Ara es mostren els items 1-20 de 48

    • A new class of codes for fingerprinting schemes 

      Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      In this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ...
    • A new cross-layer attack to TCP in cognitive radio networks 

      León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2009)
      Text en actes de congrés
      Accés restringit per política de l'editorial
    • A note about the traceability properties of linear codes 

      Fernández Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus (Springer, 2007)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ...
    • A protocol for data exchange with free samples using smart contracts 

      Genés Durán, Rafael; Hernández Serrano, Juan; Esparza Martín, Óscar; Soriano Ibáñez, Miguel; Muñoz Tapia, José Luis; Bellés Muñoz, Marta (Jornadas de Ingeniería Telemática (JITEL), 2021)
      Text en actes de congrés
      Accés obert
      Distrust between data providers and data consumers is one of the main obstacles hampering digitaldata commerce to take off. Data providers want to get paid for what they offer, while data consumers want to know exactly ...
    • An Algorithm for k-Anonymous Microaggregation and Clustering Inspired by the Design of Distortion-Optimized Quantizers 

      Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (Elsevier Science Ltd., 2011)
      Article
      Accés restringit per política de l'editorial
      We present a multidisciplinary solution to the problems of anonymous microaggregation and clustering, illustrated with two applications, namely privacy protection in databases, and private retrieval of location-based ...
    • An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking 

      Esparza Martín, Óscar; Muñoz Tapia, José Luis; Tomás Buliart, Joan; Soriano Ibáñez, Miguel (2010-04-02)
      Article
      Accés obert
      Mobile agents are software entities consisting of code, data, and state that can migrate autonomously from host to host executing their code. In such scenario there are some security issues that must be considered. In ...
    • Aprendizaje activo con PBL en el diseño instruccional de Expressió Gràfica 

      Olmedo Torre, Noelia; Peña Carrera, Marta; Soriano Ibáñez, Miguel; Pujol Ferran, Anna (OmniaScience, 2023-03)
      Comunicació de congrés
      Accés obert
      Numerosos estudios respaldan los efectos positivos del aprendizaje activo en la mejora de la motivación y las actitudes del alumnado en el aprendizaje global y la reducción de las diferencias en las calificaciones. Esta ...
    • Attribute-based authorization for structured Peer-to-Peer (P2P) networks 

      Suarez Touzeda, Diego; Sierra Camara, Jose Maria; Zeadally, Sherali; Soriano Ibáñez, Miguel (Elsevier, 2015-11-01)
      Article
      Accés obert
      We present the deficiencies of traditional identity-based authorization models in structured Peer-to-Peer (P2P) networks where users' Public Key Certificates (PKCs) represent two roles, authentication and authorization, ...
    • Certificate revocation system implementation based on the Merkle Hash Tree 

      Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar; Soriano Ibáñez, Miguel (2004-01)
      Article
      Accés restringit per política de l'editorial
      Public-key cryptography is widely used to provide Internet security services. The public-key infrastructure (PKI) is the infrastructure that supports the public-key cryptography, and the revocation of certificates implies ...
    • CERVANTES - A certificate validation test-bed 

      Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar; Soriano Ibáñez, Miguel (Springer Berlin / Heidelberg, 2004)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Certificate validation is one of the toughest scalability problems of the PKI. The goal of this paper is to introduce a Java platform for certificate revocation called CERVANTES. CERVANTES pretends to be an easy to extend ...
    • Cifrado en flujo basado en NLFSR 

      Gonzalo, R; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1998-07)
      Article
      Accés obert
      Los mecanismos de cifrado en flujo constituyen una alternativa interesante para proporcionar confidencialidad en distintos entornos como comunicaciones móvi­les y redes de alta velocidad. En la literatura se han estudiado ...
    • Comprehensive IoT-driven fleet management system for industrial vehicles 

      FARAHPOOR, MOHAMMADALI; Esparza Martín, Óscar; Soriano Ibáñez, Miguel (Institute of Electrical and Electronics Engineers (IEEE), 2023)
      Article
      Accés obert
      In the context of fleet management, various challenges, including equipment breakdowns, rising maintenance costs, inefficient resource utilization, and outdated telematics systems, necessitate a transformative approach. ...
    • Cooperative detection of primary user emulation attacks in CRNs 

      León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012)
      Article
      Accés restringit per política de l'editorial
      Cognitive radio networks (CRNs) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. With such purpose, coexistence mechanisms among CRN nodes or secondary users and ...
    • Criptografía y seguridad en comunicaciones 

      Forné Muñoz, Jorge; Melus Moreno, José Luis; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1995-07)
      Article
      Accés obert
    • Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems 

      Touceda, D.S.; Cámara, J.M.S.; Soriano Ibáñez, Miguel (2012-06)
      Article
      Accés restringit per política de l'editorial
      Several alternative schemes have been presented in the literature to try to solve the users’ admission problem in P2P systems when it is not possible to include a logically centralized authority (either online or ...
    • Design of a P2P content recommendation system using affinity networks 

      Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012-08)
      Article
      Accés restringit per política de l'editorial
      The success and intensive use of social networks makes strategies for efficient document location a hot topic of research. In this paper, we propose a common vector space to describe documents and users to create a social ...
    • DocCloud: a document recommender system on cloud computing with plausible deniability 

      Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2013-04-16)
      Article
      Accés restringit per política de l'editorial
      Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. ...
    • Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis 

      Rebollo-Monedero, David; Mezher, Ahmad Mohamad; Casanova, Xavier; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2019-07-09)
      Article
      Accés obert
      k-Anonymous microaggregation is a widespread technique to address the problem of protecting the privacy of the respondents involved beyond the mere suppression of their identifiers, in applications where preserving the ...
    • El impacto de las políticas de evaluación del profesorado en la posición en los ránquines universitarios: el caso de la Universidad Politécnica de Cataluña 

      García-Berro Montilla, Enrique; Roca Martín, Santiago; Navallas Ramos, Francisco Javier; Soriano Ibáñez, Miguel; Ras Sabido, Antoni (2016-01)
      Article
      Accés obert
      La universidad española ha afrontado con éxito el tránsito entre una universidad clásica, eminentemente docente, y una universidad moderna, en la que la investigación juega un papel esencial. Gran parte de este éxito reside ...
    • Esquemas de fingerprinting para la protección de derechos de distribución 

      Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Domingo Ferrer, Josep; Sebé Feixas, Francesc (Asociación de Técnicos de Informática, 2002-12)
      Article
      Accés obert