Ara es mostren els items 41-60 de 71

    • Man-in-the-middle attacks through re-shaping I-Q optical constellations 

      Ruiz Ramírez, Marc; Comellas Colomé, Jaume; Velasco Esteban, Luis Domingo (Institute of Electrical and Electronics Engineers (IEEE), 2023)
      Text en actes de congrés
      Accés obert
      A module to re-shape optical constellations making the optical signal resembles as it has traversed some distance is presented. Armed with this module, Main-in-the-Middle attacks can be performed, which could be undetectable ...
    • Mapping ISO 27002 into security ontology 

      Alcázar Vargas, Ferran; Fenz, Stefan (Universitat Politècnica de Catalunya, 2012-09-13)
      Treball Final de Grau
      Accés obert
      In recent years, due to the increasingly interconnected environment, information is exposed to a growing number of threats and vulnerabilities. Therefore, it is especially important for an organization to have an efficient ...
    • MHT-based mechanism for certificate revocation in VANETs 

      Muñoz Tapia, José Luis; Esparza Martín, Óscar; Hernández Gañán, Carlos; Mata Diaz, Jorge; Alins Delgado, Juan José; Ganchev, Ivan (Springer, 2014-07)
      Capítol de llibre
      Accés restringit per política de l'editorial
      Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A Public Key Infrastructure (PKI) can be utilized to provide these functionalities ...
    • Network layer security and secret key authentication 

      Llovet Ureña, Marcel (Universitat Politècnica de Catalunya, 2015-07)
      Treball Final de Grau
      Accés obert
      Realitzat a/amb:   Fachhochschule Technikum Wien
      The goal of this project is to update Von Mann Young Rhee’s book, ‘Internet Security: Cryptographic Principles, Algorithms and Protocols’ which is about network layer security and secret key authentication. It is an extremely ...
    • Notaria electrònica 

      Domingo Vilar, Albert (2009-06-10)
      Audiovisual
      Accés obert
    • Notaria electrònica 

      Hernández, Enric (2009-12-03)
      Audiovisual
      Accés obert
    • Nuevo sistema de emisión de CRLs para la red KAD 

      Caubet, Juan; Hernández Gañán, Carlos; Esparza Martín, Óscar; Muñoz Tapia, José Luis (Editorial Universidad de Granada, 2013)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Muchas overlays P2P requieren ciertos servicios de seguridad para poder ser utilizadas como aplicaciones comerciales, y una simple Infraestructura de Clave P´ublica (PKI) podr´ia solucionar el problema. Sin embargo, ...
    • On the measurement of privacy as an attacker's estimation error 

      Rebollo Monedero, David; Parra Arnau, Javier; Diaz, Claudia; Forné Muñoz, Jorge (2012)
      Article
      Accés obert
      A wide variety of privacy metrics have been proposed in the literature to evaluate the level of protection offered by privacy enhancing-technologies. Most of these metrics are specific to concrete systems and adversarial ...
    • Pervasive authentication and authorization infrastructures for mobile users 

      Forné Muñoz, Jorge; Hinarejos Campos, M. Francisca; Marin, Andres; Almenarez, Florina; Lopez, Javier; Montenegro, Jose Antonio; Lacoste, Marc; Diaz, Daniel (2010)
      Article
      Accés restringit per política de l'editorial
      Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, extremely dynamic operating conditions, are major challenges in the design of security infrastructures for pervasive ...
    • PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks 

      Hernández Gañán, Carlos; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Mata Diaz, Jorge; Alins Delgado, Juan José (Elsevier, 2014-03-01)
      Article
      Accés restringit per política de l'editorial
      One of the critical security issues of Vehicular Ad Hoc Networks (VANETs) is the revocation of misbehaving vehicles. While essential, revocation checking can leak potentially sensitive information. Road Side Units (RSUs) ...
    • PREON: An efficient cascade revocation mechanism for delegation paths 

      Hinarejos Campos, M. Francisca; Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar (2010-09)
      Article
      Accés restringit per política de l'editorial
      In decentralized network-based environments, resource sharing occurs more frequently as computing becomes more pervasive. Access to shared resources must be protected allowing access only to authorized entities. Delegation ...
    • Privacy extensions for LISP-MN 

      Rodríguez Natal, Alberto (Universitat Politècnica de Catalunya, 2012-06)
      Projecte Final de Màster Oficial
      Accés obert
    • Proposal of a model for the management of active networks based on policies 

      Vivero Millor, Julio (Universitat Politècnica de Catalunya, 2003-12-12)
      Tesi
      Accés obert
      Les expectatives dels usuaris en relació a la quantitat i qualitat del serveis de xarxa estan creixent ràpidament. En canvi, desenvolupar e implantar nous serveis de xarxa (serveis que operen a nivell de xarxa) seguint el ...
    • Resource analysis of Ethereum 2.0 clients 

      Cortes Goicoechea, Mikel; Franceschini, Luca; Bautista Gomez, Leonardo (Institute of Electrical and Electronics Engineers (IEEE), 2021)
      Text en actes de congrés
      Accés obert
      Scalability is a common issue among the most used permissionless blockchains, and several approaches have been proposed to solve this issue. Tackling scalability while preserving the security and decentralization of the ...
    • RIAPPA: a robust identity assignment protocol for P2P overlays 

      Caubet Fernández, Juan; Esparza Martín, Óscar; Muñoz Tapia, José Luis; Alins Delgado, Juan José; Mata Diaz, Jorge (2014-12-01)
      Article
      Accés obert
      Peer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed infrastructures, even for Internet scale. But the research community has been questioning the security of these networks ...
    • Secure and insecure chat implementation 

      Masdeu Medina, Aleix (Universitat Politècnica de Catalunya, 2016-06-03)
      Projecte Final de Màster Oficial
      Accés obert
      Realitzat a/amb:   University of Limerick
      Internet is not a single network, but a worldwide collection of loosely connected networks that are accessible by using computers, smartphones or tablets, in a variety of ways, to anyone with a computer and a network ...
    • Secure SOA 

      Herrero, Carlos Enrique (2009-06-11)
      Audiovisual
      Accés obert
    • Secure web service SOA 

      Romero Vidal, Cristóbal Manuel (Factoria BCBL, 2011-05-02)
      Audiovisual
      Accés obert
    • Securing a Java P2P framework: The JXTA-Overlay case 

      Arnedo Moreno, Joan; Matsuo, Keita; Barolli, Leonard; Xhafa Xhafa, Fatos (Association for Computing Machinery (ACM), 2009)
      Text en actes de congrés
      Accés obert
      In the wake of the success of Peer-to-Peer (P2P) networking, security has arisen as one of its main concerns, becoming a key issue when evaluating a P2P system. Unfortunately, some systems' design focus targeted issues ...
    • Security in transnational interoperable PPDR communications: threats, requirements and architecture solution 

      Ferrús Ferré, Ramón Antonio; Sallent Roig, Oriol; Verkoelen, Cor; Fransen, Frank; Andersen, Keld; Bjerrum-Niese, Christian; Saijonmaa, Jaakko; Olivieri, Claudia; Duits, Michel; Galin, Anita; Pangallo, Franco; Proietti Modi, Debora (IGI Publishing, 2019-02)
      Capítol de llibre
      Accés restringit per política de l'editorial
      The relevance of cross border security operations has been identified as a priority at European level for a long time. A European network where Public Protection and Disaster Relief (PPDR) forces share communications ...