Search
Now showing items 11-20 of 42
On the verification of parametric and real-time systems
(Universita degli studi di Salerno, 2011-05-06)
Parametric and Real-Time Systems play a central role in the theory underlying
the Verification and Synthesis problems.
Real-time systems are present everywhere and are used in safety critical
applications, such as flight ...
Predicate encryption systems. No query left unanswered
(Universita degli studi di Salerno, 2011-05-09)
Predicate encryption is an important cryptographic primitive (see [7, 14, 28]) that enables
fine-grained control on the decryption keys. Let T be a class of binary predicates. Roughly speaking, in a predicate encryption ...
Fuzzy concept analysis for semantic knowledge extraction
(Universita degli studi di Salerno, 2012-03-22)
Availability of controlled vocabularies, ontologies, and so on is enabling feature to provide some added values in terms of knowledge management. Nevertheless, the design, maintenance and construction of domain ontologies ...
Supporting learning activities in virtual worlds: methods, tools and evaluation
(Universita degli studi di Salerno, 2013-02-27)
Continuing advances and reduced costs in computational power, graphics and network bandwidth let 3D immersive multi‐user Virtual Worlds (VWs) become increasingly accessible while offering an improved and engaging quality ...
On the Generalizations of Identity-Based Encryption
(Universita degli studi di Salerno, 2013-04-16)
Today public-key cryptographic is widely deployed and successfully used but still a major drawback
exists. In fact, from encrypted data a party can either decrypt or cannot learn anything at all about the
message other ...
Steganographic methods for information hiding in MS-Office files
(Universita degli studi di Salerno, 2013-04-20)
The simplest container of digital information is “the file" and among the vast array of files currently available, MS-Office files are probably the most widely used. These files, starting from MS-Office 2007, respect the ...
Secure End-to-End Communications in Mobile Networks
(Universita degli studi di Salerno, 2011-05-06)
Cellular communication has become an important part of our daily life.
Besides using cell phones for voice communication, we are now able to access
the Internet, conduct monetary transactions, send voice, video and ...
On the evolution of digital evidence: novel approaches for cyber investigation
(Universita degli studi di Salerno, 2014-04-23)
Nowadays Internet is the fulcrum of our world, and the World Wide Web is the key to
access it. We develop relationships on social networks and entrust sensitive documents to
online services. Desktop applications are being ...
Designing usable mobile interfaces for spatial data
(Universita degli studi di Salerno, 2012-03-29)
This
dissertation
deals
mainly
with
the
discipline
of
Human-‐Computer
Interaction
(HCI),
with
particular
attention
on
the
role
that
it
plays
in
the
domain
of
modern
mobile
devices.
Mobile
dev ...
Search-based approaches for software development effort estimation
(Universita degli studi di Salerno, 2015-06-19)
Effort estimation is a critical activity for planning and monitoring software project development and for delivering the product on time and within budget. Significant over or under-estimates expose a software project to ...