Ara es mostren els items 1-20 de 77

    • A cryptographic solution for private distributed simple meeting scheduling 

      Herranz Sotoca, Javier; Matwin, Stan; Meseguer González, Pedro; Nin Guerrero, Jordi (IOS Press, 2009)
      Text en actes de congrés
      Accés obert
      Meeting scheduling is a suitable application for distributed computation motivated by its privacy requirements. Previous work on this problem have considered some cryptographic and conceptually clear approach to solve a ...
    • A differential privacy protection-based federated deep learning framework to fog-embedded architectures 

      Gutiérrez Escobar, Norma; Otero Calviño, Beatriz; Rodríguez Luna, Eva; Utrera Iglesias, Gladys Miriam; Mus León, Sergi; Canal Corretger, Ramon (Elsevier, 2024-04)
      Article
      Accés obert
      Nowadays, companies collect massive quantities of data to enhance their operations, often at the expense of sharing user sensible information. This data is widely used to train Deep Learning (DL) neural networks to model, ...
    • A la seguridad por la privacidad 

      Barceló Garcia, Miquel (2001-07)
      Article
      Accés obert
    • A survey of deep learning techniques for cybersecurity in mobile networks 

      Rodríguez Luna, Eva; Otero Calviño, Beatriz; Gutiérrez Escobar, Norma; Canal Corretger, Ramon (2021-06-07)
      Article
      Accés obert
      The widespread use of mobile devices, as well as the increasing popularity of mobile services has raised serious cybersecurity challenges. In the last years, the number of cyberattacks has grown dramatically, as well as ...
    • A survey of machine and deep learning methods for privacy protection in the Internet of things 

      Rodríguez Luna, Eva; Otero Calviño, Beatriz; Canal Corretger, Ramon (Multidisciplinary Digital Publishing Institute (MDPI), 2023-01-21)
      Article
      Accés obert
      Recent advances in hardware and information technology have accelerated the proliferation of smart and interconnected devices facilitating the rapid development of the Internet of Things (IoT). IoT applications and services ...
    • Access control issues in social networks 

      Carreras Coch, Anna; Rodríguez Luna, Eva; Delgado Mercè, Jaime; Maroñas Borras, Xavier (2010-05-19)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Social Networks, as the main axis of Web 2.0, are creating a number of interesting challenges to the research and standardisation communities. In this paper, we analyse the current and future use of access control policies ...
    • An architecture for providing personalized digital health 

      Delgado Mercè, Jaime; Llorente Viejo, Silvia (2023)
      Article
      Accés obert
      Patients need mechanisms to integrate health information coming from different sources, including personal devices. This would lead to Personalized Digital Health (PDH). HIPAMS (Health Information Protection And Management ...
    • Analysis of security and privacy in the communication of IoT medical devices 

      Hajizada, Gulzar (Universitat Politècnica de Catalunya, 2023-07-12)
      Projecte Final de Màster Oficial
      Accés obert
      The study on review and analysis identifies potential safety and privacy concerns associated with Internet of Things (IoT) medical devices, investigates current privacy and safety safeguards, and establishes best practices ...
    • Anonymizing cybersecurity data in critical infrastructures: the CIPSEC approach 

      Rodríguez Hoyos, Ana Fernanda; Estrada Jiménez, José Antonio; Rebollo-Monedero, David; Forné Muñoz, Jorge; Trapero Burgos, Rubén; Álvarez Romero, Antonio (ISCRAM, 2019)
      Text en actes de congrés
      Accés obert
      Cybersecurity logs are permanently generated by network devices to describe security incidents. With modern computing technology, such logs can be exploited to counter threats in real time or before they gain a foothold. ...
    • Apple y el FBI 

      Barceló Garcia, Miquel (2016-05)
      Article
      Accés obert
    • Cien casos de intimidad expuestos a la mirada: un ensayo para casas alternativas 

