Enviaments recents

  • RIAPPA: a robust identity assignment protocol for P2P overlays 

    Caubet Fernández, Juan; Esparza Martín, Óscar; Muñoz Tapia, José Luis; Alins Delgado, Juan José; Mata Diaz, Jorge (2014-12-01)
    Article
    Accés obert
    Peer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed infrastructures, even for Internet scale. But the research community has been questioning the security of these networks ...
  • A methodology to introduce sustainability into the Final Year Project to foster sustainable engineering projects 

    López Álvarez, David; Sánchez Carracedo, Fermín; Vidal López, Eva María; Pegueroles Vallés, Josep R.; Alier Forment, Marc; Cabré Garcia, José M.; García Almiñana, Jordi; García, Helena (Institute of Electrical and Electronics Engineers (IEEE), 2014)
    Text en actes de congrés
    Accés obert
    The introduction of sustainability skills into higher education curricula is a natural effect of the increasing importance of sustainability in our daily lives. Topics like green computing, sustainable design or environmental ...
  • Cross-layer packet scheduler for QoS support over digital video broadcasting-second generation broadband satellite systems 

    Rendón Morales, Elizabeth; Mata Diaz, Jorge; Alins Delgado, Juan José; Muñoz Tapia, José Luis; Esparza Martín, Óscar (2014-10-01)
    Article
    Accés restringit per política de l'editorial
    This article presents a cross-layer packet scheduler to provide end-to-end QoS guarantees for Digital Video Broadcasting-Second Generation (DVB-S2) broadband satellite systems. The scheduler design is based on a cross-layer ...
  • MAX-MIN based buffer allocation for VANETs 

    Urquiza Aguiar, Luis; Vázquez Rodas, Andrés; Tripp Barba, Carolina; Aguilar Igartua, Mónica; Cruz Llopis, Luis Javier de la; Sanvicente Gargallo, Emilio (Institute of Electrical and Electronics Engineers (IEEE), 2014)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    Many proposals have studied the optimization of the EDCA mechanism used by the IEEE 802.11p MAC layer to provide QoS. In this work, we focus on the queuing process done by the different Access Categories (ACs). We propose ...
  • Utilizando certificados implícitos para asignar identidades en Overlays P2P 

    Caubet, Juan; Muñoz Tapia, José Luis; Esparza Martín, Óscar (Universidad de Alicante, 2014)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    Desde hace ños, la seguridad en las redes P2P estructuradas está siendo cuestionada, y por ello se han propuesto muchos trabajos con el objetivo de proporcionar enrutamiento seguro, sistemas de reputaci´on, control de ...
  • A simple closed-form approximation for the packet loss rate of a TCP connection over wireless links 

    Mata Diaz, Jorge; Alins Delgado, Juan José; Muñoz Tapia, José Luis; Esparza Martín, Óscar (2014-09-15)
    Article
    Accés obert
    This letter presents a new and simple model for a TCP flow experiencing random packet losses due to both transmission errors and congestion events. From this model, we will derive a straightforward expression of a unified ...
  • MHT-based mechanism for certificate revocation in VANETs 

    Muñoz Tapia, José Luis; Esparza Martín, Óscar; Hernández Gañán, Carlos; Mata Diaz, Jorge; Alins Delgado, Juan José; Ganchev, Ivan (Springer, 2014-07)
    Capítol de llibre
    Accés restringit per política de l'editorial
    Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A Public Key Infrastructure (PKI) can be utilized to provide these functionalities ...
  • Evaluation of a query-obfuscation mechanism for the privacy protection of user profile 

    Estrada, Jose Antonio; Rodríguez, Ana Fernanda; Parra-Arnau, Javier; Forné Muñoz, Jorge (2014-06-30)
    Article
    Accés obert
    Traces related to our identity are left every day while we browse the Internet. Being the user’s information a very valued asset for most of the companies, user activities on Internet are permanently monitored, and the ...
  • Propagation and packet error models in VANET simulations 

    Urquiza Aguiar, Luis; Tripp Barba, Carolina; Martín Faus, Isabel Victoria; Aguilar Igartua, Mónica (2014-05-01)
    Article
    Accés restringit per política de l'editorial
    In this paper, we review the workflow of the channel and physical layer modules in VANET simulations and briefly survey some of the most used propagation and packet error models in network simulators for this kind of ...
  • Certificate revocation system implementation based on the Merkle Hash Tree 

    Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar; Soriano Ibáñez, Miguel (2004-01)
    Article
    Accés restringit per política de l'editorial
    Public-key cryptography is widely used to provide Internet security services. The public-key infrastructure (PKI) is the infrastructure that supports the public-key cryptography, and the revocation of certificates implies ...
  • Tracing traitors by guessing secrets. The q-ary case 

    Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    In this paper we present, by solving a variant of the guessing secrets problem defined by Chung, Graham and Leighton [3], a sequential traitor tracing scheme equipped with an efficient identification algorithm. Sequential ...
  • A note about the traceability properties of linear codes 

    Fernández Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus (Springer, 2007)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ...

Mostra'n més