• A modeling of certificate revocation and its application to synthesis of revocation traces 

    Hernández Gañán, Carlos; Mata Diaz, Jorge; Muñoz Tapia, José Luis; Hernández Serrano, Juan; Esparza Martín, Óscar; Alins Delgado, Juan José (2012)
    Artículo
    Acceso restringido por política de la editorial
    One of the hardest tasks of a public key infrastructure (PKI) is to manage revocation. New communication paradigms push the revocation system to the limit and an accurate resource assessment is necessary before implementing ...
  • A new cross-layer attack to TCP in cognitive radio networks 

    León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2009)
    Texto en actas de congreso
    Acceso restringido por política de la editorial
  • Building hierarchical public key infrastructures in mobile ad-hoc networks 

    Satizábal Echavarría, Isabel Cristina; Forné Muñoz, Jorge; Hernández Serrano, Juan; Pegueroles Vallés, Josep R. (Springer, 2006)
    Texto en actas de congreso
    Acceso restringido por política de la editorial
    Dynamism of mobile ad-hoc networks implies changing trust relationships among their nodes that can be established using peer-to-peer PKIs. Here, certification paths can be built although part of the infrastructure is ...
  • COACH: COllaborative certificate stAtus CHecking mechanism for VANETs 

    Hernández Gañán, Carlos; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Mata Diaz, Jorge; Hernández Serrano, Juan; Alins Delgado, Juan José (2011-11-01)
    Artículo
    Acceso restringido por política de la editorial
    Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A public key infrastructure (PKI) can be used to provide these functionalities using ...
  • Cooperative detection of primary user emulation attacks in CRNs 

    León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012)
    Artículo
    Acceso restringido por política de la editorial
    Cognitive radio networks (CRNs) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. With such purpose, coexistence mechanisms among CRN nodes or secondary users and ...
  • Design of a P2P content recommendation system using affinity networks 

    Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012-08)
    Artículo
    Acceso restringido por política de la editorial
    The success and intensive use of social networks makes strategies for efficient document location a hot topic of research. In this paper, we propose a common vector space to describe documents and users to create a social ...
  • DocCloud: a document recommender system on cloud computing with plausible deniability 

    Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2013-04-16)
    Artículo
    Acceso restringido por política de la editorial
    Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. ...
  • e-Mazing - Juego de autoaprendizaje en terminales móviles 

    Mechoulam Nikolaeva, Mario Viktorov; Hernández Serrano, Juan; Pegueroles Vallés., Josep (Escola Tècnica Superior d'Enginyers de Telecomunicació de Barcelona, 2010)
    Artículo
    Acceso abierto
    ¿Te gustan los juegos? En este artículo se describirá el resultado de un Proyecto de Final de Carrera de la EPSC: un videojuego educativo para teléfonos móviles. Los juegos y más concretamente los videojuegos, pueden ...
  • Energy-efficient physical layer packet authenticator for machine-to-machine networks 

    Bartoli, Andrea; Hernández Serrano, Juan; León Abarca, Olga; Kountouris, Apostolous; Barthel, Dominique (Wiley-Blackwell, 2013-06)
    Artículo
    Acceso restringido por política de la editorial
    Machine-to-machine networks are spreading over every sector of our society due to their self-organisation capabilities. In these networks, thousands of devices are left unattended for years of operation without the possibility ...
  • Low-cost group rekeying for unattended wireless sensor networks 

    Hernández Serrano, Juan; Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Gañán, Carlos (2012)
    Artículo
    Acceso restringido por política de la editorial
    Wireless sensor networks (WSNs) are made up of large groups of nodes that perform distributed monitoring services. Since sensor measurements are often sensitive data acquired in hostile environments, securing WSN becomes ...
  • Low-power low-rate goes long-range: the case for secure and cooperative machine-to-machine communications 

    Bartoli, Andrea; Dohler, Mischa; Hernández Serrano, Juan; Kountouris, Apostolous; Barthel, Dominique (2011)
    Texto en actas de congreso
    Acceso restringido por política de la editorial
    The vision of connecting a large amount of objects on this planet to improve well-being and safety is slowly taking shape. Preceded by a decade-long era of research on low-power low-rate short-range wireless sensor networks, ...
  • Modeling the lion attack in cognitive radio networks 

