Ara es mostren els items 38-48 de 48

    • Reconciling privacy and efficient utility management in smart cities 

      Rebollo Monedero, David; Bartoli, Andrea; Hernández Serrano, Juan; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2014-01-01)
      Article
      Accés restringit per política de l'editorial
      A key aspect in the design of smart cities is, undoubtedly, a plan for the efficient management of utilities, enabled by technologies such as those entailing smart metering of the residential consumption of electricity, ...
    • Robust detection of primary user emulation attacks in IEEE 802.22 networks 

      León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (ACM Press, NY, 2011)
      Text en actes de congrés
      Accés obert
      Cognitive Radio (CR) technology constitutes a new paradigm where wireless devices can access the spectrum left unused by licensed or primary users in an opportunistic way. This feature opens the door to a main new threat: ...
    • Secure lossless aggregation for Smart Grid M2M networks 

      Bartoli, Andrea; Hernández Serrano, Juan; Soriano Ibáñez, Miguel; Dohler, Mischa; Kountouris, Apostolous; Barthel, Dominique (IEEE Computer Society Publications, 2010)
      Text en actes de congrés
      Accés obert
      Whilst security is generally perceived as an important constituent of communication systems, this paper offers a viable security-communication-tradeoff particularly tailored to Advanced Metering Infrastructures (AMIs) in ...
    • Securing cognitive radio networks 

      León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2010-05)
      Article
      Accés restringit per política de l'editorial
    • Securing identity assignment using implicit certificates in P2P overlays 

      Caubet Fernández, Juan; Esparza Martín, Óscar; Alins Delgado, Juan José; Mata Diaz, Jorge; Soriano Ibáñez, Miguel (Springer International Publishing, 2013)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      The security of the Peer-to-Peer (P2P) overlays networks has been questioned for years. Many works have been proposed to provide secure routing, anonymity, reputation systems, confidentiality, etc. However, the identity ...
    • Simplified probabilistic model for maximum traffic load from weigh-in-motion data 

      Soriano Ibáñez, Miguel; Casas Rius, Joan Ramon; Ghosn, Michel (Routledge/Taylor and Francis Group, 2018)
      Capítol de llibre
      Accés restringit per política de l'editorial
      This paper reviews the simplified procedure proposed by Ghosn and Sivakumar to model the maximum expected traffic load effect on highway bridges and illustrates the methodology using a set of Weigh-In-Motion (WIM) data ...
    • Supporting mobility in GKM over ad-hoc network using a decentralized and spontaneous algorithm 

      Hernández Serrano, Juan; Pegueroles Vallés, Josep R.; Soriano Ibáñez, Miguel (Springer, 2007)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Recently there have been a noticeable growth of ad-hoc environments with peer-to-peer relations. Such environments decentralize the services in order to share their cost between their members. As a result, a decentralized ...
    • Tracing traitors by guessing secrets. The q-ary case 

      Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      In this paper we present, by solving a variant of the guessing secrets problem defined by Chung, Graham and Leighton [3], a sequential traitor tracing scheme equipped with an efficient identification algorithm. Sequential ...
    • Transmisión de datos : problemas resueltos 

      Aguilar Igartua, Mónica; Forné Muñoz, Jorge; Mata Diaz, Jorge; Rico Novella, Francisco José; Rojas Espinosa, Alfonso; Soriano Ibáñez, Miguel (Iniciativa Digital Politècnica, 2010)
      Llibre
      Accés obert
      Los profesores de la asignatura Transmisión de Datos, impartida en la UPC, hemos elaborado este libro de problemas resueltos representativos de la misma. El libro se estructura en tres temas: codificación de fuente, ...
    • Un nuevo ataque a TCP para redes de radios cognitivas 

      León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2009)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Los dispositivos de radios cognitivas emergen como una prometedora tecnología que ha de permitir un mejor uso del espectro electro-magnético. Estos dispositivos se caracterizan por ser capaces de observar y entender su ...
    • Use of Turbo Codes with Low-Rate Convolutional Constituent Codes in Fingerprinting Scenarios 

      Tomás Buliart, Joan; Gómez Muro, Ana; Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel (IEEE, 2011)
      Comunicació de congrés
      Accés restringit per política de l'editorial
      We discuss the use of turbo codes in fingerprinting schemes. More precisely, we present a family of turbo codes that are secure against attacking coalitions of size 2. This family is build upon a class of low-rate convolutional ...