Search
Now showing items 1-5 of 5
Secure computation under network and physical attacks
(Universita degli studi di Salerno, 2013-04-22)
This thesis proposes several protocols for achieving secure com-
putation under concurrent and physical attacks. Secure computation
allows many parties to compute a joint function of their inputs, while
keeping the ...
Memetic algorithms for ontology alignment
(Universita degli studi di Salerno, 2013-04-24)
Semantic interoperability represents the capability of two or more systems to
meaningfully and accurately interpret the exchanged data so as to produce
useful results. It is an essential feature of all distributed and ...
On the Generalizations of Identity-Based Encryption
(Universita degli studi di Salerno, 2013-04-16)
Today public-key cryptographic is widely deployed and successfully used but still a major drawback
exists. In fact, from encrypted data a party can either decrypt or cannot learn anything at all about the
message other ...
Hybrid approaches based on computational intelligence and semantic web for distributed situation and context awareness
(Universita degli studi di Salerno, 2013-04-29)
The research work focuses on Situation Awareness and Context Awareness topics.
Specifically, Situation Awareness involves being aware of what is happening in the vicinity
to understand how information, events, and one’s ...
Steganographic methods for information hiding in MS-Office files
(Universita degli studi di Salerno, 2013-04-20)
The simplest container of digital information is “the file" and among the vast array of files currently available, MS-Office files are probably the most widely used. These files, starting from MS-Office 2007, respect the ...