Ara es mostren els items 21-37 de 37

    • LoRaWAN Security Management Based on DNS 

      Azemar Rovira, Albert (Universitat Politècnica de Catalunya, 2020-06)
      Treball Final de Grau
      Accés obert
      LoRaWAN 1.1 is currently one of the most used LPWAN protocols. Since the introduction of version 1.1, new security features have been added. Nevertheless, this last release still fails to solve the existing security ...
    • Malware attack prevention, detection, response and recovery 

      Fernàndez Blànquez, Pol (Universitat Politècnica de Catalunya, 2022-02-02)
      Treball Final de Grau
      Accés obert
      Realitzat a/amb:   Ernst & Young
      The content of this document presents an in-depth study of the main current cybersecurity threats and an automated tool for managing responses to each of them. This study focuses on attacks in the banking sector, analysing ...
    • Mecanismo para evitar ataques por confabulación basados en code passing 

      Jámiez Moruno, Marc (Universitat Politècnica de Catalunya, 2009-09-03)
      Projecte Final de Màster Oficial
      Accés obert
      Los agentes móviles son entidades software formadas por código, datos, itinerario y estado, que pueden migrar de host en host autónomamente ejecutando su código. A pesar de sus ventajas, los aspectos de seguridad restringen ...
    • Optimization of Random Linear Network Coding protocols for multipath communications in heterogeneous networks 

      Costa Sala, Clara (Universitat Politècnica de Catalunya, 2019-04-25)
      Treball Final de Grau
      Accés obert
      Realitzat a/amb:   Technische Universität Dresden
      In the next upcoming mobile generation era (5G), the demands for high-data-rate transmissions is predicted to grow considerably. Among new studies focused on how to support such demands, Random Linear Network Coding (RLNC) ...
    • P2P overlay over Simctl 

      Sicart López, Gerard Carles (Universitat Politècnica de Catalunya, 2016-10)
      Projecte Final de Màster Oficial
      Accés obert
      P2P systems became an interesting area since early 2000. Researchers conducted a large amount of research in some challenging areas and, to check their experiments, several implementations and simulators were created. Over ...
    • Router security configuration towards LAN networks 

      Oñate Ferriz, Ignasi (Universitat Politècnica de Catalunya / Tong ji da xue (Xina). College of Electronics and Information Engineering, 2013-09-10)
      Projecte/Treball Final de Carrera
      Accés obert
      Realitzat a/amb:   Tong ji da xue
      [ANGLÈS] The purpose of this project is to study the security of local network, such as a router providing wireless Internet connection to a particular home. The motivation of the project is the existence of an Internet ...
    • SCATGK: Design, development and testing of a ticketing infrastructure for a 10k+ attendees non-profit Live Music Festival 

      Barceló Cuerda, Alex (Universitat Politècnica de Catalunya, 2016-06-16)
      Projecte/Treball Final de Carrera
      Accés obert
      This document presents the design of a ticketing system. The design is not only theoretical: software application have been developed, hardware prototypes have been assembled and real events have used the proposed ...
    • Secure identity management in structured peer-to-peer (P2P) networks 

      Caubet Fernández, Juan (Universitat Politècnica de Catalunya, 2016-01-25)
      Tesi
      Accés obert
      Structured Peer-to-Peer (P2P) networks were proposed to solve routing problems of big distributed infrastructures. But the research community has been questioning their security for years. Most prior work in security ...
    • Security chain for IoT data: from device connection to business intelligence 

      Azemar Rovira, Albert (Universitat Politècnica de Catalunya, 2021-07-07)
      Projecte Final de Màster Oficial
      Accés restringit per acord de confidencialitat
    • Simulació d'un atac de Phishing 

      Medina Bosch, Xavier (Universitat Politècnica de Catalunya, 2019-01)
      Treball Final de Grau
      Accés obert
      Phishing is a cyberattack which is very common in society, in professional areas as well as personal field. A large part of the population is susceptible to being a victim of this threat due to its propagation vector. The ...
    • Sistema de certificación y notarización de predios en blockchain 

      Parra Crespo, Jordi (Universitat Politècnica de Catalunya, 2022-10-24)
      Treball Final de Grau
      Accés obert
      The aim of this document is to provide the Agencia Nacional de Tierras (ANT) de Colombia with a system to store, certify and verify the results of land certification. The system will be a complement to the ANT's usual ...
    • Study of consensus protocols and improvement of the Delegated Byzantine Fault Tolerance (DBFT) algorithm 

      Christofi, Gavriel (Universitat Politècnica de Catalunya, 2019-10)
      Projecte Final de Màster Oficial
      Accés obert
      Nowadays, blockchain is one of the most popular and innovate technologies over the world. Although this technology appears for first time in the Bitcoin cryptocurrency, in recent years, a lot of researchers and industries ...
    • Study of consensus protocols and improvement of the Federated Byzantine Agreement (FBA) algorithm 

      Zoi, Aspasia (Universitat Politècnica de Catalunya, 2019-10)
      Projecte Final de Màster Oficial
      Accés obert
      At a present time, it has been proven that blockchain technology has influenced to a great extent the way of human interaction in a digital world. The operation of the blockchain systems allows the peers to implement digital ...
    • Study of DNSSEC and implementation of an attack using Simctl 

      Mateu Romero, Judith (Universitat Politècnica de Catalunya, 2019-06)
      Treball Final de Grau
      Accés obert
    • Study of secure tunnels and VPNs applied to an educational practice 

      Martín Padilla, Ferran (Universitat Politècnica de Catalunya, 2022-10-24)
      Treball Final de Grau
      Accés obert
      This thesis shows the complete experience of a student during the realization of an educational practice. Specifically, the study of the implementation of secure tunnels and VPNs using GRE, IPsec, SSL/TLS, OpenVPN, SSH and ...
    • Video streaming and encoding architecture review for educational contents 

      Zapata Fernández, Asier (Universitat Politècnica de Catalunya, 2019-02)
      Treball Final de Grau
      Accés restringit per acord de confidencialitat
      On a world where, according to the last yearly traffic trends report from CISCO, almost 80% of the total traffic is dedicated to video, there is a critical need to optimize the size of the files we stream and how we do it. ...
    • VoIP Network Analyzer 

      Martínez Querol, Anna (Universitat Politècnica de Catalunya, 2016-09)
      Treball Final de Grau
      Accés obert
      Realitzat a/amb:   Tpartner Network Services
      La globalización y el crecimiento tecnológico están inexorablemente ligados al auge de las TIC (Tecnologías de la Información y Comunicación) y por ende a los servicios informáticos y de comunicaciones, pero ese auge no ...