Ara es mostren els items 5-24 de 29

    • COACH: COllaborative certificate stAtus CHecking mechanism for VANETs 

      Hernández Gañán, Carlos; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Mata Diaz, Jorge; Hernández Serrano, Juan; Alins Delgado, Juan José (2011-11-01)
      Article
      Accés restringit per política de l'editorial
      Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A public key infrastructure (PKI) can be used to provide these functionalities using ...
    • Cooperative detection of primary user emulation attacks in CRNs 

      León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012)
      Article
      Accés restringit per política de l'editorial
      Cognitive radio networks (CRNs) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. With such purpose, coexistence mechanisms among CRN nodes or secondary users and ...
    • DEFS - Data exchange with Free Sample Protocol 

      Genés Durán, Rafael; Hernández Serrano, Juan; Esparza Martín, Óscar; Bellés Muñoz, Marta; Muñoz Tapia, José Luis (2021-06-17)
      Article
      Accés obert
      Distrust between data providers and data consumers is one of the main obstacles hampering digital-data commerce to take off. Data providers want to get paid for what they offer, while data consumers want to know exactly ...
    • Design of a P2P content recommendation system using affinity networks 

      Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012-08)
      Article
      Accés restringit per política de l'editorial
      The success and intensive use of social networks makes strategies for efficient document location a hot topic of research. In this paper, we propose a common vector space to describe documents and users to create a social ...
    • DocCloud: a document recommender system on cloud computing with plausible deniability 

      Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2013-04-16)
      Article
      Accés restringit per política de l'editorial
      Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. ...
    • e-Mazing - Juego de autoaprendizaje en terminales móviles 

      Mechoulam Nikolaeva, Mario Viktorov; Hernández Serrano, Juan; Pegueroles Vallés, Josep R. (Escola Tècnica Superior d'Enginyers de Telecomunicació de Barcelona, 2010)
      Article
      Accés obert
      ¿Te gustan los juegos? En este artículo se describirá el resultado de un Proyecto de Final de Carrera de la EPSC: un videojuego educativo para teléfonos móviles. Los juegos y más concretamente los videojuegos, pueden ...
    • Energy-efficient physical layer packet authenticator for machine-to-machine networks 

      Bartoli, Andrea; Hernández Serrano, Juan; León Abarca, Olga; Kountouris, Apostolous; Barthel, Dominique (Wiley-Blackwell, 2013-06)
      Article
      Accés restringit per política de l'editorial
      Machine-to-machine networks are spreading over every sector of our society due to their self-organisation capabilities. In these networks, thousands of devices are left unattended for years of operation without the possibility ...
    • Low-cost group rekeying for unattended wireless sensor networks 

      Hernández Serrano, Juan; Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Gañán, Carlos (2012)
      Article
      Accés restringit per política de l'editorial
      Wireless sensor networks (WSNs) are made up of large groups of nodes that perform distributed monitoring services. Since sensor measurements are often sensitive data acquired in hostile environments, securing WSN becomes ...
    • Low-power low-rate goes long-range: the case for secure and cooperative machine-to-machine communications 

      Bartoli, Andrea; Dohler, Mischa; Hernández Serrano, Juan; Kountouris, Apostolous; Barthel, Dominique (2011)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      The vision of connecting a large amount of objects on this planet to improve well-being and safety is slowly taking shape. Preceded by a decade-long era of research on low-power low-rate short-range wireless sensor networks, ...
    • Modeling the lion attack in cognitive radio networks 

      Hernández Serrano, Juan; León Abarca, Olga; Soriano Ibáñez, Miguel (2011)
      Article
      Accés obert
      Cognitive radio is a promising technology aiming to improve the utilization of the radio electromagnetic spectrum. A cognitive radio is a smart device which runs radio applications software to perform signal processing. ...
    • Montar un punto de acceso inalámbrico 802.11 en Linux 

