Now showing items 1-20 of 533

    • A CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions 

      Cilardo, Alessandro; Esposito, Luigi; Veniero, Antonio; Mazzeo, Antonino; Beltran Querol, Vicenç; Ayguadé Parra, Eduard (2010)
      Conference report
      Restricted access - publisher's policy
      After some recent breaks presented in the technical literature, it has become of paramount importance to gain a deeper understanding of the robustness and weaknesses of cryptographic hash functions. In particular, in the ...
    • A collective intelligence approach for building student's trustworthiness profile in online learning 

      Miguel, Jorge; Caballé Llobet, Santiago; Xhafa Xhafa, Fatos; Prieto, Josep; Barolli, Leonard (Institute of Electrical and Electronics Engineers (IEEE), 2014)
      Conference report
      Open Access
      Information and communication technologies have been widely adopted in most of educational institutions to support e-Learning through different learning methodologies such as computer supported collaborative learning, which ...
    • A comparison study for two fuzzy-based systems: improving reliability and security of JXTA-overlay P2P platform 

      Liu, Yi; Sakamoto, Shinji; Matsuo, Keita; Ikeda, Makoto; Barolli, Leonard; Xhafa Xhafa, Fatos (Springer, 2016-07-01)
      Article
      Open Access
      The reliability of peers is very important for safe communication in peer-to-peer (P2P) systems. The reliability of a peer can be evaluated based on the reputation and interactions with other peers to provide different ...
    • A comprehensive survey of V2X cybersecurity mechanisms and future research paths 

      Sedar, Mohottige Roshan Madhusanka; Kalalas, Charalampos; Vazquez Gallego, Francisco; Alonso Zárate, Luis Gonzaga; Alonso Zarate, Jesús (Institute of Electrical and Electronics Engineers (IEEE), 2023-01-26)
      Article
      Open Access
      Recent advancements in vehicle-to-everything (V2X) communication have notably improved existing transport systems by enabling increased connectivity and driving autonomy levels. The remarkable benefits of V2X connectivity ...
    • A data visualization approach for trustworthiness in social networks for on-line learning 

      Miguel, Jorge; Caballé Llobet, Santiago; Xhafa Xhafa, Fatos; Snasel, Vaclav (2015)
      Conference report
      Open Access
      Up to now, the problem of ensuring collaborative activities in e-Learning against dishonest students' behaviour has been mainly tackled with technological security solutions. Over the last years, technological security ...
    • A digital memristor emulator for FPGA-based artificial neural networks 

      Vourkas, Ioanis; Abusleme, A.; Ntinas, V.; Sirakoulis, Georgios Ch.; Rubio Sola, Jose Antonio (Institute of Electrical and Electronics Engineers (IEEE), 2016)
      Conference report
      Restricted access - publisher's policy
      FPGAs are reconfigurable electronic platforms, well-suited to implement complex artificial neural networks (ANNs). To this end, the compact hardware (HW) implementation of artificial synapses is an important step to obtain ...
    • A Framework for Detecting Cyber Attacks: Study and Analysis 

      Solà Puig, Jordi (Universitat Politècnica de Catalunya, 2023-02-22)
      Bachelor thesis
      Open Access
      Covenantee:   Università degli Studi di Milano
      La tesi tracta de l'ús d'Osquery com a eina de seguretat per a sistemes informàtics. S'explica com instal·lar i configurar Osquery i altres eines relacionades amb Ansible. S'analitzen diferents casos d'ús d'Osquery i es ...
    • A la seguridad por la privacidad 

      Barceló Garcia, Miquel (2001-07)
      Article
      Open Access
    • A LINDDUN-based framework for privacy threat analysis on identification and authentication processes 

      Robles González, Antonio; Parra Arnau, Javier; Forné Muñoz, Jorge (2020)
      Article
      Open Access
      Identification and authentication (IA) are security procedures that are ubiquitous in our online life, and that constantly require disclosing personal, sensitive information to non-fully trusted service providers, or to ...
    • A low area probing detector for security IC's 

      Weiner, Michael; Manich Bou, Salvador; Sigl, Georg (2014)
      Conference report
      Restricted access - publisher's policy
      In this paper, a low cost, Low Area Probing Detector (LAPD) is presented. Probing or microprobing is an attack technique against integrated circuits implementing security functions, such as OTP tokens or smartcards. It ...
    • A Machine learning IDS for known and unknown anomalies 

      Aguiló Gost, Francisco de Asis L.; Simó Mezquita, Ester; Marín Tordera, Eva; Hussain, Ayaz (Institute of Electrical and Electronics Engineers (IEEE), 2022)
      Conference lecture
      Restricted access - publisher's policy
      In this work an Intrusion Detection System to detect anomalies in networks system entries is presented. It is based on Machine Learning models and is composed of two components. The first component detects known anomalies ...
    • A massive data processing approach for effective trustworthiness in online learning groups 

      Miguel, Jorge; Caballé Llobet, Santiago; Xhafa Xhafa, Fatos; Prieto, Josep (2015-06-10)
      Article
      Open Access
      This paper proposes a trustworthiness-based approach for the design of secure learning activities in online learning groups. Although computer-supported collaborative learning has been widely adopted in many educational ...
    • A methodological approach for trustworthiness assessment and prediction in mobile online collaborative learning 

      Miguel, Jorge; Caballé Llobet, Santiago; Xhafa Xhafa, Fatos; Prieto, Josep; Barolli, Leonard (Elsevier, 2016)
      Article
      Open Access
      Trustworthiness and technological security solutions are closely related to online collaborative learning and they can be combined with the aim of reaching information security requirements for e-Learning participants and ...
    • A methodological approach to modelling trustworthiness in online collaborative learning 

      Miguel, Jorge; Caballé Llobet, Santiago; Xhafa Xhafa, Fatos; Prieto, Josep; Barolli, Leonard (Institute of Electrical and Electronics Engineers (IEEE), 2014)
      Conference report
      Open Access
      Trustworthiness and technological security solutions are closely related to online collaborative learning as they can be combined with the aim of reaching information security requirements for e-Learning participants and ...
    • A modeling of certificate revocation and its application to synthesis of revocation traces 

      Hernández Gañán, Carlos; Mata Diaz, Jorge; Muñoz Tapia, José Luis; Hernández Serrano, Juan; Esparza Martín, Óscar; Alins Delgado, Juan José (2012)
      Article
      Restricted access - publisher's policy
      One of the hardest tasks of a public key infrastructure (PKI) is to manage revocation. New communication paradigms push the revocation system to the limit and an accurate resource assessment is necessary before implementing ...
    • A new class of codes for fingerprinting schemes 

      Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
      Conference report
      Restricted access - publisher's policy
      In this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ...
    • A new class of traceability schemes 

      Egorova, Elena; Fernández Muñoz, Marcel; Kabatiansky, Grigory (2019)
      Conference report
      Restricted access - publisher's policy
      A new class of tracing traitors schemes with traceability property which combines ideas of nonbinary IPP-codes and IPP set systems is proposed. A detailed comparison of the proposed scheme with previously known traceability ...
    • A note about the traceability properties of linear codes 

      Fernández Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus (Springer, 2007)
      Conference report
      Restricted access - publisher's policy
      We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ...
    • A privacy-preserving architecture for the semantic web based on tag suppression 

      Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (Springer, 2010)
      Conference report
      Restricted access - publisher's policy
      We propose an architecture that preserves user privacy in the semantic Web via tag suppression. In tag suppression, users may wish to tag some resources and refrain from tagging some others in order to hinder privacy ...