Browsing by Subject "Computer security"
Now showing items 1-20 of 299
-
05. Protecció de la identitat digital i reputació online a la xarxa: ciberseguretat i privacitat aplicada al dia a dia empresarial
(2018-11-21)
Audiovisual
Open Access -
A CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions
(2010)
Conference report
Restricted access - publisher's policyAfter some recent breaks presented in the technical literature, it has become of paramount importance to gain a deeper understanding of the robustness and weaknesses of cryptographic hash functions. In particular, in the ... -
A collective intelligence approach for building student's trustworthiness profile in online learning
(Institute of Electrical and Electronics Engineers (IEEE), 2014)
Conference report
Open AccessInformation and communication technologies have been widely adopted in most of educational institutions to support e-Learning through different learning methodologies such as computer supported collaborative learning, which ... -
A comparison study for two fuzzy-based systems: improving reliability and security of JXTA-overlay P2P platform
(Springer, 2016-07-01)
Article
Open AccessThe reliability of peers is very important for safe communication in peer-to-peer (P2P) systems. The reliability of a peer can be evaluated based on the reputation and interactions with other peers to provide different ... -
A data visualization approach for trustworthiness in social networks for on-line learning
(2015)
Conference report
Open AccessUp to now, the problem of ensuring collaborative activities in e-Learning against dishonest students' behaviour has been mainly tackled with technological security solutions. Over the last years, technological security ... -
A digital memristor emulator for FPGA-based artificial neural networks
(Institute of Electrical and Electronics Engineers (IEEE), 2016)
Conference report
Restricted access - publisher's policyFPGAs are reconfigurable electronic platforms, well-suited to implement complex artificial neural networks (ANNs). To this end, the compact hardware (HW) implementation of artificial synapses is an important step to obtain ... -
A la seguridad por la privacidad
(2001-07)
Article
Open Access -
A LINDDUN-based framework for privacy threat analysis on identification and authentication processes
(2020)
Article
Restricted access - publisher's policyIdentification and authentication (IA) are security procedures that are ubiquitous in our online life, and that constantly require disclosing personal, sensitive information to non-fully trusted service providers, or to ... -
A low area probing detector for security IC's
(2014)
Conference report
Restricted access - publisher's policyIn this paper, a low cost, Low Area Probing Detector (LAPD) is presented. Probing or microprobing is an attack technique against integrated circuits implementing security functions, such as OTP tokens or smartcards. It ... -
A massive data processing approach for effective trustworthiness in online learning groups
(2015-06-10)
Article
Open AccessThis paper proposes a trustworthiness-based approach for the design of secure learning activities in online learning groups. Although computer-supported collaborative learning has been widely adopted in many educational ... -
A methodological approach for trustworthiness assessment and prediction in mobile online collaborative learning
(Elsevier, 2016)
Article
Open AccessTrustworthiness and technological security solutions are closely related to online collaborative learning and they can be combined with the aim of reaching information security requirements for e-Learning participants and ... -
A methodological approach to modelling trustworthiness in online collaborative learning
(Institute of Electrical and Electronics Engineers (IEEE), 2014)
Conference report
Open AccessTrustworthiness and technological security solutions are closely related to online collaborative learning as they can be combined with the aim of reaching information security requirements for e-Learning participants and ... -
A modeling of certificate revocation and its application to synthesis of revocation traces
(2012)
Article
Restricted access - publisher's policyOne of the hardest tasks of a public key infrastructure (PKI) is to manage revocation. New communication paradigms push the revocation system to the limit and an accurate resource assessment is necessary before implementing ... -
A new class of codes for fingerprinting schemes
(Springer, 2005)
Conference report
Restricted access - publisher's policyIn this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ... -
A note about the traceability properties of linear codes
(Springer, 2007)
Conference report
Restricted access - publisher's policyWe characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ... -
A privacy-preserving architecture for the semantic web based on tag suppression
(Springer, 2010)
Conference report
Restricted access - publisher's policyWe propose an architecture that preserves user privacy in the semantic Web via tag suppression. In tag suppression, users may wish to tag some resources and refrain from tagging some others in order to hinder privacy ... -
A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings
(Springer, 2011)
Conference report
Restricted access - publisher's policyRecommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture ... -
A reliable system for JXTA-Overlay P2P platform considering number of authentic files, security and QoS parameters
(2015)
Conference report
Open AccessThe reliability of peers is very important for safe communication in Peer-to-Peer (P2P) systems. The reliability of a peer can be evaluated based on the reputation and interactions with other peers to provide different ... -
A study of security for web applications and APIs
(Universitat Politècnica de Catalunya, 2018-10)
Bachelor thesis
Open AccessEstudio de las vunlerabilidades presentes en aplicaiones web -
Adding security and privacy to genomic information representation
(2019)
Article
Open AccessProvision of security and privacy to genomic data is a key issue in current genomic information representation. Existing formats do not give a solution to these issues (or they provide a partial one), so new solutions are ...