Exploració per tema "Privacy"
Ara es mostren els items 1-20 de 77
-
A cryptographic solution for private distributed simple meeting scheduling
(IOS Press, 2009)
Text en actes de congrés
Accés obertMeeting scheduling is a suitable application for distributed computation motivated by its privacy requirements. Previous work on this problem have considered some cryptographic and conceptually clear approach to solve a ... -
A differential privacy protection-based federated deep learning framework to fog-embedded architectures
(Elsevier, 2024-04)
Article
Accés obertNowadays, companies collect massive quantities of data to enhance their operations, often at the expense of sharing user sensible information. This data is widely used to train Deep Learning (DL) neural networks to model, ... -
A la seguridad por la privacidad
(2001-07)
Article
Accés obert -
A survey of deep learning techniques for cybersecurity in mobile networks
(2021-06-07)
Article
Accés obertThe widespread use of mobile devices, as well as the increasing popularity of mobile services has raised serious cybersecurity challenges. In the last years, the number of cyberattacks has grown dramatically, as well as ... -
A survey of machine and deep learning methods for privacy protection in the Internet of things
(Multidisciplinary Digital Publishing Institute (MDPI), 2023-01-21)
Article
Accés obertRecent advances in hardware and information technology have accelerated the proliferation of smart and interconnected devices facilitating the rapid development of the Internet of Things (IoT). IoT applications and services ... -
Access control issues in social networks
(2010-05-19)
Text en actes de congrés
Accés restringit per política de l'editorialSocial Networks, as the main axis of Web 2.0, are creating a number of interesting challenges to the research and standardisation communities. In this paper, we analyse the current and future use of access control policies ... -
An architecture for providing personalized digital health
(2023)
Article
Accés obertPatients need mechanisms to integrate health information coming from different sources, including personal devices. This would lead to Personalized Digital Health (PDH). HIPAMS (Health Information Protection And Management ... -
Analysis of security and privacy in the communication of IoT medical devices
(Universitat Politècnica de Catalunya, 2023-07-12)
Projecte Final de Màster Oficial
Accés obertThe study on review and analysis identifies potential safety and privacy concerns associated with Internet of Things (IoT) medical devices, investigates current privacy and safety safeguards, and establishes best practices ... -
Anonymizing cybersecurity data in critical infrastructures: the CIPSEC approach
(ISCRAM, 2019)
Text en actes de congrés
Accés obertCybersecurity logs are permanently generated by network devices to describe security incidents. With modern computing technology, such logs can be exploited to counter threats in real time or before they gain a foothold. ... -
Apple y el FBI
(2016-05)
Article
Accés obert -
Cien casos de intimidad expuestos a la mirada: un ensayo para casas alternativas
(Universitat Politècnica de Catalunya, 2017-10)
Projecte Final de Màster Oficial
Accés obertLa intimidad es una cualidad que se da por sentado en el seno de la casa. Sin embargo, en la actualidad, los familiares están aislados en la mayoría de las escenas domésticas tal como las habitaciones de la vivienda de hoy ... -
Computing reputation for collaborative private networks
(IEEE Computer Society Publications, 2009)
Text en actes de congrés
Accés obertThe use of collaborative network services is increasing, therefore, the protection of the resources and relations shared by network participants is becoming crucial. One of the main issues in such networks is the evaluation ... -
Covid-19 and tracing methodologies: A lesson for the future society
(Springer, 2021)
Article
Accés obertAs the new coronavirus (SARS-CoV-2) surged across the globe, new technical solutions have supported policy makers and health authorities to plan and modulate containment measures. The introduction of these solutions provoked ... -
¿Cómo medir la privacidad?
(2009-11)
Article
Accés obertEn el presente estudio revisamos el estado del arte sobre métricas de privacidad en métodos con perturbación para el control estadístico de revelación. Aunque el artículo se enfoca en microagregación de datos, dichos métodos ... -
Creació i manteniment d'un servei que analitzi el respecte a la privacitat dels usuaris a la xarxa
(Universitat Politècnica de Catalunya, 2021-06-28)
Treball Final de Grau
Accés obertEl projecte ha consistit en crear i mantenir un servei que, de forma automatitzada, analitza els continguts d'una pàgina web donada, comprovant si conté elements que vulneren d'alguna manera la privacitat dels usuaris. Els ... -
Decentraliced IoT Identity Access management
(Universitat Politècnica de Catalunya, 2023-06-28)
Treball Final de Grau
Accés restringit per acord de confidencialitatLa proliferación de dispositivos IoT (Internet de las cosas) crea una cantidad significativa de problemas de privacidad y control de datos. Debido a que los ecosistemas de IoT centralizados están mal equipados para gestionar ... -
DEFS - Data exchange with Free Sample Protocol
(2021-06-17)
Article
Accés obertDistrust between data providers and data consumers is one of the main obstacles hampering digital-data commerce to take off. Data providers want to get paid for what they offer, while data consumers want to know exactly ... -
Desenvolupament d'una aplicació per autoritzar l'accés a informació genòmica protegida
(Universitat Politècnica de Catalunya, 2021-06-29)
Treball Final de Grau
Accés restringit per acord de confidencialitat -
Design of a privacy-aware routing protocol for vehicular ad hoc networks
(Universitat Politècnica de Catalunya, 2012-02-17)
Projecte Final de Màster Oficial
Accés obertEnglish: the continued growth of the vehicular fleet has opened new business opportunities and new needs of road safety. The constant mobility of individuals and the necessity of staying connected makes studying the ... -
Differentially private publication of database streams via hybrid video coding
(2022-07-08)
Article
Accés obertWhile most anonymization technology available today is designed for static and small data, the current picture is of massive volumes of dynamic data arriving at unprecedented velocities. From the standpoint of anonymization, ...