• Improvement in the management of cryptographic keys in a HSM and proposal of an Outdoor Position Certification Authority 

      Mannetta, Marco (Universita degli studi di Salerno, 2019-03-07)
      The following doctoral thesis comprises two distinct sections, both describing a specific applied research concerning the macro-theme of computer security. The first section describes a proposal for the improvement and ...
    • Methods and algorithms for behavioral modeling of ferrite power inductors 

      Stoyka, Kateryna (Universita degli studi di Salerno, 2019-03-12)
      Information technology allows solving numerous problems regarding all the aspects of everyday life, including technical activities related to the design of devices and systems. In the electronic eld, di erent types of ...
    • Methods and algorithms for power devices losses behavioral modeling 

      Migliaro, Mario (Universita degli studi di Salerno, 2017-08-07)
      Power electronics is since decades in the focus of very important technology innovations, as the characteristics and the performances of power supplies can severely condition and limit the performances of the system to ...
    • Model Checking Cyber-Physical Systems 

      Driouich, Youssef (Universita degli studi di Salerno, 2019-03-12)
      Cyber-Physical Systems (CPSs) are integrations of computation with physical processes. Applications of CPS arguably have the potential to overshadow the 20-th century IT revolution. Nowadays, CPSs application to many ...
    • On Provable Security of Entity Authentication Schemes 

      Flores, Manuela (Universita degli studi di Salerno, 2019-03-06)
      Entity authentication is the process allowing a user, in a distributed system, to gain confidence in the identity of one (or more) communication user. Such a process may be either unilateral (the users are involved in a ...
    • Real-time face analysis for gender recognition on video sequences 

      Greco, Antonio (Universita degli studi di Salerno, 2018-03-05)
      This research work has been produced with the aim of performing gender recognition in real-time on face images extracted from real video sequences. The task may appear easy for a human, but it is not so simple for a computer ...
    • Round and computational efficiency of two-party protocols 

      Ciampi, Michele (Universita degli studi di Salerno, 2018-03-03)
      A cryptographic protocol is defined by the behaviour of the involved parties and the messages that those parties send to each other. Beside the functionality and the security that a cryptographic protocol provides, it ...
    • Soft biometrics: emerging traits and applications 

      Bisogni, Carmen (Universita degli studi di Salerno, 2021-04-12)
      Biometrics has been a thriving field of Pattern Recognition forlong. Both Academia and Business have thus focused their at-tention in the practical use of biometrics to advance and pro-mote varying applications in ...
    • Statistical models for the characterization, identification and mitigation of distributed attacks in data networks 

      Di Mauro, Mario (Universita degli studi di Salerno, 2018-03-09)
      The thesis focuses on statistical approaches to model, mitigate, and prevent distributed network attacks. When dealing with distributed network attacks (and, more in general, with cyber-security problems), three fundamental ...
    • Statistical Techniques for Mitigation and Prevention of Distributed Attacks over Communication Networks 

      Tambasco, Marco (Universita degli studi di Salerno, 2021-04-09)
      The thesis is focused on statistical methods to characterize, mitigate, and counteract distributed network attacks. When coping with distributed network attacks such as Distributed Denial of Service (DDoS) attacks, two ...
    • Teamwork collaboration around CAE models in an industrial context 

      Gargiulo, Claudio (Universita degli studi di Salerno, 2017-09-05)
      Medium and Large Companies must compete every day in a global context. To achieve greater efficiency in their products/processes they are forced to globalize by opening multiple locations in geographically distant places. ...