of 2

A Time-Aware Approach for MOOC Dropout Prediction Based on Rule Induction and Sequential Three-Way Decisions

IEEE Access
2023 | Journal article
Contributors: Carlo Blundo; Vincenzo Loia; Francesco Orciuoli
Source: check_circle
Crossref

Role mining under User-Distribution cardinality constraint

Journal of Information Security and Applications
2023-11 | Journal article
Contributors: Carlo Blundo; Stelvio Cimato
Source: check_circle
Crossref

Heuristics for constrained role mining in the post-processing framework

Journal of Ambient Intelligence and Humanized Computing
2023-08 | Journal article
Contributors: Carlo Blundo; Stelvio Cimato; Luisa Siniscalchi
Source: check_circle
Crossref

A time‐driven FCA‐based approach for identifying students' dropout in MOOCs

International Journal of Intelligent Systems
2022-04 | Journal article
Contributors: Carlo Blundo; Giuseppe Fenza; Graziano Fuccio; Vincenzo Loia; Francesco Orciuoli
Source: check_circle
Crossref

Managing Constraints in Role Based Access Control

IEEE Access
2020 | Journal article
Contributors: Carlo Blundo; Stelvio Cimato; Luisa Siniscalchi
Source: check_circle
Crossref

EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity

Journal of Computer Security
2014 | Journal article
EID:

2-s2.0-84901848656

Contributors: Blundo, C.; De Cristofaro, E.; Gasti, P.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Certified Information Access

Journal of Systems and Software
2013 | Journal article
EID:

2-s2.0-84881476253

Contributors: Blundo, C.; De Caro, A.; Galdi, C.; Persiano, G.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Constrained role mining

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | Book
EID:

2-s2.0-84893098631

Contributors: Blundo, C.; Cimato, S.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

EsPRESSo: Efficient privacy-preserving evaluation of sample set similarity

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | Book
EID:

2-s2.0-84872732449

Contributors: Blundo, C.; De Cristofaro, E.; Gasti, P.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Innovative approaches for security of small artefacts

Computer Science Review
2011 | Journal article
EID:

2-s2.0-78651378612

Contributors: Blundo, C.; De Caro, A.; Dolev, S.; Gilboa, N.; Kopeetsky, M.; Persiano, G.; Spirakis, P.G.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

A simple role mining algorithm

Proceedings of the ACM Symposium on Applied Computing
2010 | Conference paper
EID:

2-s2.0-77954724170

Contributors: Blundo, C.; Cimato, S.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Increasing privacy threats in the cyberspace: The case of italian E-passports

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010 | Book
EID:

2-s2.0-77956168943

Contributors: Auletta, V.; Blundo, C.; De Caro, A.; De Cristofaro, E.; Persiano, G.; Visconti, I.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Managing key hierarchies for access control enforcement: Heuristic approaches

Computers and Security
2010 | Journal article
EID:

2-s2.0-77955710442

Contributors: Blundo, C.; Cimato, S.; De Capitani Di Vimercati, S.; De Santis, A.; Foresti, S.; Paraboschi, S.; Samarati, P.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Predicate encryption with partial public keys

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010 | Book
EID:

2-s2.0-78651104734

Contributors: Blundo, C.; Iovino, V.; Persiano, G.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Secure metering schemes

Network Security
2010 | Book
EID:

2-s2.0-84892021607

Contributors: Blundo, C.; Cimato, S.; Masucci, B.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Untraceable tags based on mild assumptions

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010 | Book
EID:

2-s2.0-77951556774

Contributors: Blundo, C.; De Caro, A.; Persiano, G.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Efficient key management for enforcing access control in outsourced scenarios

IFIP Advances in Information and Communication Technology
2009 | Book
EID:

2-s2.0-78649858433

Contributors: Blundo, C.; Cimato, S.; De Capitani di Vimercati, S.; De Santis, A.; Foresti, S.; Paraboschi, S.; Samarati, P.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Private-key hidden vector encryption with key confidentiality

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009 | Book
EID:

2-s2.0-71549159428

Contributors: Blundo, C.; Iovino, V.; Persiano, G.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

A distributed implementation of the certified information access service

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008 | Book
EID:

2-s2.0-57049161469

Contributors: Blundo, C.; De Cristofaro, E.; Del Sorbo, A.; Galdi, C.; Persiano, G.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Improved security notions and protocols for non-transferable identification

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008 | Book
EID:

2-s2.0-57049171408

Contributors: Blundo, C.; Persiano, G.; Sadeghi, A.-R.; Visconti, I.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Validating orchestration of web services with BPEL and aggregate signatures

Proceedings of the 6th IEEE European Conference on Web Services, ECOWS'08
2008 | Conference paper
EID:

2-s2.0-58449130183

Contributors: Blundo, C.; De Cristofaro, E.; Galdi, C.; Persiano, G.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

A bluetooth-based JXME infrastructure

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007 | Book
EID:

2-s2.0-38349037622

Contributors: Blundo, C.; De Cristofaro, E.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

A J2ME transparent middleware to support HTTP connections over Bluetooth

Second International Conference on Systems and Networks Communications, ICSNC 2007
2007 | Conference paper
EID:

2-s2.0-47849084046

Contributors: Auletta, V.; Blundo, C.; De Cristofaro, E.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Authenticated web services: A ws-security based implementation

New Technologies, Mobility and Security
2007 | Conference paper
EID:

2-s2.0-84890513510

Contributors: Auletta, V.; Blundo, C.; Cimato, S.; De Cristofaro, E.; Raimato, G.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Low-randomness constant-round private XOR computations

International Journal of Information Security
2007 | Journal article
EID:

