Exploració per autor "Soriano Ibáñez, Miguel"
Ara es mostren els items 1-20 de 48
-
A new class of codes for fingerprinting schemes
Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
Text en actes de congrés
Accés restringit per política de l'editorialIn this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ... -
A new cross-layer attack to TCP in cognitive radio networks
León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2009)
Text en actes de congrés
Accés restringit per política de l'editorial -
A note about the traceability properties of linear codes
Fernández Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus (Springer, 2007)
Text en actes de congrés
Accés restringit per política de l'editorialWe characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ... -
A protocol for data exchange with free samples using smart contracts
Genés Durán, Rafael; Hernández Serrano, Juan; Esparza Martín, Óscar; Soriano Ibáñez, Miguel; Muñoz Tapia, José Luis; Bellés Muñoz, Marta (Jornadas de Ingeniería Telemática (JITEL), 2021)
Text en actes de congrés
Accés obertDistrust between data providers and data consumers is one of the main obstacles hampering digitaldata commerce to take off. Data providers want to get paid for what they offer, while data consumers want to know exactly ... -
An Algorithm for k-Anonymous Microaggregation and Clustering Inspired by the Design of Distortion-Optimized Quantizers
Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (Elsevier Science Ltd., 2011)
Article
Accés restringit per política de l'editorialWe present a multidisciplinary solution to the problems of anonymous microaggregation and clustering, illustrated with two applications, namely privacy protection in databases, and private retrieval of location-based ... -
An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking
Esparza Martín, Óscar; Muñoz Tapia, José Luis; Tomás Buliart, Joan; Soriano Ibáñez, Miguel (2010-04-02)
Article
Accés obertMobile agents are software entities consisting of code, data, and state that can migrate autonomously from host to host executing their code. In such scenario there are some security issues that must be considered. In ... -
Aprendizaje activo con PBL en el diseño instruccional de Expressió Gràfica
Olmedo Torre, Noelia; Peña Carrera, Marta; Soriano Ibáñez, Miguel; Pujol Ferran, Anna (OmniaScience, 2023-03)
Comunicació de congrés
Accés obertNumerosos estudios respaldan los efectos positivos del aprendizaje activo en la mejora de la motivación y las actitudes del alumnado en el aprendizaje global y la reducción de las diferencias en las calificaciones. Esta ... -
Attribute-based authorization for structured Peer-to-Peer (P2P) networks
Suarez Touzeda, Diego; Sierra Camara, Jose Maria; Zeadally, Sherali; Soriano Ibáñez, Miguel (Elsevier, 2015-11-01)
Article
Accés obertWe present the deficiencies of traditional identity-based authorization models in structured Peer-to-Peer (P2P) networks where users' Public Key Certificates (PKCs) represent two roles, authentication and authorization, ... -
Certificate revocation system implementation based on the Merkle Hash Tree
Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar; Soriano Ibáñez, Miguel (2004-01)
Article
Accés restringit per política de l'editorialPublic-key cryptography is widely used to provide Internet security services. The public-key infrastructure (PKI) is the infrastructure that supports the public-key cryptography, and the revocation of certificates implies ... -
CERVANTES - A certificate validation test-bed
Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar; Soriano Ibáñez, Miguel (Springer Berlin / Heidelberg, 2004)
Text en actes de congrés
Accés restringit per política de l'editorialCertificate validation is one of the toughest scalability problems of the PKI. The goal of this paper is to introduce a Java platform for certificate revocation called CERVANTES. CERVANTES pretends to be an easy to extend ... -
Cifrado en flujo basado en NLFSR
Gonzalo, R; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1998-07)
Article
Accés obertLos mecanismos de cifrado en flujo constituyen una alternativa interesante para proporcionar confidencialidad en distintos entornos como comunicaciones móviles y redes de alta velocidad. En la literatura se han estudiado ... -
Comprehensive IoT-driven fleet management system for industrial vehicles
FARAHPOOR, MOHAMMADALI; Esparza Martín, Óscar; Soriano Ibáñez, Miguel (Institute of Electrical and Electronics Engineers (IEEE), 2023)
Article
Accés obertIn the context of fleet management, various challenges, including equipment breakdowns, rising maintenance costs, inefficient resource utilization, and outdated telematics systems, necessitate a transformative approach. ... -
Cooperative detection of primary user emulation attacks in CRNs
León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012)
Article
Accés restringit per política de l'editorialCognitive radio networks (CRNs) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. With such purpose, coexistence mechanisms among CRN nodes or secondary users and ... -
Criptografía y seguridad en comunicaciones
Forné Muñoz, Jorge; Melus Moreno, José Luis; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1995-07)
Article
Accés obert -
Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems
Touceda, D.S.; Cámara, J.M.S.; Soriano Ibáñez, Miguel (2012-06)
Article
Accés restringit per política de l'editorialSeveral alternative schemes have been presented in the literature to try to solve the users’ admission problem in P2P systems when it is not possible to include a logically centralized authority (either online or ... -
Design of a P2P content recommendation system using affinity networks
Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012-08)
Article
Accés restringit per política de l'editorialThe success and intensive use of social networks makes strategies for efficient document location a hot topic of research. In this paper, we propose a common vector space to describe documents and users to create a social ... -
DocCloud: a document recommender system on cloud computing with plausible deniability
Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2013-04-16)
Article
Accés restringit per política de l'editorialRecommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. ... -
Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis
Rebollo-Monedero, David; Mezher, Ahmad Mohamad; Casanova, Xavier; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2019-07-09)
Article
Accés obertk-Anonymous microaggregation is a widespread technique to address the problem of protecting the privacy of the respondents involved beyond the mere suppression of their identifiers, in applications where preserving the ... -
El impacto de las políticas de evaluación del profesorado en la posición en los ránquines universitarios: el caso de la Universidad Politécnica de Cataluña
García-Berro Montilla, Enrique; Roca Martín, Santiago; Navallas Ramos, Francisco Javier; Soriano Ibáñez, Miguel; Ras Sabido, Antoni (2016-01)
Article
Accés obertLa universidad española ha afrontado con éxito el tránsito entre una universidad clásica, eminentemente docente, y una universidad moderna, en la que la investigación juega un papel esencial. Gran parte de este éxito reside ... -
Esquemas de fingerprinting para la protección de derechos de distribución
Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Domingo Ferrer, Josep; Sebé Feixas, Francesc (Asociación de Técnicos de Informática, 2002-12)
Article
Accés obert