Now showing items 1-6 of 6

  • Cyber security and ubiquity: an human-centric approach 

    Colella, Antonio (Universita degli studi di Salerno, 2017-06-23)
    Recent security breaches showed that every attack begins with the involvement of users and continues with the exploitation of technology bugs. In almost all cases, without human collaboration, conscious and unconscious, ...
  • Teamwork collaboration around CAE models in an industrial context 

    Gargiulo, Claudio (Universita degli studi di Salerno, 2017-09-05)
    Medium and Large Companies must compete every day in a global context. To achieve greater efficiency in their products/processes they are forced to globalize by opening multiple locations in geographically distant places. ...
  • Round and computational efficiency of two-party protocols 

    Ciampi, Michele (Universita degli studi di Salerno, 2018-03-03)
    A cryptographic protocol is defined by the behaviour of the involved parties and the messages that those parties send to each other. Beside the functionality and the security that a cryptographic protocol provides, it ...
  • Real-time face analysis for gender recognition on video sequences 

    Greco, Antonio (Universita degli studi di Salerno, 2018-03-05)
    This research work has been produced with the aim of performing gender recognition in real-time on face images extracted from real video sequences. The task may appear easy for a human, but it is not so simple for a computer ...
  • Fuzzy models for group decision making and applications to e-learning and recommender systems 

    Capuano, Nicola (Universita degli studi di Salerno, 2018-03-08)
    The work presented in the Ph.D. thesis deals with the definition of new fuzzy models for Group Decision Making (GDM) aimed at improving two phases of the decision process: preferences expression and aggregation. In ...
  • Delayed-Input and Non-Malleable Cryptographic Protocols 

    Siniscalchi, Luisa (Universita degli studi di Salerno, 2018-03-12)
    A major goal in the design of cryptographic protocols is to re- duce the number of communication rounds. Since a cryptographic protocol usually consists of a composition and interplay of some subprotocols and cryptographic ...