Ara es mostren els items 1-20 de 113

  • AAA 

    Navarro Morales, Lara (Factoria BCBL, 2011-05-02)
    Audiovisual
    Accés obert
  • AAA: autenticación, autorización y accounting 

    Marín Vinuesa, Lara (2010-05-20)
    Audiovisual
    Accés obert
  • AAA: autentificación, autoritzación y accounting 

    Toro Sánchez, Alberto Carlos (2010-12)
    Audiovisual
    Accés obert
  • AAA Protocol. Autenticació, autorització i comptabilitat 

    Mengual, Ester (Factoria BCBL, 2012-05)
    Audiovisual
    Accés obert
  • A CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions 

    Cilardo, Alessandro; Esposito, Luigi; Veniero, Antonio; Mazzeo, Antonino; Beltran, Vicenç; Ayguadé Parra, Eduard (2010)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    After some recent breaks presented in the technical literature, it has become of paramount importance to gain a deeper understanding of the robustness and weaknesses of cryptographic hash functions. In particular, in the ...
  • Advanced cryptographic techniques for building verifiable and transparent electronic voting protocols 

    Escala Ribas, Alex (Universitat Politècnica de Catalunya, 2017-07-21)
    Tesi
    Accés obert
    Electronic voting presents many challenges due to its multiple security requirements. Some of the challenges are related to guaranteeing voters' privacy and system's transparency, which are hard to satisfy simultaneously. ...
  • Anàlisi d’algorismes criptogràfics per a dispositius mòbils 

    Vila Canals, Joan (Universitat Politècnica de Catalunya, 2007-07-05)
    Projecte/Treball Final de Carrera
    Accés obert
    En aquest projecte s’estudien els costos d’execució d’algorismes criptogràfics a dispositius de mà com poden ser les agendes electròniques. L’objectiu final d’aquest estudi és determinar quins algoritmes són millors per ...
  • Anàlisi de dades i predicció pel trading de criptomonedes 

    Ribas Nicolau, Roger (Universitat Politècnica de Catalunya, 2017)
    Treball Final de Grau
    Accés obert
    Aquest projecte es planteja com a un exercici per part de l'autor en aprofundir en el coneixement de les eines existents que s'utilitzen en l'àmbit de generar prediccions a partir de dades, concretament en dades en forma ...
  • Análisis del posible uso del Broadcast Encryption en la televisión de pago 

    Ferrer Aguilar, Javier (Universitat Politècnica de Catalunya, 2009-05-06)
    Projecte/Treball Final de Carrera
    Accés obert
    Este proyecto se pretende realizar un estudio de los sistemas de difusión de televisión de pago que hay en funcionamiento actualmente y en la medida de lo posible, proponer un nuevo sistema que haga uso de los esquemas ...
  • Analysis and Programming of Cryptographic systems based on Elliptic Curves 

    Martínez Gilabert, Diego (Universitat Politècnica de Catalunya, 2014-10)
    Treball Final de Grau
    Accés obert
    [ANGLÈS] The purpose of this project is to review the current state of cryptographic systems, focusing in signatures schemes based on elliptic curves (such as Blind Signature, Aggregate Signature or Multisignature) and to ...
  • A new class of codes for fingerprinting schemes 

    Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    In this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ...
  • A new countermeasure against side-channel attacks based on hardware-software co-design 

    Lumbiarres López, Rubén; López García, Mariano; Cantó Navarro, Enrique (2016-09-01)
    Article
    Accés obert
    This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whose implementation is based on a hardware-software co-design. The hardware architecture consists of a microprocessor, which ...
  • An experimental realization of a chaos-based secure communication using arduino microcontrollers 

    Zapateiro De La Hoz, Mauricio Fabian; Acho Zuppa, Leonardo; Vidal Seguí, Yolanda (2015-08-27)
    Article
    Accés obert
    Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. ...
  • A note about the traceability properties of linear codes 

    Fernández Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus (Springer, 2007)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ...
  • Aplicaciones de los métodos criptográficos 

    Gonzalo Díaz, Raúl (Escola Tècnica Superior d'Enginyers de Telecomunicació de Barcelona, 1996)
    Article
    Accés obert
  • A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings 

    Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (Springer, 2011)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    Recommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture ...
  • A secure communication design based on the chaotic logistic map: an experimental realization using Arduino microcontrollers 

    Zapateiro De La Hoz, Mauricio Fabian; Acho Zuppa, Leonardo; Vidal Seguí, Yolanda (Springer, 2015)
    Capítol de llibre
    Accés restringit per política de l'editorial
  • Ataque diferencial mediante inyección de un error en AES-128 

    Trayno, Vladlena (Universitat Politècnica de Catalunya, 2016)
    Projecte/Treball Final de Carrera
    Accés obert
    This project has studied and analized an attack by injection of errors against the AES encryption scheme currently existing in literature. The AES symmetric cryptosystem is perhaps the most widely used today. The idea of ...
  • Attribute-based versions of Schnorr and ElGamal 

    Herranz Sotoca, Javier (2016-01)
    Article
    Accés obert
    We design in this paper the first attribute-based cryptosystems that work in the classical discrete logarithm, pairing-free, setting. The attribute-based signature scheme can be seen as an extension of Schnorr signatures, ...
  • Blockchain: Pasado, presente y futuro 

    Maynés Moreno, Gerard (Universitat Politècnica de Catalunya, 2018-05)
    Treball Final de Grau
    Accés obert
    This final degree project will try to explain the blockchain technology, its related concepts and analyze a few cryptocurrencies that use it. First, we?ll do a state-of-art of their economic situation, just as an analysis ...