Search
Now showing items 1-10 of 81
Model Checking Cyber-Physical Systems
(2019-03-12)
Cyber-Physical Systems (CPSs) are integrations of computation with physical
processes. Applications of CPS arguably have the potential to overshadow the
20-th century IT revolution. Nowadays, CPSs application to many sectors ...
Round and computational efficiency of two-party protocols
(2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages
that those parties send to each other. Beside the functionality and the security that a cryptographic
protocol provides, it is ...
Coverage in Wireless Sensor Networks with additional operating time constraints: efficient algorithms
(2021-06-11)
Nowadays there is a growing interest in wireless sensor networks, one of the most
significant technologies of the 21𝑠𝑡 century. A wireless sensor network (WSN) is
essentially composed by a large number of electronic ...
Improvement in the management of cryptographic keys in a HSM and proposal of an Outdoor Position Certification Authority
(2019-03-07)
The following doctoral thesis comprises two distinct sections, both describing a
specific applied research concerning the macro-theme of computer security. The
first section describes a proposal for the improvement and ...
Cyber security and ubiquity: an human-centric approach
(2017-06-23)
Recent security breaches showed that every attack begins with the involvement of users and continues with the exploitation of technology bugs. In almost all cases, without human collaboration, conscious and unconscious, ...
Fuzzy models for group decision making and applications to e-learning and recommender systems
(2018-03-08)
The work presented in the Ph.D. thesis deals with the definition of new fuzzy models
for Group Decision Making (GDM) aimed at improving two phases of the decision process: preferences
expression and aggregation. In particular ...
Teamwork collaboration around CAE models in an industrial context
(2017-09-05)
Medium and Large Companies must compete every day in a global context. To achieve
greater efficiency in their products/processes they are forced to globalize by opening
multiple locations in geographically distant places. ...
Intelligent privacy safeguards for the digital society
(2021-05-24)
The growth of the Internet and the pervasiveness of Information and Communication Technology (ICT) have led to a radical
change in our society, a deep economical, commercial and social
impact on our lives. To date, most ...
Biometric system in homeland security context
(2021-06-20)
The mission of homeland security is ensuring the safety of living communities and protecting
citizens from unforeseen events. In this research field, intelligent and advanced systems are
extremely useful to prevent from ...
Empowering computational science through extreme scalability
(2021-05-24)
Computational science is an ever-expanding research eld. It combines tech-
nologies, modern computational methods, and simulations to address prob-
lems too complex to be e ectively predicted by theory alone or too ...