Ara es mostren els items 1-20 de 24

  • A modeling of certificate revocation and its application to synthesis of revocation traces 

    Hernández Gañán, Carlos; Mata Diaz, Jorge; Muñoz Tapia, José Luis; Hernández Serrano, Juan; Esparza Martín, Óscar; Alins Delgado, Juan José (2012)
    Article
    Accés restringit per política de l'editorial
    One of the hardest tasks of a public key infrastructure (PKI) is to manage revocation. New communication paradigms push the revocation system to the limit and an accurate resource assessment is necessary before implementing ...
  • A new cross-layer attack to TCP in cognitive radio networks 

    León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2009)
    Text en actes de congrés
    Accés restringit per política de l'editorial
  • Building hierarchical public key infrastructures in mobile ad-hoc networks 

    Satizábal Echavarría, Isabel Cristina; Forné Muñoz, Jorge; Hernández Serrano, Juan; Pegueroles Vallés, Josep R. (Springer, 2006)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    Dynamism of mobile ad-hoc networks implies changing trust relationships among their nodes that can be established using peer-to-peer PKIs. Here, certification paths can be built although part of the infrastructure is ...
  • COACH: COllaborative certificate stAtus CHecking mechanism for VANETs 

    Hernández Gañán, Carlos; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Mata Diaz, Jorge; Hernández Serrano, Juan; Alins Delgado, Juan José (2011-11-01)
    Article
    Accés restringit per política de l'editorial
    Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A public key infrastructure (PKI) can be used to provide these functionalities using ...
  • Cooperative detection of primary user emulation attacks in CRNs 

    León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012)
    Article
    Accés restringit per política de l'editorial
    Cognitive radio networks (CRNs) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. With such purpose, coexistence mechanisms among CRN nodes or secondary users and ...
  • Design of a P2P content recommendation system using affinity networks 

    Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012-08)
    Article
    Accés restringit per política de l'editorial
    The success and intensive use of social networks makes strategies for efficient document location a hot topic of research. In this paper, we propose a common vector space to describe documents and users to create a social ...
  • DocCloud: a document recommender system on cloud computing with plausible deniability 

    Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2013-04-16)
    Article
    Accés restringit per política de l'editorial
    Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. ...
  • e-Mazing - Juego de autoaprendizaje en terminales móviles 

    Mechoulam Nikolaeva, Mario Viktorov; Hernández Serrano, Juan; Pegueroles Vallés., Josep (Escola Tècnica Superior d'Enginyers de Telecomunicació de Barcelona, 2010)
    Article
    Accés obert
    ¿Te gustan los juegos? En este artículo se describirá el resultado de un Proyecto de Final de Carrera de la EPSC: un videojuego educativo para teléfonos móviles. Los juegos y más concretamente los videojuegos, pueden ...
  • Energy-efficient physical layer packet authenticator for machine-to-machine networks 

    Bartoli, Andrea; Hernández Serrano, Juan; León Abarca, Olga; Kountouris, Apostolous; Barthel, Dominique (Wiley-Blackwell, 2013-06)
    Article
    Accés restringit per política de l'editorial
    Machine-to-machine networks are spreading over every sector of our society due to their self-organisation capabilities. In these networks, thousands of devices are left unattended for years of operation without the possibility ...
  • Low-cost group rekeying for unattended wireless sensor networks 

    Hernández Serrano, Juan; Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Gañán, Carlos (2012)
    Article
    Accés restringit per política de l'editorial
    Wireless sensor networks (WSNs) are made up of large groups of nodes that perform distributed monitoring services. Since sensor measurements are often sensitive data acquired in hostile environments, securing WSN becomes ...
  • Low-power low-rate goes long-range: the case for secure and cooperative machine-to-machine communications 

    Bartoli, Andrea; Dohler, Mischa; Hernández Serrano, Juan; Kountouris, Apostolous; Barthel, Dominique (2011)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    The vision of connecting a large amount of objects on this planet to improve well-being and safety is slowly taking shape. Preceded by a decade-long era of research on low-power low-rate short-range wireless sensor networks, ...
  • Modeling the lion attack in cognitive radio networks 

    Hernández Serrano, Juan; León Abarca, Olga; Soriano Ibáñez, Miguel (2011)
    Article
    Accés obert
    Cognitive radio is a promising technology aiming to improve the utilization of the radio electromagnetic spectrum. A cognitive radio is a smart device which runs radio applications software to perform signal processing. ...
  • Montar un punto de acceso inalámbrico 802.11 en Linux 

    Hernández Serrano, Juan; Pegueroles Vallés, Josep Rafel (Escola Tècnica Superior d'Enginyers de Telecomunicació de Barcelona, 2004)
    Article
    Accés obert
    La gente se mueve, las redes no. Estas dos sentencias definen más que nada la explosión de las redes inalámbricas de área local o WLAN (WirelessLocalArea Network). En unos pocos años el precio de los dispositivos WLANha ...
  • Multimedia copyright protection platform demonstrator 

    Soriano Ibáñez, Miguel; Fernández Muñoz, Marcel; Sayrol Clols, Elisa; Tomás Buliart, Joan; Casanellas, Joan; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan (Springer, 2005)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    The work presented in this paper consists in the development of a portable platform to protect the copyright and distribution rights of digital contents, and empirically demonstrate the capacity of several marking and ...
  • Providing k-anonymity and revocation in ubiquitous VANETs 

    Caballero Gil, Cándido; Molina Gil, Jezabel; Hernández Serrano, Juan; León Abarca, Olga; Soriano Ibáñez, Miguel (Elsevier, 2016-01)
    Article
    Accés restringit per política de l'editorial
    Abstract Vehicular ad hoc networks (VANETs) is considered a milestone in improving the safety and efficiency in transportation. Nevertheless, when information from the vehicular communications is combined with data from ...
  • Reconciling privacy and efficient utility management in smart cities 

    Rebollo Monedero, David; Bartoli, Andrea; Hernández Serrano, Juan; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2014-01-01)
    Article
    Accés restringit per política de l'editorial
    A key aspect in the design of smart cities is, undoubtedly, a plan for the efficient management of utilities, enabled by technologies such as those entailing smart metering of the residential consumption of electricity, ...
  • Robust detection of primary user emulation attacks in IEEE 802.22 networks 

    León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (ACM Press, NY, 2011)
    Text en actes de congrés
    Accés obert
    Cognitive Radio (CR) technology constitutes a new paradigm where wireless devices can access the spectrum left unused by licensed or primary users in an opportunistic way. This feature opens the door to a main new threat: ...
  • Secure lossless aggregation for Smart Grid M2M networks 

    Bartoli, Andrea; Hernández Serrano, Juan; Soriano Ibáñez, Miguel; Dohler, Mischa; Kountouris, Apostolous; Barthel, Dominique (IEEE Computer Society Publications, 2010)
    Text en actes de congrés
    Accés obert
    Whilst security is generally perceived as an important constituent of communication systems, this paper offers a viable security-communication-tradeoff particularly tailored to Advanced Metering Infrastructures (AMIs) in ...
  • Securing cognitive radio networks 

    León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2010-05)
    Article
    Accés restringit per política de l'editorial
  • Supporting mobility in GKM over ad-hoc network using a decentralized and spontaneous algorithm 

    Hernández Serrano, Juan; Pegueroles Vallés, Josep R.; Soriano Ibáñez, Miguel (Springer, 2007)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    Recently there have been a noticeable growth of ad-hoc environments with peer-to-peer relations. Such environments decentralize the services in order to share their cost between their members. As a result, a decentralized ...