Now showing items 21-40 of 60

    • Diagnosis of route leaks among autonomous systems in the Internet 

      Siddiqui, Muhammad Shuaib; Montero Banegas, Diego Teodoro; Yannuzzi, Marcelo; Serral Gracià, René; Masip Bruin, Xavier (Institute of Electrical and Electronics Engineers (IEEE), 2014)
      Conference report
      Restricted access - publisher's policy
      Border Gateway Protocol (BGP) is the defacto inter-domain routing protocol in the Internet. It was designed without an inherent security mechanism and hence is prone to a number of vulnerabilities which can cause large ...
    • Distributed detection of anomalous internet sessions 

      García-Cervigon Gutiérrez, Manuel (Universitat Politècnica de Catalunya, 2012-11-02)
      Doctoral thesis
      Open Access
      Financial service providers are moving many services online reducing their costs and facilitating customers¿ interaction. Unfortunately criminals have quickly found several ways to avoid most security measures applied to ...
    • Documentar la metodologia que cal dur a terme per a configurar un ordinador com a pasarel·la d'una xarxa interna 

      Manero Moreno, Amador (Universitat Politècnica de Catalunya, 2007-06-16)
      Master thesis (pre-Bologna period)
      Open Access
    • Dynamic reputation-based trust computation in private networks 

      Nin Guerrero, Jordi; Carminati, Barbara; Ferrari, Elena; Torra i Reventós, Vicenç (2009)
      External research report
      Open Access
      The use of collaborative networks services in general, and web based social networks (WBSN) services in particular, is today increasing and, therefore, the protection of the resources shared by network participants is ...
    • Enabling individually entrusted routing security for open and decentralized community networks 

      Neumann, Axel; Navarro Moldes, Leandro; Cerdà Alabern, Llorenç (Elsevier, 2018-10)
      Article
      Open Access
      Routing in open and decentralized networks relies on cooperation. However, the participation of unknown nodes and node administrators pursuing heterogeneous trust and security goals is a challenge. Community-mesh networks ...
    • Evaluation of a query-obfuscation mechanism for the privacy protection of user profile 

      Estrada, Jose Antonio; Rodríguez, Ana Fernanda; Parra-Arnau, Javier; Forné Muñoz, Jorge (2014-06-30)
      Article
      Open Access
      Traces related to our identity are left every day while we browse the Internet. Being the user’s information a very valued asset for most of the companies, user activities on Internet are permanently monitored, and the ...
    • Focusing the study on wireless multihop networks 

      Paradells Aspas, Josep; Gómez Montenegro, Carlos (2008)
      Conference report
      Restricted access - publisher's policy
      Wireless mesh networks, mobile ad-hoc networks and wireless sensor networks are some of the names related to a more general concept that can be described as wireless multihop networks. The topic of the tutorial is motivated ...
    • Guia de bones pràctiques per mantenir la privacitat en un món connectat 

      Kharbouch, Hafid (Universitat Politècnica de Catalunya, 2018-10)
      Bachelor thesis
      Open Access
      El tema que es tractarà en aquest projecte serà la privacitat en un món connectat, concretament quin és el grau de privacitat ofert pels diferents serveis usats dia a dia. L'anàlisi que es farà es basarà en les característiques ...
    • Hardware/software mechanisms for protecting an IDS against algorithmic complexity attacks 

      Sreekar Shenoy, Govind; Tubella Murgadas, Jordi; González Colás, Antonio María (Institute of Electrical and Electronics Engineers (IEEE), 2012)
      Conference report
      Restricted access - publisher's policy
      Intrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems in the network. An IDS like the popular Snort[17] detects attacks on the network using a database of previous attacks. So ...
    • Impacto de las unidades a pie de carretera en las interferencias en redes vehiculares 

