Exploració per tema "Encriptació de dades (Informàtica)"
Ara es mostren els items 1-20 de 34
-
A new countermeasure against side-channel attacks based on hardware-software co-design
(2016-09-01)
Article
Accés obertThis paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whose implementation is based on a hardware-software co-design. The hardware architecture consists of a microprocessor, which ... -
Ataques por canal lateral sobre el algoritmo de encriptación AES implementado en MicroBlaze.
(2013)
Text en actes de congrés
Accés restringit per política de l'editorialEste artículo presenta un procedimiento simple para la obtención de la clave criptográfica del algoritmo AES ejecutado sobre MicroBlaze. La clave se obtiene analizando la correlación estadística que existe entre ésta y el ... -
Attribute-based encryption implies identity-based encryption
(2017-11-01)
Article
Accés obertIn this study, the author formally proves that designing attribute-based encryption schemes cannot be easier than designing identity-based encryption schemes. In more detail, they show how an attribute-based encryption ... -
Cost-effective secure e-health cloud system using identity based cryptographic techniques
(Elsevier, 2016-08-31)
Article
Accés obertNowadays E-health cloud systems are more and more widely employed. However the security of these systems needs more consideration for the sensitive health information of patients. Some protocols on how to secure the e-health ... -
Defeating simple power analysis attacks in cache memories
(Institute of Electrical and Electronics Engineers (IEEE), 2015)
Text en actes de congrés
Accés restringit per política de l'editorialA wide range of attacks that target cache memories in secure systems have been reported in the last half decade. Cold-boot attacks can be thwarted through the recently proposed Interleaved Scrambling Technique (IST). ... -
Desarrollo de una arquitectura de seguridad para smartphone
(Universitat Politècnica de Catalunya, 2008-12)
Projecte/Treball Final de Carrera
Accés obertHasta el 10 de octubre 2008 estas practicas consistieron esencialmente en la participación en el proyecto europeo SECOQC: “Development of a Global Network for Secure Communication based on Quantum Cryptography”. Este ... -
Desenvolupament d’un sistema de seguretat autònom i d’ús personal
(Universitat Politècnica de Catalunya, 2015-01)
Treball Final de Grau
Accés obertAl llarg d’aquest treball s’estudien diverses eines criptogràfiques i es desenvolupen dos sistemes electrònics que permetin al seu usuari comunicar-se amb diversos sistemes externs amb seguretat i comoditat, de manera que ... -
Design and implementation of an authentication and authorization system based on a haptic touchscreen and a force sensor
(Universitat Politècnica de Catalunya / Quuen's University Belfast - School of Electronics, Electrical Engineering and Computer Science, 2010)
Projecte/Treball Final de Carrera
Accés obertIn today’s society, an incredible amount of systems include an authentication process before a user can access requested services ranging from logging into a computer system or webpage, gaining access to secure buildings, ... -
Designing cloud-based electronic health record system with attribute-based encryption
(2015-05-01)
Article
Accés obertWith the development of cloud computing, electronic health record (EHR) system has appeared in the form of patient-centric, in which patients store their personal health records (PHRs) at a remote cloud server and selectively ... -
Effects of using an encrypted image corrupted by noise and occlusion in a security system based on joint transform correlator and Gyrator transform
(Institute of Electrical and Electronics Engineers (IEEE), 2016)
Comunicació de congrés
Accés obert -
Etiquetas ópticas identificativas invariantes a deformaciones de perspectiva y distorsión
(2009)
Comunicació de congrés
Accés obert -
Faking countermeasure against side-channel attacks
(International Frequency Sensor Association Publishing, S. L, 2017-12-21)
Capítol de llibre
Accés obert -
Generalized formulation of an encryption system based on a joint transform correlator and fractional Fourier transform
(Institute of Physics (IOP), 2014-12-01)
Article
Accés obertWe propose a generalization of the encryption system based on double random phase encoding (DRPE) and a joint transform correlator (JTC), from the Fourier domain to the fractional Fourier domain (FrFD) by using the fractional ... -
Image quality and security through nonlinear joint transform encryption
(IEEE Press, 2016)
Text en actes de congrés
Accés obert -
Images encryption system based on a fractional joint transform correlator and nonlinear filtering
(2014)
Article
Accés obertA new optical security system for image encryption based on a fractional joint transform correlator and nonlinear filtering is proposed. The position of the lens in the proposed optical encryption setup can be chosen, so ... -
Implementació d’un sistema d’encriptació/desencriptació d’informació basat en microcontrolador i que incorpora mesures anti-atac
(Universitat Politècnica de Catalunya, 2014-06)
Treball Final de Grau
Accés obertEn aquest Treball de Final de Grau s’explica el desenvolupament d’un mòdul personal que protegeix informació mitjançant la criptografia. Aquest permet encriptar la informació de forma que des de l’ordinador en el qual està ... -
Implementation of a real-time voice encryption system
(Universitat Politècnica de Catalunya, 2008-02)
Projecte/Treball Final de Carrera
Accés obertIn this master thesis, a voice encryption system was programmed as a real-time software application. The idea was based on a previous graduation thesis and is meant to show an example of the possibilities of signal ... -
Implementation on MicroBlaze of AES algorithm to reveal fake keys against side-channel attacks
(Institute of Electrical and Electronics Engineers (IEEE), 2014)
Comunicació de congrés
Accés restringit per política de l'editorialThis paper presents a new proposal for hiding the cryptographic key, when the so-called side-channel attacks (SCAs) are applied to break the security of AES-128. The algorithm was executed on MicroBlaze, but the proposed ... -
Improved decryption quality and security of a joint transform correlator-based encryption system
(IOPScience, 2012-12-06)
Article
Accés obert -
Independent comparison of popular DPI tools for traffic classification
(Universitat Politècnica de Catalunya, 2016-10)
Treball Final de Grau
Accés obertL’any 2014 uns doctorants de l’UPC van modificar un software anomenat Volunteer-Based System (VBS)[1] perquè no només capturés paquets i els agrupés en traces, sinó perquè les traces guardessin informació sobre el procés ...