Now showing items 1-20 of 22

    • A cloud-assisted random linear network coding medium access control protocol for healthcare applications 

      Kartsakli, Elli; Antonopoulos, Angelos; Alonso Zárate, Luis Gonzaga; Verikoukis, Christos (2014-03)
      Article
      Open Access
      Relay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC) protocols, based on ...
    • Architectures and technologies for adapting secured content in governed multimedia applications 

      Carreras, Anna; Rodríguez Luna, Eva; Dogan, Safak; Arachchi, Hemantha Kodikara; Perramon Tornil, Xavier; Delgado Mercè, Jaime; Kondoz, Ahmet M. (IEEE Computer Society Publications, 2011-11-15)
      Article
      Restricted access - publisher's policy
      This article analyzes existing initiatives and proposes new technologies for the governed adaptations of secured content in heterogeneous environments. These technologies are integrated into an architecture for the secure ...
    • Cooperative ARQ: a medium access control (MAC) layer perspective 

      Alonso Zárate, Jesús; Kartsakli, Elli; Alonso Zárate, Luis Gonzaga; Verikoukis, Christos (INTECH, 2010)
      Part of book or chapter of book
      Open Access
    • Designing a secure exam management system (SEMS) for m-learning environments 

      Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier Forment, Marc (2016-02-03)
      Article
      Open Access
      M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi ...
    • Digital and physical layer network coding performance in the context of enforced fairness 

      Miliotis, Vasileios; Alonso Zárate, Luis Gonzaga; Verikoukis, Christos (2014)
      Conference report
      Restricted access - publisher's policy
      In this paper, we investigate the performance of the so-called Cross Network operating under diverse Network Coding (NC) techniques. We study the impact of Medium Access Control (MAC) layer fairness on the throughput ...
    • Disseny d'un quadre de comandament integral per un sistema de control d'accés 

      Parietti García, Laura (Universitat Politècnica de Catalunya, 2016-12-12)
      Bachelor thesis
      Restricted access - confidentiality agreement
    • Disseny de sistemes de control d'accés biomètrics 

      Pastor Romera, Francesc Xavier (Universitat Politècnica de Catalunya, 2009-07)
      Master thesis (pre-Bologna period)
      Open Access
      Entre els 7 sistemes d’identificació més utilitzats es troben els sistemes biomètrics. L’autentificació per biometria es basa en la verificació d’un element del cos de l’usuari (identificació del rostre, termograma del ...
    • DRM and access control architectures interoperability 

      Rodríguez Luna, Eva; Delgado Mercè, Jaime; Waller, Adrian; Price, Darren; Ward, Peter de (2008-09-10)
      Conference report
      Open Access
      Digital objects are managed in a controlled way through the complete value chain by DRM systems. Access Control Frameworks manage access by users to resources. This paper presents a solution that enables users of both ...
    • Dynamic sensitivity control of access points for IEEE 802.11ax 

      Afaqui, Muhammad Shahwaiz; García Villegas, Eduard; López Aguilera, M. Elena; Campus Mur, Daniel (Institute of Electrical and Electronics Engineers (IEEE), 2016)
      Conference report
      Restricted access - publisher's policy
      The popularity and wider acceptance of IEEE 802.11 based WLANs has resulted in their dense deployments in diverse environments. While this massive deployment can potentially increase capacity and coverage, the current physical ...
    • Energy harvesting-aware contention tree-based access for wireless machine-to-machine networks 

      Vázquez Gallego, Francisco; Alonso Zárate, Luis Gonzaga; Alonso Zárate, Jesús (Institute of Electrical and Electronics Engineers (IEEE), 2016)
      Conference report
      Restricted access - publisher's policy
      The Energy Harvesting-aware Contention Treebased Access (EH-CTA) protocol is presented in this paper as a novel Medium Access Control (MAC) protocol for wireless Machine-to-Machine (M2M) networks where enddevices are ...
    • FAIR aspects of a genomic information protection and management system 