      Hernández Serrano, Juan; Pegueroles Vallés, Josep R. (Escola Tècnica Superior d'Enginyers de Telecomunicació de Barcelona, 2004)
      Article
      Accés obert
      La gente se mueve, las redes no. Estas dos sentencias definen más que nada la explosión de las redes inalámbricas de área local o WLAN (WirelessLocalArea Network). En unos pocos años el precio de los dispositivos WLANha ...
    • Multimedia copyright protection platform demonstrator 

      Soriano Ibáñez, Miguel; Fernández Muñoz, Marcel; Sayrol Clols, Elisa; Tomás Buliart, Joan; Casanellas, Joan; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan (Springer, 2005)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      The work presented in this paper consists in the development of a portable platform to protect the copyright and distribution rights of digital contents, and empirically demonstrate the capacity of several marking and ...
    • On the road to secure and privacy-preserving IoT ecosystems 

      Hernández Serrano, Juan; Muñoz Tapia, José Luis; Bröring, Arne; Esparza Martín, Óscar; Mikkelsen, Lars; Schwarzott, Wolfgang; León Abarca, Olga; Zibuschka, Jan (Springer, 2017)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      The Internet of Things (IoT) is on the rise. Today, various IoT platforms are already available, giving access to myriads of things. Initiatives such as BIG IoT are bringing those IoT platforms together in order to form ...
    • Privacy risk analysis in the IoT domain 

      Hernández Serrano, Juan; Muñoz Tapia, José Luis; León Abarca, Olga; Mikkelsen, Lars; Schwefel, Hans-Peter; Bröring, Arne (Institute of Electrical and Electronics Engineers (IEEE), 2018)
      Text en actes de congrés
      Accés obert
      Most IoT systems are using or exchanging user related information between system components. This means that privacy is a key factor in these systems. Privacy, both in terms of not allowing unauthorized access to information, ...
    • Providing k-anonymity and revocation in ubiquitous VANETs 

      Caballero Gil, Cándido; Molina Gil, Jezabel; Hernández Serrano, Juan; León Abarca, Olga; Soriano Ibáñez, Miguel (Elsevier, 2016-01)
      Article
      Accés obert
      Abstract Vehicular ad hoc networks (VANETs) is considered a milestone in improving the safety and efficiency in transportation. Nevertheless, when information from the vehicular communications is combined with data from ...
    • Reconciling privacy and efficient utility management in smart cities 

      Rebollo Monedero, David; Bartoli, Andrea; Hernández Serrano, Juan; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2014-01-01)
      Article
      Accés restringit per política de l'editorial
      A key aspect in the design of smart cities is, undoubtedly, a plan for the efficient management of utilities, enabled by technologies such as those entailing smart metering of the residential consumption of electricity, ...
    • Robust detection of primary user emulation attacks in IEEE 802.22 networks 

      León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (ACM Press, NY, 2011)
      Text en actes de congrés
      Accés obert
      Cognitive Radio (CR) technology constitutes a new paradigm where wireless devices can access the spectrum left unused by licensed or primary users in an opportunistic way. This feature opens the door to a main new threat: ...
    • Secure lossless aggregation for Smart Grid M2M networks 

      Bartoli, Andrea; Hernández Serrano, Juan; Soriano Ibáñez, Miguel; Dohler, Mischa; Kountouris, Apostolous; Barthel, Dominique (IEEE Computer Society Publications, 2010)
      Text en actes de congrés
      Accés obert
      Whilst security is generally perceived as an important constituent of communication systems, this paper offers a viable security-communication-tradeoff particularly tailored to Advanced Metering Infrastructures (AMIs) in ...
    • Securing cognitive radio networks 

      León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2010-05)
      Article
      Accés restringit per política de l'editorial
    • Simplicial degree in complex networks. Applications of topological data analysis to network science 

      Hernández Serrano, Daniel; Hernández Serrano, Juan; Sánchez Gómez, Darío (2020-08)
      Article
      Accés obert
      Network Science provides a universal formalism for modelling and studying complex systems based on pairwise interactions between agents. However, many real networks in the social, biological or computer sciences involve ...