Now showing items 3-15 of 15

    • Cognitive Models and Computational Approaches for improving Situation Awareness Systems 

      D'Aniello, Giuseppe (Universita degli studi di Salerno, 2018-03-08)
      The world of Internet of Things is pervaded by complex environments with smart services available every time and everywhere. In such a context, a serious open issue is the capability of information systems to support ...
    • Cyber security and ubiquity: an human-centric approach 

      Colella, Antonio (Universita degli studi di Salerno, 2017-06-23)
      Recent security breaches showed that every attack begins with the involvement of users and continues with the exploitation of technology bugs. In almost all cases, without human collaboration, conscious and unconscious, ...
    • Delayed-Input and Non-Malleable Cryptographic Protocols 

      Siniscalchi, Luisa (Universita degli studi di Salerno, 2018-03-12)
      A major goal in the design of cryptographic protocols is to re- duce the number of communication rounds. Since a cryptographic protocol usually consists of a composition and interplay of some subprotocols and cryptographic ...
    • Fuzzy models for group decision making and applications to e-learning and recommender systems 

      Capuano, Nicola (Universita degli studi di Salerno, 2018-03-08)
      The work presented in the Ph.D. thesis deals with the definition of new fuzzy models for Group Decision Making (GDM) aimed at improving two phases of the decision process: preferences expression and aggregation. In ...
    • Improvement in the management of cryptographic keys in a HSM and proposal of an Outdoor Position Certification Authority 

      Mannetta, Marco (Universita degli studi di Salerno, 2019-03-07)
      The following doctoral thesis comprises two distinct sections, both describing a specific applied research concerning the macro-theme of computer security. The first section describes a proposal for the improvement and ...
    • Methods and algorithms for behavioral modeling of ferrite power inductors 

      Stoyka, Kateryna (Universita degli studi di Salerno, 2019-03-12)
      Information technology allows solving numerous problems regarding all the aspects of everyday life, including technical activities related to the design of devices and systems. In the electronic eld, di erent types of ...
    • Methods and algorithms for power devices losses behavioral modeling 

      Migliaro, Mario (Universita degli studi di Salerno, 2017-08-07)
      Power electronics is since decades in the focus of very important technology innovations, as the characteristics and the performances of power supplies can severely condition and limit the performances of the system to ...
    • Model Checking Cyber-Physical Systems 

      Driouich, Youssef (Universita degli studi di Salerno, 2019-03-12)
      Cyber-Physical Systems (CPSs) are integrations of computation with physical processes. Applications of CPS arguably have the potential to overshadow the 20-th century IT revolution. Nowadays, CPSs application to many ...
    • On Provable Security of Entity Authentication Schemes 

      Flores, Manuela (Universita degli studi di Salerno, 2019-03-06)
      Entity authentication is the process allowing a user, in a distributed system, to gain confidence in the identity of one (or more) communication user. Such a process may be either unilateral (the users are involved in a ...
    • Real-time face analysis for gender recognition on video sequences 

      Greco, Antonio (Universita degli studi di Salerno, 2018-03-05)
      This research work has been produced with the aim of performing gender recognition in real-time on face images extracted from real video sequences. The task may appear easy for a human, but it is not so simple for a computer ...
    • Round and computational efficiency of two-party protocols 

      Ciampi, Michele (Universita degli studi di Salerno, 2018-03-03)
      A cryptographic protocol is defined by the behaviour of the involved parties and the messages that those parties send to each other. Beside the functionality and the security that a cryptographic protocol provides, it ...
    • Statistical models for the characterization, identification and mitigation of distributed attacks in data networks 

      Di Mauro, Mario (Universita degli studi di Salerno, 2018-03-09)
      The thesis focuses on statistical approaches to model, mitigate, and prevent distributed network attacks. When dealing with distributed network attacks (and, more in general, with cyber-security problems), three fundamental ...
    • Teamwork collaboration around CAE models in an industrial context 

      Gargiulo, Claudio (Universita degli studi di Salerno, 2017-09-05)
      Medium and Large Companies must compete every day in a global context. To achieve greater efficiency in their products/processes they are forced to globalize by opening multiple locations in geographically distant places. ...