Now showing items 1-6 of 6
Round and computational efficiency of two-party protocols
(Universita degli studi di Salerno, 2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages that those parties send to each other. Beside the functionality and the security that a cryptographic protocol provides, it ...
Enhancing Data Warehouse management through semi-automatic data integration and complex graph generation
(Universita degli studi di Salerno, 2018-05-25)
Strategic information is one of the main assets for many organizations and, in the next future, it will become increasingly more important to enable the decisionmakers answer questions about their business, such as how to ...
Information visualization: from petroglyphs to CoDe Graphs
(Universita degli studi di Salerno, 2018-05-30)
Data visualization concerns the communication of data through visual representations and techniques. It aims at enhancing perception and support data-driven decision making so enabling insights otherwise hard to achieve. ...
Fuzzy models for group decision making and applications to e-learning and recommender systems
(Universita degli studi di Salerno, 2018-03-08)
The work presented in the Ph.D. thesis deals with the definition of new fuzzy models for Group Decision Making (GDM) aimed at improving two phases of the decision process: preferences expression and aggregation. In ...
Relaxed functional dependencies: definition, discovery and applications
(Universita degli studi di Salerno, 2018-03-20)
Functional dependencies (FDs) were conceived in the early '70s, and were mainly used to verify database design and assess data quality. However, to solve several issues in emerging application domains, such as the ...
Delayed-Input and Non-Malleable Cryptographic Protocols
(Universita degli studi di Salerno, 2018-03-12)
A major goal in the design of cryptographic protocols is to re- duce the number of communication rounds. Since a cryptographic protocol usually consists of a composition and interplay of some subprotocols and cryptographic ...