Exploració per autor "Soriano Ibáñez, Miguel"
Ara es mostren els items 38-48 de 48
-
Reconciling privacy and efficient utility management in smart cities
Rebollo Monedero, David; Bartoli, Andrea; Hernández Serrano, Juan; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2014-01-01)
Article
Accés restringit per política de l'editorialA key aspect in the design of smart cities is, undoubtedly, a plan for the efficient management of utilities, enabled by technologies such as those entailing smart metering of the residential consumption of electricity, ... -
Robust detection of primary user emulation attacks in IEEE 802.22 networks
León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (ACM Press, NY, 2011)
Text en actes de congrés
Accés obertCognitive Radio (CR) technology constitutes a new paradigm where wireless devices can access the spectrum left unused by licensed or primary users in an opportunistic way. This feature opens the door to a main new threat: ... -
Secure lossless aggregation for Smart Grid M2M networks
Bartoli, Andrea; Hernández Serrano, Juan; Soriano Ibáñez, Miguel; Dohler, Mischa; Kountouris, Apostolous; Barthel, Dominique (IEEE Computer Society Publications, 2010)
Text en actes de congrés
Accés obertWhilst security is generally perceived as an important constituent of communication systems, this paper offers a viable security-communication-tradeoff particularly tailored to Advanced Metering Infrastructures (AMIs) in ... -
Securing cognitive radio networks
León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2010-05)
Article
Accés restringit per política de l'editorial -
Securing identity assignment using implicit certificates in P2P overlays
Caubet Fernández, Juan; Esparza Martín, Óscar; Alins Delgado, Juan José; Mata Diaz, Jorge; Soriano Ibáñez, Miguel (Springer International Publishing, 2013)
Text en actes de congrés
Accés restringit per política de l'editorialThe security of the Peer-to-Peer (P2P) overlays networks has been questioned for years. Many works have been proposed to provide secure routing, anonymity, reputation systems, confidentiality, etc. However, the identity ... -
Simplified probabilistic model for maximum traffic load from weigh-in-motion data
Soriano Ibáñez, Miguel; Casas Rius, Joan Ramon; Ghosn, Michel (Routledge/Taylor and Francis Group, 2018)
Capítol de llibre
Accés restringit per política de l'editorialThis paper reviews the simplified procedure proposed by Ghosn and Sivakumar to model the maximum expected traffic load effect on highway bridges and illustrates the methodology using a set of Weigh-In-Motion (WIM) data ... -
Supporting mobility in GKM over ad-hoc network using a decentralized and spontaneous algorithm
Hernández Serrano, Juan; Pegueroles Vallés, Josep R.; Soriano Ibáñez, Miguel (Springer, 2007)
Text en actes de congrés
Accés restringit per política de l'editorialRecently there have been a noticeable growth of ad-hoc environments with peer-to-peer relations. Such environments decentralize the services in order to share their cost between their members. As a result, a decentralized ... -
Tracing traitors by guessing secrets. The q-ary case
Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
Text en actes de congrés
Accés restringit per política de l'editorialIn this paper we present, by solving a variant of the guessing secrets problem defined by Chung, Graham and Leighton [3], a sequential traitor tracing scheme equipped with an efficient identification algorithm. Sequential ... -
Transmisión de datos : problemas resueltos
Aguilar Igartua, Mónica; Forné Muñoz, Jorge; Mata Diaz, Jorge; Rico Novella, Francisco José; Rojas Espinosa, Alfonso; Soriano Ibáñez, Miguel (Iniciativa Digital Politècnica, 2010)
Llibre
Accés obertLos profesores de la asignatura Transmisión de Datos, impartida en la UPC, hemos elaborado este libro de problemas resueltos representativos de la misma. El libro se estructura en tres temas: codificación de fuente, ... -
Un nuevo ataque a TCP para redes de radios cognitivas
León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2009)
Text en actes de congrés
Accés restringit per política de l'editorialLos dispositivos de radios cognitivas emergen como una prometedora tecnología que ha de permitir un mejor uso del espectro electro-magnético. Estos dispositivos se caracterizan por ser capaces de observar y entender su ... -
Use of Turbo Codes with Low-Rate Convolutional Constituent Codes in Fingerprinting Scenarios
Tomás Buliart, Joan; Gómez Muro, Ana; Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel (IEEE, 2011)
Comunicació de congrés
Accés restringit per política de l'editorialWe discuss the use of turbo codes in fingerprinting schemes. More precisely, we present a family of turbo codes that are secure against attacking coalitions of size 2. This family is build upon a class of low-rate convolutional ...