Now showing items 1-20 of 36

  • An Algorithm for k-Anonymous Microaggregation and Clustering Inspired by the Design of Distortion-Optimized Quantizers 

    Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (Elsevier Science Ltd., 2011)
    Article
    Restricted access - publisher's policy
    We present a multidisciplinary solution to the problems of anonymous microaggregation and clustering, illustrated with two applications, namely privacy protection in databases, and private retrieval of location-based ...
  • A new class of codes for fingerprinting schemes 

    Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
    Conference report
    Restricted access - publisher's policy
    In this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ...
  • A new cross-layer attack to TCP in cognitive radio networks 

    León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2009)
    Conference report
    Restricted access - publisher's policy
  • An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking 

    Esparza Martín, Óscar; Muñoz Tapia, José Luis; Tomás Buliart, Joan; Soriano Ibáñez, Miguel (2010-04-02)
    Article
    Open Access
    Mobile agents are software entities consisting of code, data, and state that can migrate autonomously from host to host executing their code. In such scenario there are some security issues that must be considered. In ...
  • A note about the traceability properties of linear codes 

    Fernández Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus (Springer, 2007)
    Conference report
    Restricted access - publisher's policy
    We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ...
  • Attribute-based authorization for structured Peer-to-Peer (P2P) networks 

    Suarez Touzeda, Diego; Sierra Camara, Jose Maria; Zeadally, Sherali; Soriano Ibáñez, Miguel (Elsevier, 2015-11-01)
    Article
    Open Access
    We present the deficiencies of traditional identity-based authorization models in structured Peer-to-Peer (P2P) networks where users' Public Key Certificates (PKCs) represent two roles, authentication and authorization, ...
  • Certificate revocation system implementation based on the Merkle Hash Tree 

    Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar; Soriano Ibáñez, Miguel (2004-01)
    Article
    Restricted access - publisher's policy
    Public-key cryptography is widely used to provide Internet security services. The public-key infrastructure (PKI) is the infrastructure that supports the public-key cryptography, and the revocation of certificates implies ...
  • CERVANTES - A certificate validation test-bed 

    Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar; Soriano Ibáñez, Miguel (Springer Berlin / Heidelberg, 2004)
    Conference report
    Restricted access - publisher's policy
    Certificate validation is one of the toughest scalability problems of the PKI. The goal of this paper is to introduce a Java platform for certificate revocation called CERVANTES. CERVANTES pretends to be an easy to extend ...
  • Cooperative detection of primary user emulation attacks in CRNs 

    León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012)
    Article
    Restricted access - publisher's policy
    Cognitive radio networks (CRNs) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. With such purpose, coexistence mechanisms among CRN nodes or secondary users and ...
  • Criptografía y seguridad en comunicaciones 

    Forné Muñoz, Jorge; Melus Moreno, José Luis; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1995-07)
    Article
    Open Access
  • Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems 

    Touceda, D.S.; Cámara, J.M.S.; Soriano Ibáñez, Miguel (2012-06)
    Article
    Restricted access - publisher's policy
    Several alternative schemes have been presented in the literature to try to solve the users’ admission problem in P2P systems when it is not possible to include a logically centralized authority (either online or ...
  • Design of a P2P content recommendation system using affinity networks 

    Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012-08)
    Article
    Restricted access - publisher's policy
    The success and intensive use of social networks makes strategies for efficient document location a hot topic of research. In this paper, we propose a common vector space to describe documents and users to create a social ...
  • DocCloud: a document recommender system on cloud computing with plausible deniability 

    Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2013-04-16)
    Article
    Restricted access - publisher's policy
    Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. ...
  • Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis 

    Rebollo-Monedero, David; Mezher, Ahmad Mohamad; Casanova, Xavier; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2019-07-09)
    Article
    Restricted access - publisher's policy
    k-Anonymous microaggregation is a widespread technique to address the problem of protecting the privacy of the respondents involved beyond the mere suppression of their identifiers, in applications where preserving the ...
  • El impacto de las políticas de evaluación del profesorado en la posición en los ránquines universitarios: el caso de la Universidad Politécnica de Cataluña 

    García-Berro Montilla, Enrique; Roca Martín, Santiago; Navallas Ramos, Francisco Javier; Soriano Ibáñez, Miguel; Ras Sabido, Antoni (2016-01)
    Article
    Open Access
    La universidad española ha afrontado con éxito el tránsito entre una universidad clásica, eminentemente docente, y una universidad moderna, en la que la investigación juega un papel esencial. Gran parte de este éxito reside ...
  • Generación y análisis de secuencias pseudoaleatorias 

    Soriano Ibáñez, Miguel; Gonzalo Díaz, Raúl (Edicions UPC, 1999)
    Book
    Restricted access to the UPC academic community
    Las secuencias pseudoaleatorias son utilizadas en diversos entornos relacionados con el mundo de las telecomunicaciones. Entre otros ámbitos de aplicación, podemos encontrar la criptografía, transmisión de datos (tanto ...
  • Genetic algorithms for designing network security protocols 

    Zarza, Luis; Forné Muñoz, Jorge; Pegueroles Vallés, Josep R.; Soriano Ibáñez, Miguel (World Scientífic, 2010)
    Part of book or chapter of book
    Restricted access - publisher's policy
    The design of cryptographic and security protocols for new scenarios and applications can be computationally expensive. Examples of these can be sensor or mobile ad-hoc networks where thousands of nodes can be involved. ...
  • Incremental k-Anonymous microaggregation in large-scale electronic surveys with optimized scheduling 

    Rebollo Monedero, David; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel; Hernández Baigorri, César (Institute of Electrical and Electronics Engineers (IEEE), 2018-10-15)
    Article
    Open Access
    Improvements in technology have led to enormous volumes of detailed personal information made available for any number of statistical studies. This has stimulated the need for anonymization techniques striving to attain a ...
  • k-anonymous microaggregation with preservation of statistical dependence 

    Rebollo Monedero, David; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2016-05-10)
    Article
    Open Access
    𝑘�������-Anonymous microaggregation emerges as an essential building block in statistical disclosure control, a field concerning the postprocessing of the demographic portion of surveys containing sensitive information, ...
  • Modeling the lion attack in cognitive radio networks 

    Hernández Serrano, Juan; León Abarca, Olga; Soriano Ibáñez, Miguel (2011)
    Article
    Open Access
    Cognitive radio is a promising technology aiming to improve the utilization of the radio electromagnetic spectrum. A cognitive radio is a smart device which runs radio applications software to perform signal processing. ...