Now showing items 1-5 of 5
On the Generalizations of Identity-Based Encryption
(Universita degli studi di Salerno, 2013-04-16)
Today public-key cryptographic is widely deployed and successfully used but still a major drawback exists. In fact, from encrypted data a party can either decrypt or cannot learn anything at all about the message other ...
Hybrid approaches based on computational intelligence and semantic web for distributed situation and context awareness
(Universita degli studi di Salerno, 2013-04-29)
The research work focuses on Situation Awareness and Context Awareness topics. Specifically, Situation Awareness involves being aware of what is happening in the vicinity to understand how information, events, and one’s ...
Steganographic methods for information hiding in MS-Office files
(Universita degli studi di Salerno, 2013-04-20)
The simplest container of digital information is “the file" and among the vast array of files currently available, MS-Office files are probably the most widely used. These files, starting from MS-Office 2007, respect the ...
Secure computation under network and physical attacks
(Universita degli studi di Salerno, 2013-04-22)
This thesis proposes several protocols for achieving secure com- putation under concurrent and physical attacks. Secure computation allows many parties to compute a joint function of their inputs, while keeping the ...
Memetic algorithms for ontology alignment
(Universita degli studi di Salerno, 2013-04-24)
Semantic interoperability represents the capability of two or more systems to meaningfully and accurately interpret the exchanged data so as to produce useful results. It is an essential feature of all distributed and ...