Now showing items 1-19 of 19

  • A cloud-assisted random linear network coding medium access control protocol for healthcare applications 

    Kartsakli, Elli; Antonopoulos, Angelos; Alonso Zárate, Luis Gonzaga; Verikoukis, Christos (2014-03)
    Article
    Open Access
    Relay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC) protocols, based on ...
  • Architectures and technologies for adapting secured content in governed multimedia applications 

    Carreras, Anna; Rodríguez Luna, Eva; Dogan, Safak; Arachchi, Hemantha Kodikara; Perramon Tornil, Xavier; Delgado Mercè, Jaime; Kondoz, Ahmet M. (IEEE Computer Society Publications, 2011-11-15)
    Article
    Restricted access - publisher's policy
    This article analyzes existing initiatives and proposes new technologies for the governed adaptations of secured content in heterogeneous environments. These technologies are integrated into an architecture for the secure ...
  • Cooperative ARQ: a medium access control (MAC) layer perspective 

    Alonso Zárate, Jesús; Kartsakli, Elli; Alonso Zárate, Luis Gonzaga; Verikoukis, Christos (INTECH, 2010)
    Part of book or chapter of book
    Open Access
  • Designing a secure exam management system (SEMS) for m-learning environments 

    Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier Forment, Marc (2016-02-03)
    Article
    Open Access
    M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi ...
  • Digital and physical layer network coding performance in the context of enforced fairness 

    Miliotis, Vasileios; Alonso Zárate, Luis Gonzaga; Verikoukis, Christos (2014)
    Conference report
    Restricted access - publisher's policy
    In this paper, we investigate the performance of the so-called Cross Network operating under diverse Network Coding (NC) techniques. We study the impact of Medium Access Control (MAC) layer fairness on the throughput ...
  • Disseny de sistemes de control d'accés biomètrics 

    Pastor Romera, Francesc Xavier (Universitat Politècnica de Catalunya, 2009-07)
    Master thesis (pre-Bologna period)
    Open Access
    Entre els 7 sistemes d’identificació més utilitzats es troben els sistemes biomètrics. L’autentificació per biometria es basa en la verificació d’un element del cos de l’usuari (identificació del rostre, termograma del ...
  • Disseny d'un quadre de comandament integral per un sistema de control d'accés 

    Parietti García, Laura (Universitat Politècnica de Catalunya, 2016-12-12)
    Bachelor thesis
    Restricted access - confidentiality agreement
  • DRM and access control architectures interoperability 

    Rodríguez Luna, Eva; Delgado Mercè, Jaime; Waller, Adrian; Price, Darren; Ward, Peter de (2008-09-10)
    Conference report
    Open Access
    Digital objects are managed in a controlled way through the complete value chain by DRM systems. Access Control Frameworks manage access by users to resources. This paper presents a solution that enables users of both ...
  • Dynamic sensitivity control of access points for IEEE 802.11ax 

    Afaqui, Muhammad Shahwaiz Iqbal; García Villegas, Eduard; López Aguilera, M. Elena; Campus Mur, Daniel (Institute of Electrical and Electronics Engineers (IEEE), 2016)
    Conference report
    Restricted access - publisher's policy
    The popularity and wider acceptance of IEEE 802.11 based WLANs has resulted in their dense deployments in diverse environments. While this massive deployment can potentially increase capacity and coverage, the current physical ...
  • Energy harvesting-aware contention tree-based access for wireless machine-to-machine networks 

    Vázquez Gallego, Francisco; Alonso Zárate, Luis Gonzaga; Alonso Zárate, Jesús (Institute of Electrical and Electronics Engineers (IEEE), 2016)
    Conference report
    Restricted access - publisher's policy
    The Energy Harvesting-aware Contention Treebased Access (EH-CTA) protocol is presented in this paper as a novel Medium Access Control (MAC) protocol for wireless Machine-to-Machine (M2M) networks where enddevices are ...
  • Guaranteed bit rate traffic prioritisation and isolation in multi-tenant radio access networks 

    Vilà Muñoz, Irene; Sallent Roig, José Oriol; Umbert Juliana, Anna; Pérez Romero, Jordi (Institute of Electrical and Electronics Engineers (IEEE), 2018)
    Conference report
    Open Access
    Network slicing is a key feature of forthcoming 5G systems to facilitate the partitioning of the network into multiple logical networks customised according to different operation and application needs. Network slicing ...
  • Implantación sistema de control de acceso (SAP GRC AC) 

    Lorca Márquez, Xavier (Universitat Politècnica de Catalunya, 2015-07-10)
    Master thesis
    Restricted access - author's decision
    Governance, Risk and Compliance System implantation based on the wedoIT customer requirements of a compatible Solution with the ERP system. Based on customer needs to have a tool to control risks and segregation of ...
  • Improving privacy in JPEG images 

    Delgado Mercè, Jaime; Llorente Viejo, Silvia (Institute of Electrical and Electronics Engineers (IEEE), 2016)
    Conference report
    Restricted access - publisher's policy
    The massive distribution and sharing of images increases the risk of privacy losses. There are several image formats, but one of the most used is JPEG. To take care of this, the JPEG standardization committee is promoting ...
  • Modeling and developing access control policies using semantic technologies 

    Haro Juan, Carles de (Universitat Politècnica de Catalunya, 2009-09-11)
    Master thesis
    Open Access
    Policy languages have become the most common way to protect the online resources from unauthorized access. Nowadays, the Sun's XACML has become the most widely used standard for access control, allowing the definition of ...
  • Networking challenges and prospective impact of broadcast-oriented wireless networkson- chip 

    Abadal Cavallé, Sergi; Nemirovsky, Mario; Alarcón Cot, Eduardo José; Cabellos Aparicio, Alberto (Association for Computing Machinery (ACM), 2015)
    Conference report
    Restricted access - publisher's policy
    The cost of broadcast has been constraining the design of manycore processors and of the algorithms that run upon them. However, as on-chip RF technologies allow the design of small-footprint and high-bandwidth antennas ...
  • Seguridad en redes de computación ubicua: contribución a la validación de credenciales 

    Hinarejos Campos, M. Francisca (Universitat Politècnica de Catalunya, 2010-06-30)
    Doctoral thesis
    Open Access
    Technology progress in both user devices and networks allows communications anytime and anywhere. New communication environments offer a wide range of possibilities to users, but also generate new threats. For this reason, ...
  • Sistema de control d'accés per proximitat 

    Velázquez Jiménez, Fernando (Universitat Politècnica de Catalunya, 2008-06-04)
    Master thesis (pre-Bologna period)
    Open Access
  • Sistema integral de seguretat electrònica en edificis 

    Poza Serrano, Enrique (Universitat Politècnica de Catalunya, 2015-06-12)
    Master thesis (pre-Bologna period)
    Restricted access - author's decision
    The main purpose of the electronic security systems is to identify the possible threats of intrusion and/or fire, in order to start the pre-defined protocols and avoid or minimize the potential consequences. On one hand, ...
  • The Internet password authentication: Protocol SCRAM and Its Security 

    Santamaría Ortega, Marc (Universitat Politècnica de Catalunya, 2010-05-03)
    Master thesis
    Restricted access - confidentiality agreement