Now showing items 11-15 of 15

    • On Provable Security of Entity Authentication Schemes 

      Flores, Manuela (Universita degli studi di Salerno, 2019-03-06)
      Entity authentication is the process allowing a user, in a distributed system, to gain confidence in the identity of one (or more) communication user. Such a process may be either unilateral (the users are involved in a ...
    • Real-time face analysis for gender recognition on video sequences 

      Greco, Antonio (Universita degli studi di Salerno, 2018-03-05)
      This research work has been produced with the aim of performing gender recognition in real-time on face images extracted from real video sequences. The task may appear easy for a human, but it is not so simple for a computer ...
    • Round and computational efficiency of two-party protocols 

      Ciampi, Michele (Universita degli studi di Salerno, 2018-03-03)
      A cryptographic protocol is defined by the behaviour of the involved parties and the messages that those parties send to each other. Beside the functionality and the security that a cryptographic protocol provides, it ...
    • Statistical models for the characterization, identification and mitigation of distributed attacks in data networks 

      Di Mauro, Mario (Universita degli studi di Salerno, 2018-03-09)
      The thesis focuses on statistical approaches to model, mitigate, and prevent distributed network attacks. When dealing with distributed network attacks (and, more in general, with cyber-security problems), three fundamental ...
    • Teamwork collaboration around CAE models in an industrial context 

      Gargiulo, Claudio (Universita degli studi di Salerno, 2017-09-05)
      Medium and Large Companies must compete every day in a global context. To achieve greater efficiency in their products/processes they are forced to globalize by opening multiple locations in geographically distant places. ...