Now showing items 1-20 of 26

    • A modeling of certificate revocation and its application to synthesis of revocation traces 

      Hernández Gañán, Carlos; Mata Diaz, Jorge; Muñoz Tapia, José Luis; Hernández Serrano, Juan; Esparza Martín, Óscar; Alins Delgado, Juan José (2012)
      Article
      Restricted access - publisher's policy
      One of the hardest tasks of a public key infrastructure (PKI) is to manage revocation. New communication paradigms push the revocation system to the limit and an accurate resource assessment is necessary before implementing ...
    • A new cross-layer attack to TCP in cognitive radio networks 

      León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2009)
      Conference report
      Restricted access - publisher's policy
    • Building hierarchical public key infrastructures in mobile ad-hoc networks 

      Satizábal Echavarría, Isabel Cristina; Forné Muñoz, Jorge; Hernández Serrano, Juan; Pegueroles Vallés, Josep R. (Springer, 2006)
      Conference report
      Restricted access - publisher's policy
      Dynamism of mobile ad-hoc networks implies changing trust relationships among their nodes that can be established using peer-to-peer PKIs. Here, certification paths can be built although part of the infrastructure is ...
    • COACH: COllaborative certificate stAtus CHecking mechanism for VANETs 

      Hernández Gañán, Carlos; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Mata Diaz, Jorge; Hernández Serrano, Juan; Alins Delgado, Juan José (2011-11-01)
      Article
      Restricted access - publisher's policy
      Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A public key infrastructure (PKI) can be used to provide these functionalities using ...
    • Cooperative detection of primary user emulation attacks in CRNs 

      León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012)
      Article
      Restricted access - publisher's policy
      Cognitive radio networks (CRNs) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. With such purpose, coexistence mechanisms among CRN nodes or secondary users and ...
    • Design of a P2P content recommendation system using affinity networks 

      Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012-08)
      Article
      Restricted access - publisher's policy
      The success and intensive use of social networks makes strategies for efficient document location a hot topic of research. In this paper, we propose a common vector space to describe documents and users to create a social ...
    • DocCloud: a document recommender system on cloud computing with plausible deniability 

      Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2013-04-16)
      Article
      Restricted access - publisher's policy
      Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. ...
    • e-Mazing - Juego de autoaprendizaje en terminales móviles 

      Mechoulam Nikolaeva, Mario Viktorov; Hernández Serrano, Juan; Pegueroles Vallés., Josep (Escola Tècnica Superior d'Enginyers de Telecomunicació de Barcelona, 2010)
      Article
      Open Access
      ¿Te gustan los juegos? En este artículo se describirá el resultado de un Proyecto de Final de Carrera de la EPSC: un videojuego educativo para teléfonos móviles. Los juegos y más concretamente los videojuegos, pueden ...
    • Energy-efficient physical layer packet authenticator for machine-to-machine networks 

      Bartoli, Andrea; Hernández Serrano, Juan; León Abarca, Olga; Kountouris, Apostolous; Barthel, Dominique (Wiley-Blackwell, 2013-06)
      Article
      Restricted access - publisher's policy
      Machine-to-machine networks are spreading over every sector of our society due to their self-organisation capabilities. In these networks, thousands of devices are left unattended for years of operation without the possibility ...
    • Low-cost group rekeying for unattended wireless sensor networks 

      Hernández Serrano, Juan; Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Gañán, Carlos (2012)
      Article
      Restricted access - publisher's policy
      Wireless sensor networks (WSNs) are made up of large groups of nodes that perform distributed monitoring services. Since sensor measurements are often sensitive data acquired in hostile environments, securing WSN becomes ...
    • Low-power low-rate goes long-range: the case for secure and cooperative machine-to-machine communications 

      Bartoli, Andrea; Dohler, Mischa; Hernández Serrano, Juan; Kountouris, Apostolous; Barthel, Dominique (2011)
      Conference report
      Restricted access - publisher's policy
      The vision of connecting a large amount of objects on this planet to improve well-being and safety is slowly taking shape. Preceded by a decade-long era of research on low-power low-rate short-range wireless sensor networks, ...
    • Modeling the lion attack in cognitive radio networks 

