Ara es mostren els items 50-69 de 95

    • On collaborative anonymous communications in lossy networks 

      Rebollo-Monedero, David; Forné Muñoz, Jorge; Pallarès Segarra, Esteve; Parra-Arnau, Javier; Tripp Barba, Carolina; Urquiza Aguiar, Luis; Aguilar Igartua, Mónica (2013-05-17)
      Article
      Accés restringit per política de l'editorial
      Message encryption does not prevent eavesdroppers from unveiling who is communicating with whom, when, or how frequently, a privacy risk wireless networks are particularly vulnerable to. The Crowds protocol, a well-established ...
    • On content-based recommendation and user privacy in social-tagging systems 

      Puglisi, Silvia; Parra-Arnau, Javier; Forné Muñoz, Jorge; Rebollo Monedero, David (Elsevier, 2015-09-01)
      Article
      Accés obert
      Recommendation systems and content filtering approaches based on annotations and ratings, essentially rely on users expressing their preferences and interests through their actions, in order to provide personalised content. ...
    • On the anonymity risk of time-varying user profiles. 

      Puglisi, Silvia; Rebollo Monedero, David; Forné Muñoz, Jorge (2017-04-26)
      Article
      Accés obert
      Websites and applications use personalisation services to profile their users, collect their patterns and activities and eventually use this data to provide tailored suggestions. User preferences and social interactions ...
    • On the measurement of privacy as an attacker's estimation error 

      Rebollo Monedero, David; Parra Arnau, Javier; Diaz, Claudia; Forné Muñoz, Jorge (2012)
      Article
      Accés obert
      A wide variety of privacy metrics have been proposed in the literature to evaluate the level of protection offered by privacy enhancing-technologies. Most of these metrics are specific to concrete systems and adversarial ...
    • On the regulation of personal data distribution in online advertising platforms 

      Estrada Jiménez, José Antonio; Parra Arnau, Javier; Rodríguez Hoyos, Ana Fernanda; Forné Muñoz, Jorge (Elsevier, 2019-03)
      Article
      Accés obert
      Online tracking is the key enabling technology of modern online advertising. In the recently established model of real-time bidding (RTB), the web pages tracked by ad platforms are shared with advertising agencies (also ...
    • On web user tracking of browsing patterns for personalised advertising 

      Puglisi, Silvia; Rebollo Monedero, David; Forné Muñoz, Jorge (2017-02-19)
      Article
      Accés obert
      On today’s Web, users trade access to their private data for content and services. App and service providers want to know everything they can about their users, in order to improve their product experience. Also, advertising ...
    • On Web user tracking: how third-party http requests track users' browsing patterns for personalised advertising 

      Puglisi, Silvia; Rebollo Monedero, David; Forné Muñoz, Jorge (2016)
      Text en actes de congrés
      Accés obert
      On today's Web, users trade access to their private data for content and services. Advertising sustains the business model of many websites and applications. Efficient and successful advertising relies on predicting ...
    • Online advertising: analysis of privacy threats and protection approaches 

      Estrada, José; Parra Arnau, Javier; Rodríguez Hoyos, Ana Fernanda; Forné Muñoz, Jorge (2016-12-27)
      Article
      Accés obert
      Online advertising, the pillar of the “free” content on the Web, has revolutionized the marketing business in recent years by creating a myriad of new opportunities for advertisers to reach potential customers. The current ...
    • Optimal forgery and suppression of ratings for privacy enhancement in recommendation systems 

      Parra-Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (2014-03)
      Article
      Accés obert
      Recommendation systems are information-filtering systems that tailor information to users on the basis of knowledge about their preferences. The ability of these systems to profile users is what enables such intelligent ...
    • Optimized query forgery for private information retrieval 

      Rebollo Monedero, David; Forné Muñoz, Jorge (2010-09)
      Article
      Accés obert
      We present a mathematical formulation for the optimization of query forgery for private information retrieval, in the sense that the privacy risk is minimized for a given traffic and processing overhead. The privacy ...
    • Optimizing the design parameters of threshold pool mixes for anonymity and delay 

