Cerca
Items 11-20 di 46
On the Generalizations of Identity-Based Encryption
(2013-04-16)
Today public-key cryptographic is widely deployed and successfully used but still a major drawback
exists. In fact, from encrypted data a party can either decrypt or cannot learn anything at all about the
message other ...
Steganographic methods for information hiding in MS-Office files
(2013-04-20)
The simplest container of digital information is “the file" and among the vast array of files currently available, MS-Office files are probably the most widely used. These files, starting from MS-Office 2007, respect the ...
Hybrid approaches based on computational intelligence and semantic web for distributed situation and context awareness
(2013-04-29)
The research work focuses on Situation Awareness and Context Awareness topics.
Specifically, Situation Awareness involves being aware of what is happening in the vicinity
to understand how information, events, and one’s ...
Virtual worlds for education: methodology, interaction and evaluation
(2014-05-20)
When students arrive in the classroom they expect to be involved in immersive, fun and challenging learning experiences. There is a high risk that they become quickly bored by the traditional instructional methods. The ...
3D data visualization techniques and applications for visual multidimensional data mining
(2014-04-21)
Despite modern technology provide new tools to measure the world around
us, we are quickly generating massive amounts of high-dimensional, spatialtemporal
data. In this work, I deal with two types of datasets: one in ...
Efficient distributed load balancing for parallel algorithms
(2011-04-29)
With the advent of massive parallel processing technology, exploiting the power
offered by hundreds, or even thousands of processors is all but a trivial task.
Computing by using multi-processor, multi-core or many-core ...
Network anaomaly detection based on the observation of multi-scale traffic dynamics
(2012-03-03)
Con la sempre più rapida crescita in termini di dimensioni e complessità delle moderne
infrastrutture di rete, l’attività di individuazione e prevenzione di abusi e violazioni nell’uso di tali infrastrutture sta diventando ...
A framework to access risks and derive requirements for a complex systems
(2014-04-22)
This thesis provides an innovative framework, based on the risk assessment methodology, to support the design of a pioneering complex systems, strongly ICT based, whose failures could threaten people, environment and society ...
On the evolution of digital evidence: novel approaches for cyber investigation
(2014-04-23)
Nowadays Internet is the fulcrum of our world, and the World Wide Web is the key to
access it. We develop relationships on social networks and entrust sensitive documents to
online services. Desktop applications are being ...
Secure End-to-End Communications in Mobile Networks
(2011-05-06)
Cellular communication has become an important part of our daily life.
Besides using cell phones for voice communication, we are now able to access
the Internet, conduct monetary transactions, send voice, video and ...