Now showing items 1-20 of 40

    • A new class of codes for fingerprinting schemes 

      Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
      Conference report
      Restricted access - publisher's policy
      In this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ...
    • A new cross-layer attack to TCP in cognitive radio networks 

      León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2009)
      Conference report
      Restricted access - publisher's policy
    • A note about the traceability properties of linear codes 

      Fernández Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus (Springer, 2007)
      Conference report
      Restricted access - publisher's policy
      We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ...
    • An Algorithm for k-Anonymous Microaggregation and Clustering Inspired by the Design of Distortion-Optimized Quantizers 

      Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (Elsevier Science Ltd., 2011)
      Article
      Restricted access - publisher's policy
      We present a multidisciplinary solution to the problems of anonymous microaggregation and clustering, illustrated with two applications, namely privacy protection in databases, and private retrieval of location-based ...
    • An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking 

      Esparza Martín, Óscar; Muñoz Tapia, José Luis; Tomás Buliart, Joan; Soriano Ibáñez, Miguel (2010-04-02)
      Article
      Open Access
      Mobile agents are software entities consisting of code, data, and state that can migrate autonomously from host to host executing their code. In such scenario there are some security issues that must be considered. In ...
    • Attribute-based authorization for structured Peer-to-Peer (P2P) networks 

      Suarez Touzeda, Diego; Sierra Camara, Jose Maria; Zeadally, Sherali; Soriano Ibáñez, Miguel (Elsevier, 2015-11-01)
      Article
      Open Access
      We present the deficiencies of traditional identity-based authorization models in structured Peer-to-Peer (P2P) networks where users' Public Key Certificates (PKCs) represent two roles, authentication and authorization, ...
    • Certificate revocation system implementation based on the Merkle Hash Tree 

      Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar; Soriano Ibáñez, Miguel (2004-01)
      Article
      Restricted access - publisher's policy
      Public-key cryptography is widely used to provide Internet security services. The public-key infrastructure (PKI) is the infrastructure that supports the public-key cryptography, and the revocation of certificates implies ...
    • CERVANTES - A certificate validation test-bed 

      Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar; Soriano Ibáñez, Miguel (Springer Berlin / Heidelberg, 2004)
      Conference report
      Restricted access - publisher's policy
      Certificate validation is one of the toughest scalability problems of the PKI. The goal of this paper is to introduce a Java platform for certificate revocation called CERVANTES. CERVANTES pretends to be an easy to extend ...
    • Cifrado en flujo basado en NLFSR 

      Gonzalo, R; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1998-07)
      Article
      Open Access
      Los mecanismos de cifrado en flujo constituyen una alternativa interesante para proporcionar confidencialidad en distintos entornos como comunicaciones móvi­les y redes de alta velocidad. En la literatura se han estudiado ...
    • Cooperative detection of primary user emulation attacks in CRNs 

      León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012)
      Article
      Restricted access - publisher's policy
      Cognitive radio networks (CRNs) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. With such purpose, coexistence mechanisms among CRN nodes or secondary users and ...
    • Criptografía y seguridad en comunicaciones 

      Forné Muñoz, Jorge; Melus Moreno, José Luis; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1995-07)
      Article
      Open Access
    • Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems 

      Touceda, D.S.; Cámara, J.M.S.; Soriano Ibáñez, Miguel (2012-06)
      Article
      Restricted access - publisher's policy
      Several alternative schemes have been presented in the literature to try to solve the users’ admission problem in P2P systems when it is not possible to include a logically centralized authority (either online or ...
    • Design of a P2P content recommendation system using affinity networks 

      Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012-08)
      Article
      Restricted access - publisher's policy
      The success and intensive use of social networks makes strategies for efficient document location a hot topic of research. In this paper, we propose a common vector space to describe documents and users to create a social ...
    • DocCloud: a document recommender system on cloud computing with plausible deniability 

      Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2013-04-16)
      Article
      Restricted access - publisher's policy
      Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. ...
    • Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis 

      Rebollo-Monedero, David; Mezher, Ahmad Mohamad; Casanova, Xavier; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2019-07-09)
      Article
      Open Access
      k-Anonymous microaggregation is a widespread technique to address the problem of protecting the privacy of the respondents involved beyond the mere suppression of their identifiers, in applications where preserving the ...
    • El impacto de las políticas de evaluación del profesorado en la posición en los ránquines universitarios: el caso de la Universidad Politécnica de Cataluña 

      García-Berro Montilla, Enrique; Roca Martín, Santiago; Navallas Ramos, Francisco Javier; Soriano Ibáñez, Miguel; Ras Sabido, Antoni (2016-01)
      Article
      Open Access
      La universidad española ha afrontado con éxito el tránsito entre una universidad clásica, eminentemente docente, y una universidad moderna, en la que la investigación juega un papel esencial. Gran parte de este éxito reside ...
    • Esquemas de fingerprinting para la protección de derechos de distribución 

      Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Domingo Ferrer, Josep; Sebé Feixas, Francesc (Asociación de Técnicos de Informática, 2002-12)
      Article
      Open Access
    • Generación y análisis de secuencias pseudoaleatorias 

      Soriano Ibáñez, Miguel; Gonzalo Díaz, Raúl (Edicions UPC, 1999)
      Book
      Restricted access to the UPC academic community
      Las secuencias pseudoaleatorias son utilizadas en diversos entornos relacionados con el mundo de las telecomunicaciones. Entre otros ámbitos de aplicación, podemos encontrar la criptografía, transmisión de datos (tanto ...
    • Genetic algorithms for designing network security protocols 

      Zarza, Luis; Forné Muñoz, Jorge; Pegueroles Vallés, Josep R.; Soriano Ibáñez, Miguel (World Scientífic, 2010)
      Part of book or chapter of book
      Restricted access - publisher's policy
      The design of cryptographic and security protocols for new scenarios and applications can be computationally expensive. Examples of these can be sensor or mobile ad-hoc networks where thousands of nodes can be involved. ...
    • Incremental k-Anonymous microaggregation in large-scale electronic surveys with optimized scheduling 

      Rebollo Monedero, David; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel; Hernández Baigorri, César (Institute of Electrical and Electronics Engineers (IEEE), 2018-10-15)
      Article
      Open Access
      Improvements in technology have led to enormous volumes of detailed personal information made available for any number of statistical studies. This has stimulated the need for anonymization techniques striving to attain a ...