Ara es mostren els items 1-12 de 56

    • RIAPPA: a robust identity assignment protocol for P2P overlays 

      Caubet Fernández, Juan; Esparza Martín, Óscar; Muñoz Tapia, José Luis; Alins Delgado, Juan José; Mata Diaz, Jorge (2014-12-01)
      Article
      Accés obert
      Peer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed infrastructures, even for Internet scale. But the research community has been questioning the security of these networks ...
    • Cross-layer packet scheduler for QoS support over digital video broadcasting-second generation broadband satellite systems 

      Rendón Morales, Elizabeth; Mata Diaz, Jorge; Alins Delgado, Juan José; Muñoz Tapia, José Luis; Esparza Martín, Óscar (2014-10-01)
      Article
      Accés restringit per política de l'editorial
      This article presents a cross-layer packet scheduler to provide end-to-end QoS guarantees for Digital Video Broadcasting-Second Generation (DVB-S2) broadband satellite systems. The scheduler design is based on a cross-layer ...
    • A simple closed-form approximation for the packet loss rate of a TCP connection over wireless links 

      Mata Diaz, Jorge; Alins Delgado, Juan José; Muñoz Tapia, José Luis; Esparza Martín, Óscar (2014-09-15)
      Article
      Accés obert
      This letter presents a new and simple model for a TCP flow experiencing random packet losses due to both transmission errors and congestion events. From this model, we will derive a straightforward expression of a unified ...
    • Evaluation of a query-obfuscation mechanism for the privacy protection of user profile 

      Estrada, Jose Antonio; Rodríguez, Ana Fernanda; Parra-Arnau, Javier; Forné Muñoz, Jorge (2014-06-30)
      Article
      Accés obert
      Traces related to our identity are left every day while we browse the Internet. Being the user’s information a very valued asset for most of the companies, user activities on Internet are permanently monitored, and the ...
    • Propagation and packet error models in VANET simulations 

      Urquiza Aguiar, Luis; Tripp Barba, Carolina; Martín Faus, Isabel Victoria; Aguilar Igartua, Mónica (2014-05-01)
      Article
      Accés restringit per política de l'editorial
      In this paper, we review the workflow of the channel and physical layer modules in VANET simulations and briefly survey some of the most used propagation and packet error models in network simulators for this kind of ...
    • Certificate revocation system implementation based on the Merkle Hash Tree 

      Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar; Soriano Ibáñez, Miguel (2004-01)
      Article
      Accés restringit per política de l'editorial
      Public-key cryptography is widely used to provide Internet security services. The public-key infrastructure (PKI) is the infrastructure that supports the public-key cryptography, and the revocation of certificates implies ...
    • Dynamic buffer sizing for wireless devices via maximum entropy 

      Vázquez Rodas, Andrés; Cruz Llopis, Luis Javier de la; Aguilar Igartua, Mónica; Sanvicente Gargallo, Emilio (2014-05-15)
      Article
      Accés restringit per política de l'editorial
      Buffer overflow is an important phenomenon in data networks that has much bearing on the overall network performance. Such overflow critically depends on the amount of storage space allotted to the transmission channels. ...
    • VSPLIT: a cross-layer architecture for V2I TCP services over 802.11 

      Reñé Vicente, Sergi; Esparza Martín, Óscar; Alins Delgado, Juan José; Mata Diaz, Jorge; Muñoz Tapia, José Luis (2013-12)
      Article
      Accés restringit per política de l'editorial
      This article proposes VSPLIT, a new architecture based on TCP cross-layering and splitting techniques for optimizing the transport layer performance in vehicular networks for Internet-based Vehicle-to-Infrastructure (V2I) ...
    • Energy-efficient physical layer packet authenticator for machine-to-machine networks 

      Bartoli, Andrea; Hernández Serrano, Juan; León Abarca, Olga; Kountouris, Apostolous; Barthel, Dominique (Wiley-Blackwell, 2013-06)
      Article
      Accés restringit per política de l'editorial
      Machine-to-machine networks are spreading over every sector of our society due to their self-organisation capabilities. In these networks, thousands of devices are left unattended for years of operation without the possibility ...
    • DocCloud: a document recommender system on cloud computing with plausible deniability 

      Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2013-04-16)
      Article
      Accés restringit per política de l'editorial
      Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. ...
    • Measuring the privacy of user profiles in personalized information systems 

      Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (Elsevier, 2014-04-01)
      Article
      Accés restringit per política de l'editorial
      Personalized information systems are information-filtering systems that endeavor to tailor information-exchange functionality to the specific interests of their users. The ability of these systems to profile users is, on ...
    • Reconciling privacy and efficient utility management in smart cities 

      Rebollo Monedero, David; Bartoli, Andrea; Hernández Serrano, Juan; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2014-01-01)
      Article
      Accés restringit per política de l'editorial
      A key aspect in the design of smart cities is, undoubtedly, a plan for the efficient management of utilities, enabled by technologies such as those entailing smart metering of the residential consumption of electricity, ...