We design a consecution of protocols which allows organizations to have secure strong access control of their users to their desktop machines based on biometry. It provides both strong secure authentication and privacy. Moreover, our mechanism allows the s ...
Most perimeter control methods in literature are the model-based schemes. However, accurate modeling of the traffic flow system is hard and time-consuming. On the other hand, macroscopic traffic flow patterns show heavily similarity between days, and data ...
Bipedal locomotion is a remarkable feature of humans. This skill is necessary for the activities of daily living. Unfortunately, many people only partially benefit from it or miss it entirely because of a disability. This may result in a slower gait, less ...
Most perimeter control methods in literature are the model-based schemes designing the controller based on the available accurate macroscopic fundamental diagram (MFD) function with well known techniques of modern control methods. However, accurate modelin ...
Today, it is common knowledge in the cyber-physical systems domain that the tight interaction between the cyber and physical elements provides the possibility of substantially improving the performance of these systems that is otherwise impossible. On the ...
The maximal achievable advantage of a (computationally unbounded) distinguisher to determine whether a source Z is distributed according to distribution P0 or P1, when given access to one sample of Z, is characterized by the statistical distance ...
Optical frequency combs are optical sources, which spectrum consists of a series of equally spaced narrowband frequencies. They made an outstanding leap forward in the accuracy of optical frequency metrology and became an attractive tool for numerous appli ...
The pressing need to restart socioeconomic activities locked-down to control the spread of SARS-CoV-2 in Italy must be coupled with effective methodologies to selectively relax containment measures. Here we employ a spatially explicit model, properly atten ...
Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions of devices. The Bluetooth standard includes a legacy authentication procedure and a secure authentication procedure, allowing devices to authenticate to each other usi ...