Now showing items 1-20 of 74

    • A collaborative protocol for anonymous reporting in vehicular ad hoc networks 

      Tripp Barba, Carolina; Urquiza Aguiar, Luis; Aguilar Igartua, Mónica; Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge; Pallarès Segarra, Esteve (Elsevier, 2013-11-01)
      Article
      Restricted access - publisher's policy
      Vehicular ad hoc networks (VANETs) have emerged to leverage the power of modern communication technologies, applied to both vehicles and infrastructure. Allowing drivers to report traffic accidents and violations through ...
    • A Collaborative Protocol for Private Retrieval of Location-Based Information 

      Rebollo Monedero, David; Forné Muñoz, Jorge; Subirats Maté, Laia; Solanas, Agustí; Martínez-Ballasté, Antoni (IADIS Press, 2009)
      Conference lecture
      Open Access
      Privacy and security are paramount for the proper deployment of location-based services (LBSs). We present a novel protocol based on user collaboration to privately retrieve location-based information from an LBS provider. ...
    • A LINDDUN-based framework for privacy threat analysis on identification and authentication processes 

      Robles González, Antonio; Parra Arnau, Javier; Forné Muñoz, Jorge (2020)
      Article
      Restricted access - publisher's policy
      Identification and authentication (IA) are security procedures that are ubiquitous in our online life, and that constantly require disclosing personal, sensitive information to non-fully trusted service providers, or to ...
    • A novel dynamic reputation-based source routing protocol for mobile ad hoc networks 

      Guaya, Lenin; Pallarès Segarra, Esteve; Mezher, Ahmad Mohamad; Forné Muñoz, Jorge (2019-03)
      Article
      Open Access
      Routing in mobile ad hoc networks is based on the cooperation of the network’s nodes. The presence of selfish nodes that do not cooperate in this task drastically reduces the number of delivered packets. In order to find ...
    • A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression 

      Parra, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (2010-09)
      Article
      Restricted access - publisher's policy
      We propose an architecture that preserves user privacy in the semantic Web via tag suppression. In tag suppression, users may wish to tag some resources and refrain from tagging some others in order to hinder privacy ...
    • A privacy-preserving architecture for the semantic web based on tag suppression 

      Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (Springer, 2010)
      Conference report
      Restricted access - publisher's policy
      We propose an architecture that preserves user privacy in the semantic Web via tag suppression. In tag suppression, users may wish to tag some resources and refrain from tagging some others in order to hinder privacy ...
    • A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings 

      Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (2012)
      Article
      Restricted access - publisher's policy
      Recommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture ...
    • A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings 

      Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (Springer, 2011)
      Conference report
      Restricted access - publisher's policy
      Recommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture ...
    • A privacy-protecting architecture for recommendation systems via the suppression of ratings 

      Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (2012-04)
      Article
      Restricted access - publisher's policy
      Recommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture ...
    • An Algorithm for k-Anonymous Microaggregation and Clustering Inspired by the Design of Distortion-Optimized Quantizers 

      Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (Elsevier Science Ltd., 2011)
      Article
      Restricted access - publisher's policy
      We present a multidisciplinary solution to the problems of anonymous microaggregation and clustering, illustrated with two applications, namely privacy protection in databases, and private retrieval of location-based ...
    • Analyzing and testing viewability methods in an advertising network 

      Expósito Ventura, Marta; Ruipérez Valiente, José A.; Forné Muñoz, Jorge (Institute of Electrical and Electronics Engineers (IEEE), 2020-06-29)
      Article
      Open Access
      Many of the current online businesses base completely their revenue models in earnings from online advertisement. A problematic fact is that according to recent studies more than half of display ads are not being detected ...
    • Anonymizing cybersecurity data in critical infrastructures: the CIPSEC approach 

