Exploració per tema "Ordinadors, Xarxes d' -- Mesures de seguretat"
Ara es mostren els items 41-60 de 71
-
Man-in-the-middle attacks through re-shaping I-Q optical constellations
(Institute of Electrical and Electronics Engineers (IEEE), 2023)
Text en actes de congrés
Accés obertA module to re-shape optical constellations making the optical signal resembles as it has traversed some distance is presented. Armed with this module, Main-in-the-Middle attacks can be performed, which could be undetectable ... -
Mapping ISO 27002 into security ontology
(Universitat Politècnica de Catalunya, 2012-09-13)
Treball Final de Grau
Accés obertIn recent years, due to the increasingly interconnected environment, information is exposed to a growing number of threats and vulnerabilities. Therefore, it is especially important for an organization to have an efficient ... -
MHT-based mechanism for certificate revocation in VANETs
(Springer, 2014-07)
Capítol de llibre
Accés restringit per política de l'editorialVehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A Public Key Infrastructure (PKI) can be utilized to provide these functionalities ... -
Network layer security and secret key authentication
(Universitat Politècnica de Catalunya, 2015-07)
Treball Final de Grau
Accés obert
Realitzat a/amb: Fachhochschule Technikum WienThe goal of this project is to update Von Mann Young Rhee’s book, ‘Internet Security: Cryptographic Principles, Algorithms and Protocols’ which is about network layer security and secret key authentication. It is an extremely ... -
Notaria electrònica
(2009-06-10)
Audiovisual
Accés obert -
Notaria electrònica
(2009-12-03)
Audiovisual
Accés obert -
Nuevo sistema de emisión de CRLs para la red KAD
(Editorial Universidad de Granada, 2013)
Text en actes de congrés
Accés restringit per política de l'editorialMuchas overlays P2P requieren ciertos servicios de seguridad para poder ser utilizadas como aplicaciones comerciales, y una simple Infraestructura de Clave P´ublica (PKI) podr´ia solucionar el problema. Sin embargo, ... -
On the measurement of privacy as an attacker's estimation error
(2012)
Article
Accés obertA wide variety of privacy metrics have been proposed in the literature to evaluate the level of protection offered by privacy enhancing-technologies. Most of these metrics are specific to concrete systems and adversarial ... -
Pervasive authentication and authorization infrastructures for mobile users
(2010)
Article
Accés restringit per política de l'editorialNetwork and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, extremely dynamic operating conditions, are major challenges in the design of security infrastructures for pervasive ... -
PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks
(Elsevier, 2014-03-01)
Article
Accés restringit per política de l'editorialOne of the critical security issues of Vehicular Ad Hoc Networks (VANETs) is the revocation of misbehaving vehicles. While essential, revocation checking can leak potentially sensitive information. Road Side Units (RSUs) ... -
PREON: An efficient cascade revocation mechanism for delegation paths
(2010-09)
Article
Accés restringit per política de l'editorialIn decentralized network-based environments, resource sharing occurs more frequently as computing becomes more pervasive. Access to shared resources must be protected allowing access only to authorized entities. Delegation ... -
Privacy extensions for LISP-MN
(Universitat Politècnica de Catalunya, 2012-06)
Projecte Final de Màster Oficial
Accés obert -
Proposal of a model for the management of active networks based on policies
(Universitat Politècnica de Catalunya, 2003-12-12)
Tesi
Accés obertLes expectatives dels usuaris en relació a la quantitat i qualitat del serveis de xarxa estan creixent ràpidament. En canvi, desenvolupar e implantar nous serveis de xarxa (serveis que operen a nivell de xarxa) seguint el ... -
Resource analysis of Ethereum 2.0 clients
(Institute of Electrical and Electronics Engineers (IEEE), 2021)
Text en actes de congrés
Accés obertScalability is a common issue among the most used permissionless blockchains, and several approaches have been proposed to solve this issue. Tackling scalability while preserving the security and decentralization of the ... -
RIAPPA: a robust identity assignment protocol for P2P overlays
(2014-12-01)
Article
Accés obertPeer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed infrastructures, even for Internet scale. But the research community has been questioning the security of these networks ... -
Secure and insecure chat implementation
(Universitat Politècnica de Catalunya, 2016-06-03)
Projecte Final de Màster Oficial
Accés obert
Realitzat a/amb: University of LimerickInternet is not a single network, but a worldwide collection of loosely connected networks that are accessible by using computers, smartphones or tablets, in a variety of ways, to anyone with a computer and a network ... -
Secure SOA
(2009-06-11)
Audiovisual
Accés obert -
Secure web service SOA
(Factoria BCBL, 2011-05-02)
Audiovisual
Accés obert -
Securing a Java P2P framework: The JXTA-Overlay case
(Association for Computing Machinery (ACM), 2009)
Text en actes de congrés
Accés obertIn the wake of the success of Peer-to-Peer (P2P) networking, security has arisen as one of its main concerns, becoming a key issue when evaluating a P2P system. Unfortunately, some systems' design focus targeted issues ... -
Security in transnational interoperable PPDR communications: threats, requirements and architecture solution
(IGI Publishing, 2019-02)
Capítol de llibre
Accés restringit per política de l'editorialThe relevance of cross border security operations has been identified as a priority at European level for a long time. A European network where Public Protection and Disaster Relief (PPDR) forces share communications ...