Search
Now showing items 1-10 of 59
Compression and protection of multidimensional data
(Universita degli studi di Salerno, 2015-05-05)
The main objective of this thesis is to explore and discuss novel techniques
related to the compression and protection of multidimensional data (i.e., 3-D
medical images, hyperspectral images, 3-D microscopy images and ...
New Insights on cryptographic hierarchical access control: models, schemes and analysis
(Universita degli studi di Salerno, 2016-05-24)
Nowadays the current network-centric world has given rise to several
security concerns regarding the access control management, which en-
sures that only authorized users are given access to certain resources
or tasks. ...
The value of privacy: concerns, attitudes, behaviors online, and information protection measures
(Universita degli studi di Salerno, 2015-04-29)
Most of our lives takes place on-line. Our on-line activities, affect directly or indirectly
the way other people perceive us. One have to careful decide what to expose
and what not. There are a lot of personal and ...
Cyber security and ubiquity: an human-centric approach
(Universita degli studi di Salerno, 2017-06-23)
Recent security breaches showed that every attack begins with the involvement of users and continues with the exploitation of technology bugs. In almost all cases, without human collaboration, conscious and unconscious, ...
Enhancing Ubiquitous Computing Environments Through Composition of Heterogeneous Services
(Universita degli studi di Salerno, 2016-01-18)
In recent years the substantial advancements in Information and Communication
Technologies enabled the development of original software solutions that
can provide support to problems people face in their daily activities. ...
Identification of new genetic alterations and potential biomarkers in papillary thyroid carcinoma
(Universita degli studi di Salerno, 2016-05-24)
Papillary thyroid carcinoma (PTC) is the most frequent thyroid malignant
neoplasia. Oncogene activation occurs in more than 70% of the cases. BRAF
mutations occur in about 40% of PTCs, whereas RET rearrangements ...
Search-based approaches for software development effort estimation
(Universita degli studi di Salerno, 2015-06-19)
Effort estimation is a critical activity for planning and monitoring software project development and for delivering the product on time and within budget. Significant over or under-estimates expose a software project to ...
Compression and indexing of genomic data with confidentiality protection
(Universita degli studi di Salerno, 2015-04-30)
The problem of data compression having specific security properties in order to guarantee
user’s privacy is a living matter. On the other hand, high-throughput systems in genomics
(e.g. the so-called Next Generation ...
Round and computational efficiency of two-party protocols
(Universita degli studi di Salerno, 2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages
that those parties send to each other. Beside the functionality and the security that a cryptographic
protocol provides, it ...
Reducing the View Selection Problem through Code Modeling: Static and Dynamic approaches
(Universita degli studi di Salerno, 2017-04-20)
Data warehouse systems aim to support decision making by providing users with the appropriate information at the right time. This task is particularly challenging in business contexts where large
amount of data ...