      Rodríguez Hoyos, Ana Fernanda; Estrada Jiménez, José Antonio; Rebollo-Monedero, David; Forné Muñoz, Jorge; Trapero Burgos, Rubén; Álvarez Romero, Antonio (ISCRAM, 2019)
      Conference report
      Open Access
      Cybersecurity logs are permanently generated by network devices to describe security incidents. With modern computing technology, such logs can be exploited to counter threats in real time or before they gain a foothold. ...
    • Building hierarchical public key infrastructures in mobile ad-hoc networks 

      Satizábal Echavarría, Isabel Cristina; Forné Muñoz, Jorge; Hernández Serrano, Juan; Pegueroles Vallés, Josep R. (Springer, 2006)
      Conference report
      Restricted access - publisher's policy
      Dynamism of mobile ad-hoc networks implies changing trust relationships among their nodes that can be established using peer-to-peer PKIs. Here, certification paths can be built although part of the infrastructure is ...
    • Categorization of bibsonomy tags to apply privacy-preserving mechanisms. 

      Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (2012-07-24)
      Other
      Open Access
      In this technical report, we approach one of the practical aspects when it comes to represent users' interests from their tagging activity, namely the categorization of tags into high-level categories of interest. The ...
    • Certificate revocation system implementation based on the Merkle Hash Tree 

      Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar; Soriano Ibáñez, Miguel (2004-01)
      Article
      Restricted access - publisher's policy
      Public-key cryptography is widely used to provide Internet security services. The public-key infrastructure (PKI) is the infrastructure that supports the public-key cryptography, and the revocation of certificates implies ...
    • CERVANTES - A certificate validation test-bed 

      Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar; Soriano Ibáñez, Miguel (Springer Berlin / Heidelberg, 2004)
      Conference report
      Restricted access - publisher's policy
      Certificate validation is one of the toughest scalability problems of the PKI. The goal of this paper is to introduce a Java platform for certificate revocation called CERVANTES. CERVANTES pretends to be an easy to extend ...
    • CIPSEC-Enhancing Critical Infrastructure Protection with Innovative Security Framework 

      Marín Tordera, Eva; Masip Bruin, Xavier; Forné Muñoz, Jorge (River Publishers, 2019-07-22)
      Part of book or chapter of book
      Restricted access - publisher's policy
      In the recent years, the majority of the world’s Critical Infrastructures (CIs) have evolved to be more flexible, cost efficient and able to offer better services and conditions for business growth. Through this evolution, ...
    • Coherent and automatic address resolution for vehicular ad hoc networks 

      Urquiza Aguiar, Luis; Tripp Barba, Carolina; Rebollo Monedero, David; Mezher, Ahmad Mohamad; Aguilar Igartua, Mónica; Forné Muñoz, Jorge (2015)
      Article
      Open Access
      The interest in vehicular communications has increased notably. In this paper, the use of the address resolution (AR) procedures is studied for vehicular ad hoc networks (VANETs).We analyse the poor performance of AR ...
    • Coherent, automatic address resolution for vehicular ad hoc networks 

      Urquiza Aguiar, Luis; Tripp Barba, Carolina; Rebollo Monedero, David; Mezher, Ahmad Mohamad; Aguilar Igartua, Mónica; Forné Muñoz, Jorge; Estrada Jiménez, José Antonio (2017-01-01)
      Article
      Open Access
      The interest in vehicular communications has increased notably. In this paper, the use of the address resolution (AR) procedures is studied for vehicular ad hoc networks (VANETs). We analyse the poor performance of AR ...
    • Computational improvements in parallelized k-anonymous microaggregation of large databases 

      Mezher, Ahmad Mohamad; Garcia Alvarez, Alejandro; Rebollo Monedero, David; Forné Muñoz, Jorge (2017)
      Conference report
      Restricted access - publisher's policy
      The technical contents of this paper fall within the field of statistical disclosure control (SDC), which concerns the postprocessing of the demographic portion of the statistical results of surveys containing sensitive ...