      Hernández Serrano, Juan; León Abarca, Olga; Soriano Ibáñez, Miguel (2011)
      Article
      Open Access
      Cognitive radio is a promising technology aiming to improve the utilization of the radio electromagnetic spectrum. A cognitive radio is a smart device which runs radio applications software to perform signal processing. ...
    • Montar un punto de acceso inalámbrico 802.11 en Linux 

      Hernández Serrano, Juan; Pegueroles Vallés, Josep Rafel (Escola Tècnica Superior d'Enginyers de Telecomunicació de Barcelona, 2004)
      Article
      Open Access
      La gente se mueve, las redes no. Estas dos sentencias definen más que nada la explosión de las redes inalámbricas de área local o WLAN (WirelessLocalArea Network). En unos pocos años el precio de los dispositivos WLANha ...
    • Multimedia copyright protection platform demonstrator 

      Soriano Ibáñez, Miguel; Fernández Muñoz, Marcel; Sayrol Clols, Elisa; Tomás Buliart, Joan; Casanellas, Joan; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan (Springer, 2005)
      Conference report
      Restricted access - publisher's policy
      The work presented in this paper consists in the development of a portable platform to protect the copyright and distribution rights of digital contents, and empirically demonstrate the capacity of several marking and ...
    • On the road to secure and privacy-preserving IoT ecosystems 

      Hernández Serrano, Juan; Muñoz Tapia, José Luis; Bröring, Arne; Esparza Martín, Óscar; Mikkelsen, Lars; Schwarzott, Wolfgang; León Abarca, Olga; Zibuschka, Jan (Springer, 2017)
      Conference report
      Restricted access - publisher's policy
      The Internet of Things (IoT) is on the rise. Today, various IoT platforms are already available, giving access to myriads of things. Initiatives such as BIG IoT are bringing those IoT platforms together in order to form ...
    • Privacy risk analysis in the IoT domain 

      Hernández Serrano, Juan; Muñoz Tapia, José Luis; León Abarca, Olga; Mikkelsen, Lars; Schwefel, Hans-Peter; Bröring, Arne (Institute of Electrical and Electronics Engineers (IEEE), 2018)
      Conference report
      Open Access
      Most IoT systems are using or exchanging user related information between system components. This means that privacy is a key factor in these systems. Privacy, both in terms of not allowing unauthorized access to information, ...
    • Providing k-anonymity and revocation in ubiquitous VANETs 

      Caballero Gil, Cándido; Molina Gil, Jezabel; Hernández Serrano, Juan; León Abarca, Olga; Soriano Ibáñez, Miguel (Elsevier, 2016-01)
      Article
      Open Access
      Abstract Vehicular ad hoc networks (VANETs) is considered a milestone in improving the safety and efficiency in transportation. Nevertheless, when information from the vehicular communications is combined with data from ...
    • Reconciling privacy and efficient utility management in smart cities 

      Rebollo Monedero, David; Bartoli, Andrea; Hernández Serrano, Juan; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2014-01-01)
      Article
      Restricted access - publisher's policy
      A key aspect in the design of smart cities is, undoubtedly, a plan for the efficient management of utilities, enabled by technologies such as those entailing smart metering of the residential consumption of electricity, ...
    • Robust detection of primary user emulation attacks in IEEE 802.22 networks 

      León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (ACM Press, NY, 2011)
      Conference report
      Open Access
      Cognitive Radio (CR) technology constitutes a new paradigm where wireless devices can access the spectrum left unused by licensed or primary users in an opportunistic way. This feature opens the door to a main new threat: ...
    • Secure lossless aggregation for Smart Grid M2M networks 

      Bartoli, Andrea; Hernández Serrano, Juan; Soriano Ibáñez, Miguel; Dohler, Mischa; Kountouris, Apostolous; Barthel, Dominique (IEEE Computer Society Publications, 2010)
      Conference report
      Open Access
      Whilst security is generally perceived as an important constituent of communication systems, this paper offers a viable security-communication-tradeoff particularly tailored to Advanced Metering Infrastructures (AMIs) in ...