Articles de revista: Enviaments recents
Ara es mostren els items 1-12 de 56
-
RIAPPA: a robust identity assignment protocol for P2P overlays
(2014-12-01)
Article
Accés obertPeer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed infrastructures, even for Internet scale. But the research community has been questioning the security of these networks ... -
Cross-layer packet scheduler for QoS support over digital video broadcasting-second generation broadband satellite systems
(2014-10-01)
Article
Accés restringit per política de l'editorialThis article presents a cross-layer packet scheduler to provide end-to-end QoS guarantees for Digital Video Broadcasting-Second Generation (DVB-S2) broadband satellite systems. The scheduler design is based on a cross-layer ... -
A simple closed-form approximation for the packet loss rate of a TCP connection over wireless links
(2014-09-15)
Article
Accés obertThis letter presents a new and simple model for a TCP flow experiencing random packet losses due to both transmission errors and congestion events. From this model, we will derive a straightforward expression of a unified ... -
Evaluation of a query-obfuscation mechanism for the privacy protection of user profile
(2014-06-30)
Article
Accés obertTraces related to our identity are left every day while we browse the Internet. Being the user’s information a very valued asset for most of the companies, user activities on Internet are permanently monitored, and the ... -
Propagation and packet error models in VANET simulations
(2014-05-01)
Article
Accés restringit per política de l'editorialIn this paper, we review the workflow of the channel and physical layer modules in VANET simulations and briefly survey some of the most used propagation and packet error models in network simulators for this kind of ... -
Certificate revocation system implementation based on the Merkle Hash Tree
(2004-01)
Article
Accés restringit per política de l'editorialPublic-key cryptography is widely used to provide Internet security services. The public-key infrastructure (PKI) is the infrastructure that supports the public-key cryptography, and the revocation of certificates implies ... -
Dynamic buffer sizing for wireless devices via maximum entropy
(2014-05-15)
Article
Accés restringit per política de l'editorialBuffer overflow is an important phenomenon in data networks that has much bearing on the overall network performance. Such overflow critically depends on the amount of storage space allotted to the transmission channels. ... -
VSPLIT: a cross-layer architecture for V2I TCP services over 802.11
(2013-12)
Article
Accés restringit per política de l'editorialThis article proposes VSPLIT, a new architecture based on TCP cross-layering and splitting techniques for optimizing the transport layer performance in vehicular networks for Internet-based Vehicle-to-Infrastructure (V2I) ... -
Energy-efficient physical layer packet authenticator for machine-to-machine networks
(Wiley-Blackwell, 2013-06)
Article
Accés restringit per política de l'editorialMachine-to-machine networks are spreading over every sector of our society due to their self-organisation capabilities. In these networks, thousands of devices are left unattended for years of operation without the possibility ... -
DocCloud: a document recommender system on cloud computing with plausible deniability
(2013-04-16)
Article
Accés restringit per política de l'editorialRecommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. ... -
Measuring the privacy of user profiles in personalized information systems
(Elsevier, 2014-04-01)
Article
Accés restringit per política de l'editorialPersonalized information systems are information-filtering systems that endeavor to tailor information-exchange functionality to the specific interests of their users. The ability of these systems to profile users is, on ... -
Reconciling privacy and efficient utility management in smart cities
(2014-01-01)
Article
Accés restringit per política de l'editorialA key aspect in the design of smart cities is, undoubtedly, a plan for the efficient management of utilities, enabled by technologies such as those entailing smart metering of the residential consumption of electricity, ...