      Rebollo Monedero, David; Parra Arnau, Javier; Forné Muñoz, Jorge; Díaz Martínez, María Claudia (2014-07-04)
      Article
      Accés restringit per política de l'editorial
      The provision of content confidentiality via message encryption is by no means sufficient when facing the significant privacy risks present in online communications. Indeed, the privacy literature abounds with examples of ...
    • p-probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation 

      Rebollo Monedero, David; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel; Puiggalí Allepuz, Jordi (2016-12-13)
      Article
      Accés obert
      We develop a probabilistic variant of k-anonymous microaggregation which we term p-probabilistic resorting to a statistical model of respondent participation in order to aggregate quasi-identifiers in such a manner that ...
    • Pervasive authentication and authorization infrastructures for mobile users 

      Forné Muñoz, Jorge; Hinarejos Campos, M. Francisca; Marin, Andres; Almenarez, Florina; Lopez, Javier; Montenegro, Jose Antonio; Lacoste, Marc; Diaz, Daniel (2010)
      Article
      Accés restringit per política de l'editorial
      Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, extremely dynamic operating conditions, are major challenges in the design of security infrastructures for pervasive ...
    • Potential mass surveillance and privacy violations in proximity-based social applications 

      Puglisi, Silvia; Rebollo Monedero, David; Forné Muñoz, Jorge (IEEE Press, 2016)
      Comunicació de congrés
      Accés obert
      Proximity-based social applications let users interact with people that are currently close to them, by revealing some information about their preferences and whereabouts. This information is acquired through passive ...
    • Práctica 1. Entorno Unix 

      Aguilar Igartua, Mónica; Alins Delgado, Juan José; Badenes Montoliu, Carles; Forné Muñoz, Jorge; Gorricho Moreno, Juan Luis; Hesselbach Serra, Xavier (Universitat Politècnica de Catalunya, 1999-10)
      Pràctica
      Accés obert
    • Práctica 2. Introducción al entorno de simulación Ptolemy 

      Aguilar Igartua, Mónica; Alins Delgado, Juan José; Badenes Montoliu, Carles; Forné Muñoz, Jorge; Gorricho Moreno, Juan Luis; Hesselbach Serra, Xavier (Universitat Politècnica de Catalunya, 1999-10)
      Pràctica
      Accés obert
    • Práctica 3. Pulsos de Nyquist 

      Aguilar Igartua, Mónica; Alins Delgado, Juan José; Badenes Montoliu, Carles; Forné Muñoz, Jorge; Gorricho Moreno, Juan Luis; Hesselbach Serra, Xavier (Universitat Politècnica de Catalunya, 1999-10)
      Pràctica
      Accés obert
    • Práctica 4. Sistema de transmisión de datos en banda base 

      Aguilar Igartua, Mónica; Alins Delgado, Juan José; Badenes Montoliu, Carles; Forné Muñoz, Jorge; Gorricho Moreno, Juan Luis; Hesselbach Serra, Xavier (Universitat Politècnica de Catalunya, 1999-10)
      Pràctica
      Accés obert
    • Práctica 5. Ecualización 

      Aguilar Igartua, Mónica; Alins Delgado, Juan José; Badenes Montoliu, Carles; Forné Muñoz, Jorge; Gorricho Moreno, Juan Luis; Hesselbach Serra, Xavier (Universitat Politècnica de Catalunya, 1999-10)
      Pràctica
      Accés obert
    • PREON: An efficient cascade revocation mechanism for delegation paths 

      Hinarejos Campos, M. Francisca; Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar (2010-09)
      Article
      Accés restringit per política de l'editorial
      In decentralized network-based environments, resource sharing occurs more frequently as computing becomes more pervasive. Access to shared resources must be protected allowing access only to authorized entities. Delegation ...