      Delgado Mercè, Jaime; Llorente Viejo, Silvia (IOS Press, 2021)
      Conference report
      Open Access
      To handle genomic information while supporting FAIR principles, we present GIPAMS, a modular architecture. GIPAMS provides security and privacy to manage genomic information by means of several independent services and ...
    • Guaranteed bit rate traffic prioritisation and isolation in multi-tenant radio access networks 

      Vilà Muñoz, Irene; Sallent Roig, Oriol; Umbert Juliana, Anna; Pérez Romero, Jordi (Institute of Electrical and Electronics Engineers (IEEE), 2018)
      Conference report
      Open Access
      Network slicing is a key feature of forthcoming 5G systems to facilitate the partitioning of the network into multiple logical networks customised according to different operation and application needs. Network slicing ...
    • Implantación sistema de control de acceso (SAP GRC AC) 

      Lorca Márquez, Xavier (Universitat Politècnica de Catalunya, 2015-07-10)
      Master thesis
      Restricted access - author's decision
      Governance, Risk and Compliance System implantation based on the wedoIT customer requirements of a compatible Solution with the ERP system. Based on customer needs to have a tool to control risks and segregation of ...
    • Implementation of a simplified Access Control language using JSON 

      Bertran Serrano, Albert (Universitat Politècnica de Catalunya, 2023-07-06)
      Master thesis
      Open Access
      The aim of this project is to develop an access control validator specifically tailored for image resources using a simplified version of XACML (eXtensible Access Control Markup Language) called JACSON, which is based on ...
    • Improving privacy in JPEG images 

      Delgado Mercè, Jaime; Llorente Viejo, Silvia (Institute of Electrical and Electronics Engineers (IEEE), 2016)
      Conference report
      Restricted access - publisher's policy
      The massive distribution and sharing of images increases the risk of privacy losses. There are several image formats, but one of the most used is JPEG. To take care of this, the JPEG standardization committee is promoting ...
    • Modeling and developing access control policies using semantic technologies 

      Haro Juan, Carles de (Universitat Politècnica de Catalunya, 2009-09-11)
      Master thesis
      Open Access
      Policy languages have become the most common way to protect the online resources from unauthorized access. Nowadays, the Sun's XACML has become the most widely used standard for access control, allowing the definition of ...
    • Networking challenges and prospective impact of broadcast-oriented wireless networkson- chip 

      Abadal Cavallé, Sergi; Nemirovsky, Mario; Alarcón Cot, Eduardo José; Cabellos Aparicio, Alberto (Association for Computing Machinery (ACM), 2015)
      Conference report
      Restricted access - publisher's policy
      The cost of broadcast has been constraining the design of manycore processors and of the algorithms that run upon them. However, as on-chip RF technologies allow the design of small-footprint and high-bandwidth antennas ...
    • Ownership based access control through non fungible tokens 

      Fortià Ramirez, Gabriel (Universitat Politècnica de Catalunya, 2023-07-04)
      Bachelor thesis
      Restricted access - confidentiality agreement
      Covenantee:   Entrust Datacard
      During the past years a concept that has emerged in the Blockchain space is tokenization, which is the process of transforming ownerships and rights of assets owned by an individual into a digital form. Thanks to tokenization, ...
    • Seguridad en redes de computación ubicua: contribución a la validación de credenciales 

      Hinarejos Campos, M. Francisca (Universitat Politècnica de Catalunya, 2010-06-30)
      Doctoral thesis
      Open Access
      Technology progress in both user devices and networks allows communications anytime and anywhere. New communication environments offer a wide range of possibilities to users, but also generate new threats. For this reason, ...
    • Sistema de control d'accés per proximitat 

      Velázquez Jiménez, Fernando (Universitat Politècnica de Catalunya, 2008-06-04)
      Master thesis (pre-Bologna period)
      Open Access