• Biometric system in homeland security context 

      Barra, Paola (Universita degli studi di Salerno, 2021-06-20)
      The mission of homeland security is ensuring the safety of living communities and protecting citizens from unforeseen events. In this research field, intelligent and advanced systems are extremely useful to prevent from ...
    • Cyber security and ubiquity: an human-centric approach 

      Colella, Antonio (Universita degli studi di Salerno, 2017-06-23)
      Recent security breaches showed that every attack begins with the involvement of users and continues with the exploitation of technology bugs. In almost all cases, without human collaboration, conscious and unconscious, ...
    • Delayed-Input and Non-Malleable Cryptographic Protocols 

      Siniscalchi, Luisa (Universita degli studi di Salerno, 2018-03-12)
      A major goal in the design of cryptographic protocols is to re- duce the number of communication rounds. Since a cryptographic protocol usually consists of a composition and interplay of some subprotocols and cryptographic ...
    • Empowering computational science through extreme scalability 

      D'Auria, Matteo (Universita degli studi di Salerno, 2021-05-24)
      Computational science is an ever-expanding research eld. It combines tech- nologies, modern computational methods, and simulations to address prob- lems too complex to be e ectively predicted by theory alone or too ...
    • Fuzzy models for group decision making and applications to e-learning and recommender systems 

      Capuano, Nicola (Universita degli studi di Salerno, 2018-03-08)
      The work presented in the Ph.D. thesis deals with the definition of new fuzzy models for Group Decision Making (GDM) aimed at improving two phases of the decision process: preferences expression and aggregation. In ...
    • Improvement in the management of cryptographic keys in a HSM and proposal of an Outdoor Position Certification Authority 

      Mannetta, Marco (Universita degli studi di Salerno, 2019-03-07)
      The following doctoral thesis comprises two distinct sections, both describing a specific applied research concerning the macro-theme of computer security. The first section describes a proposal for the improvement and ...
    • Model Checking Cyber-Physical Systems 

      Driouich, Youssef (Universita degli studi di Salerno, 2019-03-12)
      Cyber-Physical Systems (CPSs) are integrations of computation with physical processes. Applications of CPS arguably have the potential to overshadow the 20-th century IT revolution. Nowadays, CPSs application to many ...
    • On Provable Security of Entity Authentication Schemes 

      Flores, Manuela (Universita degli studi di Salerno, 2019-03-06)
      Entity authentication is the process allowing a user, in a distributed system, to gain confidence in the identity of one (or more) communication user. Such a process may be either unilateral (the users are involved in a ...
    • Round and computational efficiency of two-party protocols 

      Ciampi, Michele (Universita degli studi di Salerno, 2018-03-03)
      A cryptographic protocol is defined by the behaviour of the involved parties and the messages that those parties send to each other. Beside the functionality and the security that a cryptographic protocol provides, it ...
    • Soft biometrics: emerging traits and applications 

      Bisogni, Carmen (Universita degli studi di Salerno, 2021-04-12)
      Biometrics has been a thriving field of Pattern Recognition forlong. Both Academia and Business have thus focused their at-tention in the practical use of biometrics to advance and pro-mote varying applications in ...
    • Teamwork collaboration around CAE models in an industrial context 

      Gargiulo, Claudio (Universita degli studi di Salerno, 2017-09-05)
      Medium and Large Companies must compete every day in a global context. To achieve greater efficiency in their products/processes they are forced to globalize by opening multiple locations in geographically distant places. ...