      Hernández Gañán, Carlos; Reñé Vicente, Sergi; Mata Diaz, Jorge; Alins Delgado, Juan José (2013)
      Conference report
      Restricted access - publisher's policy
      Las redes ad hoc vehiculares (VANETs) han emergido como una tecnolog´ıa clave que posibilita el despliegue diversas aplicaciones. Proporcionar seguridad a los servicios de informaci´on y entretenimiento en estos entornos ...
    • Implementation of a programmable Wi-Fi jammer 

      Ge, Yifei (Universitat Politècnica de Catalunya, 2017-02-13)
      Bachelor thesis
      Open Access
      In our society, Wi-Fi devices increase at an exponential rate. Users are increasingly in need of wireless technology. In spite of all this, security in the Wi-Fi network is considered a big challenge that has not yet ...
    • Improving reliability in multi-layer networks with Network Coding Protection 

      Ramirez Almonte, Wilson; Masip Bruin, Xavier; Marín Tordera, Eva; Yannuzzi, Marcelo; Siddiqui, Muhammad Shuaib; Martínez Manzanilla, Anny Gabriela; López Álvarez, Victor (2014)
      Conference report
      Open Access
      A major concern among network providers is to endow their networks with the ability to withstand and recover from failures. In recent years, there is a trend in network research referred to as Network Coding Protection ...
    • Improving the performance efficiency of an IDS by exploiting temporal locality in network traffic 

      Sreekar Shenoy, Govind; Tubella Murgadas, Jordi; González Colás, Antonio María (2012)
      Conference report
      Restricted access - publisher's policy
      Network traffic has traditionally exhibited temporal locality in the header field of packets. Such locality is intuitive and is a consequence of the semantics of network protocols. However, in contrast, the locality in the ...
    • Improving the resilience of an IDS against performance throttling attacks 

      Sreekar Shenoy, Govind; Tubella Murgadas, Jordi; González Colás, Antonio María (Springer, 2012)
      Conference report
      Restricted access - publisher's policy
      Intrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems in the network. To be effective against evasion attempts, the IDS must provide tight bounds on performance. Otherwise an ...
    • Mapping ISO 27002 into security ontology 

      Alcázar Vargas, Ferran; Fenz, Stefan (Universitat Politècnica de Catalunya, 2012-09-13)
      Bachelor thesis
      Open Access
      In recent years, due to the increasingly interconnected environment, information is exposed to a growing number of threats and vulnerabilities. Therefore, it is especially important for an organization to have an efficient ...
    • MHT-based mechanism for certificate revocation in VANETs 

      Muñoz Tapia, José Luis; Esparza Martín, Óscar; Hernández Gañán, Carlos; Mata Diaz, Jorge; Alins Delgado, Juan José; Ganchev, Ivan (Springer, 2014-07)
      Part of book or chapter of book
      Restricted access - publisher's policy
      Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A Public Key Infrastructure (PKI) can be utilized to provide these functionalities ...
    • Network layer security and secret key authentication 

      Llovet Ureña, Marcel (Universitat Politècnica de Catalunya, 2015-07)
      Bachelor thesis
      Open Access
      The goal of this project is to update Von Mann Young Rhee’s book, ‘Internet Security: Cryptographic Principles, Algorithms and Protocols’ which is about network layer security and secret key authentication. It is an extremely ...
    • Notaria electrònica 

      Domingo Vilar, Albert (2009-06-10)
      Audiovisual
      Open Access
    • Notaria electrònica 

      Hernández, Enric (2009-12-03)
      Audiovisual
      Open Access
    • Nuevo sistema de emisión de CRLs para la red KAD 

      Caubet, Juan; Hernández Gañán, Carlos; Esparza Martín, Óscar; Muñoz Tapia, José Luis (Editorial Universidad de Granada, 2013)
      Conference report
      Restricted access - publisher's policy
      Muchas overlays P2P requieren ciertos servicios de seguridad para poder ser utilizadas como aplicaciones comerciales, y una simple Infraestructura de Clave P´ublica (PKI) podr´ia solucionar el problema. Sin embargo, ...