Search
Now showing items 1-10 of 12
Cyber security and ubiquity: an human-centric approach
(Universita degli studi di Salerno, 2017-06-23)
Recent security breaches showed that every attack begins with the involvement of users and continues with the exploitation of technology bugs. In almost all cases, without human collaboration, conscious and unconscious, ...
Round and computational efficiency of two-party protocols
(Universita degli studi di Salerno, 2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages
that those parties send to each other. Beside the functionality and the security that a cryptographic
protocol provides, it ...
Fuzzy models for group decision making and applications to e-learning and recommender systems
(Universita degli studi di Salerno, 2018-03-08)
The work presented in the Ph.D. thesis deals with the definition of new fuzzy models
for Group Decision Making (GDM) aimed at improving two phases of the decision process: preferences
expression and aggregation. In ...
Delayed-Input and Non-Malleable Cryptographic Protocols
(Universita degli studi di Salerno, 2018-03-12)
A major goal in the design of cryptographic protocols is to re-
duce the number of communication rounds. Since a cryptographic
protocol usually consists of a composition and interplay of some
subprotocols and cryptographic ...
Teamwork collaboration around CAE models in an industrial context
(Universita degli studi di Salerno, 2017-09-05)
Medium and Large Companies must compete every day in a global context. To achieve
greater efficiency in their products/processes they are forced to globalize by opening
multiple locations in geographically distant places. ...
On Provable Security of Entity Authentication Schemes
(Universita degli studi di Salerno, 2019-03-06)
Entity authentication is the process allowing a user, in a distributed system, to gain confidence in the identity of one (or more) communication user. Such a process may be either unilateral (the users are involved in a ...
Improvement in the management of cryptographic keys in a HSM and proposal of an Outdoor Position Certification Authority
(Universita degli studi di Salerno, 2019-03-07)
The following doctoral thesis comprises two distinct sections, both describing a
specific applied research concerning the macro-theme of computer security. The
first section describes a proposal for the improvement and ...
Model Checking Cyber-Physical Systems
(Universita degli studi di Salerno, 2019-03-12)
Cyber-Physical Systems (CPSs) are integrations of computation with physical
processes. Applications of CPS arguably have the potential to overshadow the
20-th century IT revolution. Nowadays, CPSs application to many ...
Empowering computational science through extreme scalability
(Universita degli studi di Salerno, 2021-05-24)
Computational science is an ever-expanding research eld. It combines tech-
nologies, modern computational methods, and simulations to address prob-
lems too complex to be e ectively predicted by theory alone or too ...
Soft biometrics: emerging traits and applications
(Universita degli studi di Salerno, 2021-04-12)
Biometrics has been a thriving field of Pattern Recognition forlong. Both Academia and Business
have thus focused their at-tention in the practical use of biometrics to advance and pro-mote varying
applications in ...