Search
Now showing items 1-10 of 14
Coverage in Wireless Sensor Networks with additional operating time constraints: efficient algorithms
(2021-06-11)
Nowadays there is a growing interest in wireless sensor networks, one of the most
significant technologies of the 21𝑠𝑡 century. A wireless sensor network (WSN) is
essentially composed by a large number of electronic ...
Improvement in the management of cryptographic keys in a HSM and proposal of an Outdoor Position Certification Authority
(2019-03-07)
The following doctoral thesis comprises two distinct sections, both describing a
specific applied research concerning the macro-theme of computer security. The
first section describes a proposal for the improvement and ...
Biometric system in homeland security context
(2021-06-20)
The mission of homeland security is ensuring the safety of living communities and protecting
citizens from unforeseen events. In this research field, intelligent and advanced systems are
extremely useful to prevent from ...
Round and computational efficiency of two-party protocols
(2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages
that those parties send to each other. Beside the functionality and the security that a cryptographic
protocol provides, it is ...
On Provable Security of Entity Authentication Schemes
(2019-03-06)
Entity authentication is the process allowing a user, in a distributed system, to gain confidence in the identity of one (or more) communication user. Such a process may be either unilateral (the users are involved in a ...
Teamwork collaboration around CAE models in an industrial context
(2017-09-05)
Medium and Large Companies must compete every day in a global context. To achieve
greater efficiency in their products/processes they are forced to globalize by opening
multiple locations in geographically distant places. ...
Intelligent privacy safeguards for the digital society
(2021-05-24)
The growth of the Internet and the pervasiveness of Information and Communication Technology (ICT) have led to a radical
change in our society, a deep economical, commercial and social
impact on our lives. To date, most ...
Enhancing the Sharing and the Management of Personal Data in the Big Data Era
(2022-02-22)
Nowadays, thanks to the digitalization of business processes and public
administrations, many significant Big data collections are available. Users are direct
suppliers of data when publishing contents on social networks. ...
Delayed-Input and Non-Malleable Cryptographic Protocols
(2018-03-12)
A major goal in the design of cryptographic protocols is to re-
duce the number of communication rounds. Since a cryptographic
protocol usually consists of a composition and interplay of some
subprotocols and cryptographic ...
Empowering computational science through extreme scalability
(2021-05-24)
Computational science is an ever-expanding research eld. It combines tech-
nologies, modern computational methods, and simulations to address prob-
lems too complex to be e ectively predicted by theory alone or too ...