Now showing items 21-40 of 44

    • Mecanismo para evitar ataques por confabulación basados en code passing 

      Jaimez, Marc; Esparza Martín, Óscar; Hernández Gañán, Carlos; Parra Arnau, Javier (2009)
      Conference report
      Restricted access - publisher's policy
      Los agentes móviles son entidades software formadas por código, datos, itinerario y estado, que pueden migrar de host en host autónomamente ejecutando su código. A pesar de sus ventajas, los aspectos de seguridad restringen ...
    • MHT-based mechanism for certificate revocation in VANETs 

      Muñoz Tapia, José Luis; Esparza Martín, Óscar; Hernández Gañán, Carlos; Mata Diaz, Jorge; Alins Delgado, Juan José; Ganchev, Ivan (Springer, 2014-07)
      Part of book or chapter of book
      Restricted access - publisher's policy
      Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A Public Key Infrastructure (PKI) can be utilized to provide these functionalities ...
    • Multipath TCP architecture for infotainment multimedia applications in vehicular networks 

      Reñé, Sergi; EXPOSITO, ERNESTO; Gineste, Mathieu Gineste; Alins Delgado, Juan José; Esparza Martín, Óscar (Institute of Electrical and Electronics Engineers (IEEE), 2015)
      Conference report
      Restricted access - publisher's policy
      The large deployment of Internet resources has facilitated the accelerated development of Intelligent Transport Systems (ITS) including a large diversity of distributed applications such as non-safety infotainment vehicular ...
    • NeuroCast: adaptive multi-source P2P video streaming application for wireless networks 

      Gañan, Carlos; Caubet Fernández, Juan; Mata Diaz, Jorge; Alins Delgado, Juan José; Esparza Martín, Óscar (2011)
      Conference report
      Restricted access - publisher's policy
      Streaming consists in distributing media to large audiences over a computer network. Providing a streaming service for wireless mobile nodes presents many challenges. A peer-to-peer (P2P) solution has the big advantage of ...
    • Nuevo sistema de emisión de CRLs para la red KAD 

      Caubet, Juan; Hernández Gañán, Carlos; Esparza Martín, Óscar; Muñoz Tapia, José Luis (Editorial Universidad de Granada, 2013)
      Conference report
      Restricted access - publisher's policy
      Muchas overlays P2P requieren ciertos servicios de seguridad para poder ser utilizadas como aplicaciones comerciales, y una simple Infraestructura de Clave P´ublica (PKI) podr´ia solucionar el problema. Sin embargo, ...
    • On the road to secure and privacy-preserving IoT ecosystems 

      Hernández Serrano, Juan; Muñoz Tapia, José Luis; Bröring, Arne; Esparza Martín, Óscar; Mikkelsen, Lars; Schwarzott, Wolfgang; León Abarca, Olga; Zibuschka, Jan (Springer, 2017)
      Conference report
      Restricted access - publisher's policy
      The Internet of Things (IoT) is on the rise. Today, various IoT platforms are already available, giving access to myriads of things. Initiatives such as BIG IoT are bringing those IoT platforms together in order to form ...
    • On the self-similarity nature of the revocation data 

      Gañán, Carlos; Mata Diaz, Jorge; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Alins Delgado, Juan José (Springer, 2012)
      Conference report
      Restricted access - publisher's policy
      One of the hardest tasks of a Public Key Infrastructure (PKI) is to manage revocation. Different revocation mechanisms have been proposed to invalidate the credentials of compromised or misbe- having users. All these ...
    • Performance evaluation of selected transmission control protocol variants over a digital video broadcasting-second generation broadband satellite multimedia system with QoS 

      Rendón Morales, Elizabeth; Mata Diaz, Jorge; Alins Delgado, Juan José; Muñoz Tapia, José Luis; Esparza Martín, Óscar (2013-11-07)
      Article
      Restricted access - publisher's policy
      This paper presents an analysis of several Transmission Control Protocol (TCP) variants working over a digital video broadcasting-second generation (DVB-S2) satellite link with the support of the Differentiated Services ...
    • PKIX Certificate Status in Hybrid MANETs 

      Muñoz Tapia, José Luis; Esparza Martín, Óscar; Hernández Gañán, Carlos; Parra Arnau, Javier (Springer Berlin / Heidelberg, 2009)
      Conference report
      Open Access
      Certificate status validation is a hard problem in general but it is particularly complex in Mobile Ad-hoc Networks (MANETs) because we require solutions to manage both the lack of fixed infrastructure inside the MANET and ...
    • PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks 

      Hernández Gañán, Carlos; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Mata Diaz, Jorge; Alins Delgado, Juan José (Elsevier, 2014-03-01)
      Article
      Restricted access - publisher's policy
      One of the critical security issues of Vehicular Ad Hoc Networks (VANETs) is the revocation of misbehaving vehicles. While essential, revocation checking can leak potentially sensitive information. Road Side Units (RSUs) ...
    • PREON: An efficient cascade revocation mechanism for delegation paths 

