DSpace DSpace UPC
 Català   Castellano   English  

E-prints UPC >

Llistant per Autor Soriano Ibáñez, Miguel

Saltar a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
O introdueix les primeres lletres:   
Ordenar per: En ordre: Resultats/Pàgina Autors/Registre:
Mostrant resultats 1 a 20 de 26
 següent >
Vista preliminarDataTítolAutor(s)
2005A new class of codes for fingerprinting schemesFernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep
2009A new cross-layer attack to TCP in cognitive radio networksLeón Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel
2007A note about the traceability properties of linear codesFernández Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus
2011An Algorithm for k-Anonymous Microaggregation and Clustering Inspired by the Design of Distortion-Optimized QuantizersForné Muñoz, Jorge; Soriano Ibáñez, Miguel
wcmc_9_7.pdf.jpg2-abr-2010An infrastructure for detecting and punishing malicious hosts using mobile agent watermarkingEsparza Martín, Óscar; Muñoz Tapia, José Luis; Tomàs Buliart, Joan; Soriano Ibáñez, Miguel
gen-2004Certificate revocation system implementation based on the Merkle Hash TreeMuñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar; Soriano Ibáñez, Miguel
2004CERVANTES - A certificate validation test-bedMuñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar; Soriano Ibáñez, Miguel
2012Cooperative detection of primary user emulation attacks in CRNsLeón Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel
jun-2012Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systemsTouceda, D.S.; Cámara, J.M.S.; Soriano Ibáñez, Miguel
ago-2012Design of a P2P content recommendation system using affinity networksVera del Campo, Juan; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel
16-abr-2013DocCloud: a document recommender system on cloud computing with plausible deniabilityVera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel
2010Genetic algorithms for designing network security protocolsZarza, Luis; Forné Muñoz, Jorge; Pegueroles Vallés, Josep R.; Soriano Ibáñez, Miguel
eurasip_hernandez_2011.pdf.jpg2011Modeling the lion attack in cognitive radio networksHernández Serrano, Juan; León Abarca, Olga; Soriano Ibáñez, Miguel
2005Multimedia copyright protection platform demonstratorSoriano Ibáñez, Miguel; Fernández Muñoz, Marcel; Sayrol Clols, Elisa; Tomás Buliart, Joan; Casanellas, Joan; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan
2008New considerations about the correct design of turbo fingerprinting codesTomás Buliart, Joan; Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel
CMMSE_2012.pdf.jpg2012Parallelization of the interpolation process in the Koetter-Vardy soft-decision list decoding algorithmMoreira Sánchez, José; Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel
2012Private audio streaming for an automated phone assistance systemVera del Campo, Juan; Gómez Muro, Ana; Soriano Ibáñez, Miguel
Reconciling privacy and efficient utility management in smart cities.pdf.jpg1-gen-2014Reconciling privacy and efficient utility management in smart citiesRebollo Monedero, David; Bartoli, Andrea; Hernández Serrano, Juan; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel
cogart.pdf.jpg2011Robust detection of primary user emulation attacks in IEEE 802.22 networksLeón Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel
smart_grid_10.pdf.jpg2010Secure lossless aggregation for Smart Grid M2M networksBartoli, Andrea; Hernández Serrano, Juan; Soriano Ibáñez, Miguel; Dohler, Mischa; Kountouris, Apostolous; Barthel, Dominique
Mostrant resultats 1 a 20 de 26
 següent >

 

Valid XHTML 1.0! Programari DSpace Copyright © 2002-2004 MIT and Hewlett-Packard Comentaris
Universitat Politècnica de Catalunya. Servei de Biblioteques, Publicacions i Arxius