      Zhang, Beilei (Universitat Politècnica de Catalunya, 2017-10)
      Projecte Final de Màster Oficial
      Accés obert
      La intimidad es una cualidad que se da por sentado en el seno de la casa. Sin embargo, en la actualidad, los familiares están aislados en la mayoría de las escenas domésticas tal como las habitaciones de la vivienda de hoy ...
    • Computing reputation for collaborative private networks 

      Nin Guerrero, Jordi; Carminati, Barbara; Ferrari, Elena; Torra i Reventós, Vicenç (IEEE Computer Society Publications, 2009)
      Text en actes de congrés
      Accés obert
      The use of collaborative network services is increasing, therefore, the protection of the resources and relations shared by network participants is becoming crucial. One of the main issues in such networks is the evaluation ...
    • Covid-19 and tracing methodologies: A lesson for the future society 

      Scantamburlo, Teresa; Cortés, Atia; Dewitte, Pierre; Van der Eycken, Daphné; Martens, Marijn (Springer, 2021)
      Article
      Accés obert
      As the new coronavirus (SARS-CoV-2) surged across the globe, new technical solutions have supported policy makers and health authorities to plan and modulate containment measures. The introduction of these solutions provoked ...
    • ¿Cómo medir la privacidad? 

      Forné Muñoz, Jorge; Rebollo Monedero, David (2009-11)
      Article
      Accés obert
      En el presente estudio revisamos el estado del arte sobre métricas de privacidad en métodos con perturbación para el control estadístico de revelación. Aunque el artículo se enfoca en microagregación de datos, dichos métodos ...
    • Creació i manteniment d'un servei que analitzi el respecte a la privacitat dels usuaris a la xarxa 

      Mesegué Molina, Pol (Universitat Politècnica de Catalunya, 2021-06-28)
      Treball Final de Grau
      Accés obert
      El projecte ha consistit en crear i mantenir un servei que, de forma automatitzada, analitza els continguts d'una pàgina web donada, comprovant si conté elements que vulneren d'alguna manera la privacitat dels usuaris. Els ...
    • Decentraliced IoT Identity Access management 

      Trigo Ferrer, Albert (Universitat Politècnica de Catalunya, 2023-06-28)
      Treball Final de Grau
      Accés restringit per acord de confidencialitat
      La proliferación de dispositivos IoT (Internet de las cosas) crea una cantidad significativa de problemas de privacidad y control de datos. Debido a que los ecosistemas de IoT centralizados están mal equipados para gestionar ...
    • DEFS - Data exchange with Free Sample Protocol 

      Genés Durán, Rafael; Hernández Serrano, Juan; Esparza Martín, Óscar; Bellés Muñoz, Marta; Muñoz Tapia, José Luis (2021-06-17)
      Article
      Accés obert
      Distrust between data providers and data consumers is one of the main obstacles hampering digital-data commerce to take off. Data providers want to get paid for what they offer, while data consumers want to know exactly ...
    • Desenvolupament d'una aplicació per autoritzar l'accés a informació genòmica protegida 

      Reig Gaset, Guillem (Universitat Politècnica de Catalunya, 2021-06-29)
      Treball Final de Grau
      Accés restringit per acord de confidencialitat
    • Design of a privacy-aware routing protocol for vehicular ad hoc networks 

      Daunou, Adrien (Universitat Politècnica de Catalunya, 2012-02-17)
      Projecte Final de Màster Oficial
      Accés obert
      English: the continued growth of the vehicular fleet has opened new business opportunities and new needs of road safety. The constant mobility of individuals and the necessity of staying connected makes studying the ...
    • Differentially private publication of database streams via hybrid video coding 

      Parra Arnau, Javier; Strufe, Thorsten; Domingo Ferrer, Josep (2022-07-08)
      Article
      Accés obert
      While most anonymization technology available today is designed for static and small data, the current picture is of massive volumes of dynamic data arriving at unprecedented velocities. From the standpoint of anonymization, ...