      Hinarejos Campos, M. Francisca; Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar (2010-09)
      Article
      Restricted access - publisher's policy
      In decentralized network-based environments, resource sharing occurs more frequently as computing becomes more pervasive. Access to shared resources must be protected allowing access only to authorized entities. Delegation ...
    • QoSatAr: a cross-layer architecture for E2E QoS provisioning over DVB-S2 broadband satellite systems 

      Rendón Morales, Elizabeth; Mata Diaz, Jorge; Alins Delgado, Juan José; Muñoz Tapia, José Luis; Esparza Martín, Óscar (2012-10-01)
      Article
      Open Access
      This article presents QoSatAr, a cross-layer architecture developed to provide end-to-end quality of service (QoS) guarantees for Internet protocol (IP) traffic over the Digital Video Broadcasting-Second generation (DVB-S2) ...
    • RAR: Risk aware revocation mechanism for vehicular networks 

      Hernández Gañán, Carlos; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Mata Diaz, Jorge; Alins Delgado, Juan José; Silva Cárdenas, Carlos; Bartra Gardini, Gumercindo (2012)
      Conference report
      Restricted access - publisher's policy
      Vehicular Ad Hoc Networks (VANETs) require some mechanism to authenticate messages, identify valid vehicles, and remove misbehaving ones. A Public Key Infrastructure (PKI) can provide this functionality using digital ...
    • RDSR-V. Reliable dynamic source routing for video-streaming over mobile ad hoc networks 

      Muñoz Tapia, José Luis; Esparza Martín, Óscar; Aguilar Igartua, Mónica; Carrascal Frias, F. Javier; Forné Muñoz, Jorge (2010-01)
      Article
      Restricted access - publisher's policy
      Mobile ad hoc networks (MANETs) are infrastructureless networks formed by wireless mobile devices with limited battery life. In MANETs for civilian applications, the network nodes may not belong to a single authority and ...
    • RIAPPA: a robust identity assignment protocol for P2P overlays 

      Caubet Fernández, Juan; Esparza Martín, Óscar; Muñoz Tapia, José Luis; Alins Delgado, Juan José; Mata Diaz, Jorge (2014-12-01)
      Article
      Open Access
      Peer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed infrastructures, even for Internet scale. But the research community has been questioning the security of these networks ...
    • Risk-based decision-making for public key infrastructures using fuzzy logic 

      Hernández Gañán, Carlos; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Mata Diaz, Jorge; Alins Delgado, Juan José (2012-11-01)
      Article
      Restricted access - publisher's policy
      Public key infrastructures (PKIs) are complex systems that are responsible for giving users enough information to make reasonable trust judgments about one another. The validation of public keys is hence of great importance. ...
    • Secure handoffs for V2I communications in 802.11 networks 

      Hernández Gañán, Carlos; Reñé Vicente, Sergi; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Mata Diaz, Jorge; Alins Delgado, Juan José (ACM Press. Association for Computing Machinery, 2013)
      Conference report
      Restricted access - publisher's policy
      Vehicular ad hoc networks (VANETs) are emerging as a novel paradigm for safety services, supporting real-time applications (e.g., video-streaming, Internet browsing, online gaming, etc.). However, maintaining ubiquitous ...
    • Securing identity assignment using implicit certificates in P2P overlays 

      Caubet Fernández, Juan; Esparza Martín, Óscar; Alins Delgado, Juan José; Mata Diaz, Jorge; Soriano Ibáñez, Miguel (Springer International Publishing, 2013)
      Conference report
      Restricted access - publisher's policy
      The security of the Peer-to-Peer (P2P) overlays networks has been questioned for years. Many works have been proposed to provide secure routing, anonymity, reputation systems, confidentiality, etc. However, the identity ...
    • Simtools: teaching networks with virtual scenarios 

      Alins Delgado, Juan José; Muñoz Tapia, José Luis; Mata Diaz, Jorge; Esparza Martín, Óscar (Universitat de les Illes Balears, 2015)
      Conference report
      Restricted access - publisher's policy
      In this paper we present simtools, a software to create virtual networks of UML machines which is based on UML and VNUML. Simtools allows easily building virtual scenarios, and it is a ...
    • Transmisión de vídeo H.264/AVC con control de tasa adaptativo en el servidor 

      Mata Diaz, Jorge; Solorzano, Edwin; Muñoz Tapia, José Luis; Hernández Serrano, Juan; Alins Delgado, Juan José; Esparza Martín, Óscar (2015)
      Conference report
      Restricted access - publisher's policy
      In this paper we describe a method for transmitting H.264/AVC encoded video. The data transfer is performed by adapting data transmission to network performance in order to ensure continuous transmission. The data transfer ...