    Hernández Serrano, Juan; León Abarca, Olga; Soriano Ibáñez, Miguel (2011)
    Artículo
    Acceso abierto
    Cognitive radio is a promising technology aiming to improve the utilization of the radio electromagnetic spectrum. A cognitive radio is a smart device which runs radio applications software to perform signal processing. ...
  • Montar un punto de acceso inalámbrico 802.11 en Linux 

    Hernández Serrano, Juan; Pegueroles Vallés, Josep Rafel (Escola Tècnica Superior d'Enginyers de Telecomunicació de Barcelona, 2004)
    Artículo
    Acceso abierto
    La gente se mueve, las redes no. Estas dos sentencias definen más que nada la explosión de las redes inalámbricas de área local o WLAN (WirelessLocalArea Network). En unos pocos años el precio de los dispositivos WLANha ...
  • Multimedia copyright protection platform demonstrator 

    Soriano Ibáñez, Miguel; Fernández Muñoz, Marcel; Sayrol Clols, Elisa; Tomás Buliart, Joan; Casanellas, Joan; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan (Springer, 2005)
    Texto en actas de congreso
    Acceso restringido por política de la editorial
    The work presented in this paper consists in the development of a portable platform to protect the copyright and distribution rights of digital contents, and empirically demonstrate the capacity of several marking and ...
  • On the road to secure and privacy-preserving IoT ecosystems 

    Hernández Serrano, Juan; Muñoz Tapia, José Luis; Bröring, Arne; Esparza Martín, Óscar; Mikkelsen, Lars; Schwarzott, Wolfgang; León Abarca, Olga; Zibuschka, Jan (Springer, 2017)
    Texto en actas de congreso
    Acceso restringido por política de la editorial
    The Internet of Things (IoT) is on the rise. Today, various IoT platforms are already available, giving access to myriads of things. Initiatives such as BIG IoT are bringing those IoT platforms together in order to form ...
  • Providing k-anonymity and revocation in ubiquitous VANETs 

    Caballero Gil, Cándido; Molina Gil, Jezabel; Hernández Serrano, Juan; León Abarca, Olga; Soriano Ibáñez, Miguel (Elsevier, 2016-01)
    Artículo
    Acceso abierto
    Abstract Vehicular ad hoc networks (VANETs) is considered a milestone in improving the safety and efficiency in transportation. Nevertheless, when information from the vehicular communications is combined with data from ...
  • Reconciling privacy and efficient utility management in smart cities 

    Rebollo Monedero, David; Bartoli, Andrea; Hernández Serrano, Juan; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2014-01-01)
    Artículo
    Acceso restringido por política de la editorial
    A key aspect in the design of smart cities is, undoubtedly, a plan for the efficient management of utilities, enabled by technologies such as those entailing smart metering of the residential consumption of electricity, ...
  • Robust detection of primary user emulation attacks in IEEE 802.22 networks 

    León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (ACM Press, NY, 2011)
    Texto en actas de congreso
    Acceso abierto
    Cognitive Radio (CR) technology constitutes a new paradigm where wireless devices can access the spectrum left unused by licensed or primary users in an opportunistic way. This feature opens the door to a main new threat: ...
  • Secure lossless aggregation for Smart Grid M2M networks 

    Bartoli, Andrea; Hernández Serrano, Juan; Soriano Ibáñez, Miguel; Dohler, Mischa; Kountouris, Apostolous; Barthel, Dominique (IEEE Computer Society Publications, 2010)
    Texto en actas de congreso
    Acceso abierto
    Whilst security is generally perceived as an important constituent of communication systems, this paper offers a viable security-communication-tradeoff particularly tailored to Advanced Metering Infrastructures (AMIs) in ...
  • Securing cognitive radio networks 

    León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2010-05)
    Artículo
    Acceso restringido por política de la editorial