2-s2.0-33845696069

Contributors: Blundo, C.; Galdi, C.; Persiano, G.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

On unconditionally secure distributed oblivious transfer

Journal of Cryptology
2007 | Journal article
EID:

2-s2.0-34547232657

Contributors: Blundo, C.; D'Arco, P.; De Santis, A.; Stinson, D.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

A lightweight framework for Web Services invocation over bluetooth

Proceedings - ICWS 2006: 2006 IEEE International Conference on Web Services
2006 | Conference paper
EID:

2-s2.0-38949179864

Contributors: Auletta, V.; Blundo, C.; De Cristofaro, E.; Raimato, G.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

A Web service based micro-payment system

Proceedings - International Symposium on Computers and Communications
2006 | Conference paper
EID:

2-s2.0-34547345078

Contributors: Auletta, V.; Blundo, C.; Cimato, S.; Raimato, G.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

On self-healing key distribution schemes

IEEE Transactions on Information Theory
2006 | Journal article
EID:

2-s2.0-33947421166

Contributors: Blundo, C.; D'Arco, P.; De Santis, A.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Performance evaluation of web services invocation over bluetooth

PM2HW2N 2006: Proceedings of 2006 ACM International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks
2006 | Conference paper
EID:

2-s2.0-34547265661

Contributors: Auletta, V.; De Cristofaro, E.; Blundo, C.; Raimato, G.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Visual cryptography schemes with optimal pixel expansion

Theoretical Computer Science
2006 | Journal article
EID:

2-s2.0-33750998194

Contributors: Blundo, C.; Cimato, S.; De Santis, A.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

A lightweight approach to authenticated web caching

Proceedings - 2005 Symposium on Applications and the Internet, SAINT'2005
2005 | Conference paper
EID:

2-s2.0-78649718469

Contributors: Blundo, C.; Cimato, S.; De Prisco, R.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

A web service for certified email

IFIP Advances in Information and Communication Technology
2005 | Book
EID:

2-s2.0-84900386239

Contributors: Auletta, V.; Blundo, C.; Cimato, S.; Raimato, G.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Analysis and design of distributed key distribution centers

Journal of Cryptology
2005 | Journal article
EID:

2-s2.0-24944486697

Contributors: Blundo, C.; D'Arco, P.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Lecture Notes in Computer Science: Preface

Lecture Notes in Computer Science
2005 | Conference paper
EID:

2-s2.0-23944465005

Contributors: Blundo, C.; Cimato, S.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Randomness in self-healing key distribution schemes

2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security
2005 | Conference paper
EID:

2-s2.0-33750419991

Contributors: Blundo, C.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Secure e-coupons

Electronic Commerce Research
2005 | Journal article
EID:

2-s2.0-27444438240

Contributors: Blundo, C.; Cimato, S.; De Bonis, A.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

A framework for authenticated web services

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2004 | Book
EID:

2-s2.0-35048880949

Contributors: Blundo, C.; Cimato, S.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

A linear algebraic approach to metering schemes

Designs, Codes, and Cryptography
2004 | Journal article
EID:

2-s2.0-3843077429

Contributors: Blundo, C.; Martín, S.; Masucci, B.; Padró, C.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

A platform for secure e-gambling

International Conference on Information Technology: Coding Computing, ITCC
2004 | Conference paper
EID:

2-s2.0-3042690679

Contributors: Blundo, C.; Cimato, S.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

A software infrastructure for authenticated web metering

Computer
2004 | Other
EID:

2-s2.0-1942500394

Contributors: Blundo, C.; Cimato, S.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures

Theoretical Computer Science
2004 | Journal article
EID:

2-s2.0-2442659518

Contributors: Blundo, C.; D'Arco, P.; Daza, V.; Padró, C.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Definitions and bounds for self-healing key distribution schemes

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2004 | Book
EID:

2-s2.0-33646153894

Contributors: Blundo, C.; D'Arco, P.; De Santis, A.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Design of self-healing key distribution schemes

Designs, Codes, and Cryptography
2004 | Journal article
EID:

2-s2.0-3543067539

Contributors: Blundo, C.; D'Arco, P.; De Santis, A.; Listo, M.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Hyppocrates: A new proactive password checker

Journal of Systems and Software
2004 | Journal article
EID:

2-s2.0-1242275412

Contributors: Blundo, C.; D'Arco, P.; De Santis, A.; Galdi, C.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

Modeling a certified email protocol using I/O Automata

Electronic Notes in Theoretical Computer Science
2004 | Journal article
EID:

2-s2.0-18944405936

Contributors: Blundo, C.; Cimato, S.; De Prisco, R.; Ferrara, A.L.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

The key establishment problem

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2004 | Book
EID:

2-s2.0-31744446832

Contributors: Blundo, C.; D'Arco, P.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

A flaw in a self-healing key distribution scheme

Proceedings - 2003 IEEE Information Theory Workshop, ITW 2003
2003 | Conference paper
EID:

2-s2.0-84939166906

Contributors: Blundo, C.; D'Arco, P.; Listo, M.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

A new self-healing key distribution scheme

Proceedings - IEEE Symposium on Computers and Communications
2003 | Conference paper
EID:

2-s2.0-3543093716

Contributors: Blundo, C.; D'Arco, P.; Listo, M.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier

A ramp model for distributed key distribution schemes

Discrete Applied Mathematics
2003 | Journal article
EID:

2-s2.0-0038736959

Contributors: Blundo, C.; D'Arco, P.; Padró, C.
Source: Self-asserted source
Carlo BLUNDO via Scopus - Elsevier
Items per page:
Page 1 of 2