• English
    • italiano
  • English 
    • English
    • italiano
  • Login
Search 
  •   DSpace Home
  • Tesi di dottorato
  • Area Ingegneria civile, elettronica, industriale
  • Informatica ed Ingegneria dell'Informazione
  • Search
  •   DSpace Home
  • Tesi di dottorato
  • Area Ingegneria civile, elettronica, industriale
  • Informatica ed Ingegneria dell'Informazione
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-10 of 14

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Coverage in Wireless Sensor Networks with additional operating time constraints: efficient algorithms 

Iossa, Antonio (2021-06-11)
Nowadays there is a growing interest in wireless sensor networks, one of the most significant technologies of the 21𝑠𝑡 century. A wireless sensor network (WSN) is essentially composed by a large number of electronic ...
Thumbnail

Improvement in the management of cryptographic keys in a HSM and proposal of an Outdoor Position Certification Authority 

Mannetta, Marco (2019-03-07)
The following doctoral thesis comprises two distinct sections, both describing a specific applied research concerning the macro-theme of computer security. The first section describes a proposal for the improvement and ...
Thumbnail

Biometric system in homeland security context 

Barra, Paola (2021-06-20)
The mission of homeland security is ensuring the safety of living communities and protecting citizens from unforeseen events. In this research field, intelligent and advanced systems are extremely useful to prevent from ...
Thumbnail

Round and computational efficiency of two-party protocols 

Ciampi, Michele (2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages that those parties send to each other. Beside the functionality and the security that a cryptographic protocol provides, it is ...
Thumbnail

On Provable Security of Entity Authentication Schemes 

Flores, Manuela (2019-03-06)
Entity authentication is the process allowing a user, in a distributed system, to gain confidence in the identity of one (or more) communication user. Such a process may be either unilateral (the users are involved in a ...
Thumbnail

Teamwork collaboration around CAE models in an industrial context 

Gargiulo, Claudio (2017-09-05)
Medium and Large Companies must compete every day in a global context. To achieve greater efficiency in their products/processes they are forced to globalize by opening multiple locations in geographically distant places. ...
Thumbnail

Intelligent privacy safeguards for the digital society 

Guarino, Alfonso (2021-05-24)
The growth of the Internet and the pervasiveness of Information and Communication Technology (ICT) have led to a radical change in our society, a deep economical, commercial and social impact on our lives. To date, most ...
Thumbnail

Enhancing the Sharing and the Management of Personal Data in the Big Data Era 

Desiato, Domenico (2022-02-22)
Nowadays, thanks to the digitalization of business processes and public administrations, many significant Big data collections are available. Users are direct suppliers of data when publishing contents on social networks. ...
Thumbnail

Delayed-Input and Non-Malleable Cryptographic Protocols 

Siniscalchi, Luisa (2018-03-12)
A major goal in the design of cryptographic protocols is to re- duce the number of communication rounds. Since a cryptographic protocol usually consists of a composition and interplay of some subprotocols and cryptographic ...
Thumbnail

Empowering computational science through extreme scalability 

D'Auria, Matteo (2021-05-24)
Computational science is an ever-expanding research eld. It combines tech- nologies, modern computational methods, and simulations to address prob- lems too complex to be e ectively predicted by theory alone or too ...
  • 1
  • 2
EleA themes by Ugsiba
 

 

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsBy Submit DateThis CollectionBy Issue DateAuthorsTitlesSubjectsBy Submit Date

My Account

LoginRegister

Discover

AuthorBarra, Paola (1)Bisogni, Carmen (1)Capuano, Nicola (1)Ciampi, Michele (1)Colella, Antonio (1)D'Auria, Matteo (1)Desiato, Domenico (1)Driouich, Youssef (1)Flores, Manuela (1)Gargiulo, Claudio (1)... View MoreSubject
INF/01 INFORMATICA (14)
Machine learning (2)Proof system (2)Authentication schemes (1)Automatic verification (1)Collaboration (1)Computational science (1)Cryptographic (1)CSCW (1)Cyber (1)... View MoreDate Issued2021 (5)2018 (3)2019 (3)2017 (2)2022 (1)Has File(s)Yes (14)
EleA themes by Ugsiba