Browsing by Author "Soriano Ibáñez, Miguel"
Now showing items 1-20 of 40
-
A new class of codes for fingerprinting schemes
Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
Conference report
Restricted access - publisher's policyIn this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ... -
A new cross-layer attack to TCP in cognitive radio networks
León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2009)
Conference report
Restricted access - publisher's policy -
A note about the traceability properties of linear codes
Fernández Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus (Springer, 2007)
Conference report
Restricted access - publisher's policyWe characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ... -
A protocol for data exchange with free samples using smart contracts
Genés Durán, Rafael; Hernández Serrano, Juan; Esparza Martín, Óscar; Soriano Ibáñez, Miguel; Muñoz Tapia, José Luis; Bellés Muñoz, Marta (Jornadas de Ingeniería Telemática (JITEL), 2021)
Conference report
Open AccessDistrust between data providers and data consumers is one of the main obstacles hampering digitaldata commerce to take off. Data providers want to get paid for what they offer, while data consumers want to know exactly ... -
An Algorithm for k-Anonymous Microaggregation and Clustering Inspired by the Design of Distortion-Optimized Quantizers
Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (Elsevier Science Ltd., 2011)
Article
Restricted access - publisher's policyWe present a multidisciplinary solution to the problems of anonymous microaggregation and clustering, illustrated with two applications, namely privacy protection in databases, and private retrieval of location-based ... -
An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking
Esparza Martín, Óscar; Muñoz Tapia, José Luis; Tomás Buliart, Joan; Soriano Ibáñez, Miguel (2010-04-02)
Article
Open AccessMobile agents are software entities consisting of code, data, and state that can migrate autonomously from host to host executing their code. In such scenario there are some security issues that must be considered. In ... -
Attribute-based authorization for structured Peer-to-Peer (P2P) networks
Suarez Touzeda, Diego; Sierra Camara, Jose Maria; Zeadally, Sherali; Soriano Ibáñez, Miguel (Elsevier, 2015-11-01)
Article
Open AccessWe present the deficiencies of traditional identity-based authorization models in structured Peer-to-Peer (P2P) networks where users' Public Key Certificates (PKCs) represent two roles, authentication and authorization, ... -
Certificate revocation system implementation based on the Merkle Hash Tree
Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar; Soriano Ibáñez, Miguel (2004-01)
Article
Restricted access - publisher's policyPublic-key cryptography is widely used to provide Internet security services. The public-key infrastructure (PKI) is the infrastructure that supports the public-key cryptography, and the revocation of certificates implies ... -
CERVANTES - A certificate validation test-bed
Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar; Soriano Ibáñez, Miguel (Springer Berlin / Heidelberg, 2004)
Conference report
Restricted access - publisher's policyCertificate validation is one of the toughest scalability problems of the PKI. The goal of this paper is to introduce a Java platform for certificate revocation called CERVANTES. CERVANTES pretends to be an easy to extend ... -
Cifrado en flujo basado en NLFSR
Gonzalo, R; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1998-07)
Article
Open AccessLos mecanismos de cifrado en flujo constituyen una alternativa interesante para proporcionar confidencialidad en distintos entornos como comunicaciones móviles y redes de alta velocidad. En la literatura se han estudiado ... -
Cooperative detection of primary user emulation attacks in CRNs
León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012)
Article
Restricted access - publisher's policyCognitive radio networks (CRNs) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. With such purpose, coexistence mechanisms among CRN nodes or secondary users and ... -
Criptografía y seguridad en comunicaciones
Forné Muñoz, Jorge; Melus Moreno, José Luis; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1995-07)
Article
Open Access -
Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems
Touceda, D.S.; Cámara, J.M.S.; Soriano Ibáñez, Miguel (2012-06)
Article
Restricted access - publisher's policySeveral alternative schemes have been presented in the literature to try to solve the users’ admission problem in P2P systems when it is not possible to include a logically centralized authority (either online or ... -
Design of a P2P content recommendation system using affinity networks
Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012-08)
Article
Restricted access - publisher's policyThe success and intensive use of social networks makes strategies for efficient document location a hot topic of research. In this paper, we propose a common vector space to describe documents and users to create a social ... -
DocCloud: a document recommender system on cloud computing with plausible deniability
Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2013-04-16)
Article
Restricted access - publisher's policyRecommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. ... -
Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis
Rebollo-Monedero, David; Mezher, Ahmad Mohamad; Casanova, Xavier; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2019-07-09)
Article
Open Accessk-Anonymous microaggregation is a widespread technique to address the problem of protecting the privacy of the respondents involved beyond the mere suppression of their identifiers, in applications where preserving the ... -
El impacto de las políticas de evaluación del profesorado en la posición en los ránquines universitarios: el caso de la Universidad Politécnica de Cataluña
García-Berro Montilla, Enrique; Roca Martín, Santiago; Navallas Ramos, Francisco Javier; Soriano Ibáñez, Miguel; Ras Sabido, Antoni (2016-01)
Article
Open AccessLa universidad española ha afrontado con éxito el tránsito entre una universidad clásica, eminentemente docente, y una universidad moderna, en la que la investigación juega un papel esencial. Gran parte de este éxito reside ... -
Esquemas de fingerprinting para la protección de derechos de distribución
Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Domingo Ferrer, Josep; Sebé Feixas, Francesc (Asociación de Técnicos de Informática, 2002-12)
Article
Open Access -
Generación y análisis de secuencias pseudoaleatorias
Soriano Ibáñez, Miguel; Gonzalo Díaz, Raúl (Edicions UPC, 1999)
Book
Restricted access to the UPC academic communityLas secuencias pseudoaleatorias son utilizadas en diversos entornos relacionados con el mundo de las telecomunicaciones. Entre otros ámbitos de aplicación, podemos encontrar la criptografía, transmisión de datos (tanto ... -
Genetic algorithms for designing network security protocols
Zarza, Luis; Forné Muñoz, Jorge; Pegueroles Vallés, Josep R.; Soriano Ibáñez, Miguel (World Scientífic, 2010)
Part of book or chapter of book
Restricted access - publisher's policyThe design of cryptographic and security protocols for new scenarios and applications can be computationally expensive. Examples of these can be sensor or mobile ad-hoc networks where thousands of nodes can be involved. ...