Now showing items 1-20 of 75

    • A new class of traceability schemes 

      Egorova, Elena; Fernández Muñoz, Marcel; Kabatiansky, Grigory (2019)
      Conference report
      Restricted access - publisher's policy
      A new class of tracing traitors schemes with traceability property which combines ideas of nonbinary IPP-codes and IPP set systems is proposed. A detailed comparison of the proposed scheme with previously known traceability ...
    • Analysis and implementation of a SSO solution for several web portal 

      Magrinyà Bonafont, Xavier (Universitat Politècnica de Catalunya / Aalto University, 2012-08)
      Master thesis (pre-Bologna period)
      Open Access
      Covenantee:   Aalto-yliopisto. Sähkötekniikan korkeakoulu
      Analysis and implementation of a SSO solution for several web portal.
    • Análisis Side-Channel mediante aprendizaje automático (machine learning): estudio de técnicas y aplicabilidad 

      Garos Moyano, Andrea (Universitat Politècnica de Catalunya, 2017-07-04)
      Bachelor thesis
      Restricted access - confidentiality agreement
      Covenantee:   Applus+
    • Aplicació d'estadístiques i resultats de competicions d'e-sports 

      Badia Romero, Marc (Universitat Politècnica de Catalunya, 2020-01-28)
      Bachelor thesis
      Open Access
      Els e-sports són un fenomen que cada vegada és més popular. Arreu del món, milions de persones gaudeixen d'aquestes competicions. Per aquest motiu, en aquest projecte s'aspira a desenvolupar una aplicació per a Android ...
    • Ataques por canal lateral sobre el algoritmo de encriptación AES implementado en MicroBlaze. 

      Lumbiarres López, Rubén; López García, Mariano; Canto Navarro, Enrique Fernando (2013)
      Conference report
      Restricted access - publisher's policy
      Este artículo presenta un procedimiento simple para la obtención de la clave criptográfica del algoritmo AES ejecutado sobre MicroBlaze. La clave se obtiene analizando la correlación estadística que existe entre ésta y el ...
    • Attacking pairing-free attribute-based encryption schemes 

      Herranz Sotoca, Javier (Institute of Electrical and Electronics Engineers (IEEE), 2020)
      Article
      Open Access
      Combining several results that have been published in the last years, it is known that it is impossible to design simple and secure attribute-based encryption schemes that work in (classical) settings like the RSA or the ...
    • Cifrado en flujo basado en NLFSR 

      Gonzalo, R; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1998-07)
      Article
      Open Access
      Los mecanismos de cifrado en flujo constituyen una alternativa interesante para proporcionar confidencialidad en distintos entornos como comunicaciones móvi­les y redes de alta velocidad. En la literatura se han estudiado ...
    • Codificació de missatges mitjançant matrius 

      Hernández Morales, Àlex; Gómez, Roger (2018-05)
      Audiovisual
      Open Access
    • Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme 

      Wang, Xu An; Xhafa Xhafa, Fatos; Ma, Jianfeng; Zheng, Zhiheng (Elsevier, 2019-08)
      Article
      Open Access
      Currently we are witnessing a rapid integration of social networks and cloud computing, especially on storing social media contents on cloud storage due to its cheap management and easy accessing at any time and from any ...
    • Critical analysis and comparison of data protection techniques for genomics data sets 

      Naro, Daniel (Universitat Politècnica de Catalunya, 2016-07-04)
      Master thesis
      Open Access
      This work reviews the current literature on protecting genomic information. The goal is to provide insight on how to define a secure file format for such data. We compare the published ideas to the requirements defined by ...
    • Cryptanalysis and improvement of chen-hsiang-shih's remote user authentication scheme using smart cards 

      Martínez Pelàez, Rafael; Rico Novella, Francisco José; Velarde-Alvarado, P. (2013-09)
      Article
      Open Access
      Recently, Chen-Hsiang-Shih proposed a new dynamic ID-based remote user authentication scheme. The authors claimed that their scheme was more secure than previous works. However, this paper demonstrates that theirscheme is ...
    • Defeating simple power analysis attacks in cache memories 

      Neagu, Madalin; Manich Bou, Salvador; Miclea, Liviu (Institute of Electrical and Electronics Engineers (IEEE), 2015)
      Conference report
      Restricted access - publisher's policy
      A wide range of attacks that target cache memories in secure systems have been reported in the last half decade. Cold-boot attacks can be thwarted through the recently proposed Interleaved Scrambling Technique (IST). ...
    • Delegació verificable del càlcul de polinomis 

      Obrador Sureda, Marc (Universitat Politècnica de Catalunya, 2013-02-15)
      Master thesis (pre-Bologna period)
      Open Access
      [ANGLÈS] Algorithms to delegate the evaluation of some polynomial, private or not, at some point, private or not, to an untrusted entity.
    • Desarrollo de una arquitectura de seguridad para smartphone 

      Guerra Fernández, Roberto Carlos (Universitat Politècnica de Catalunya, 2008-12)
      Master thesis (pre-Bologna period)
      Open Access
      Hasta el 10 de octubre 2008 estas practicas consistieron esencialmente en la participación en el proyecto europeo SECOQC: “Development of a Global Network for Secure Communication based on Quantum Cryptography”. Este ...
    • Desenvolupament d’un sistema de seguretat autònom i d’ús personal 

      Enrich Martínez, Carles (Universitat Politècnica de Catalunya, 2015-01)
      Bachelor thesis
      Open Access
      Al llarg d’aquest treball s’estudien diverses eines criptogràfiques i es desenvolupen dos sistemes electrònics que permetin al seu usuari comunicar-se amb diversos sistemes externs amb seguretat i comoditat, de manera que ...
    • Design and implementation of an authentication and authorization system based on a haptic touchscreen and a force sensor 

      Dalmau Oliver, Roger (Universitat Politècnica de Catalunya / Quuen's University Belfast - School of Electronics, Electrical Engineering and Computer Science, 2010)
      Master thesis (pre-Bologna period)
      Open Access
      In today’s society, an incredible amount of systems include an authentication process before a user can access requested services ranging from logging into a computer system or webpage, gaining access to secure buildings, ...
    • Effects of using an encrypted image corrupted by noise and occlusion in a security system based on joint transform correlator and Gyrator transform 

      Vilardy Ortiz, Juan Manuel; Millán Garcia-Varela, M. Sagrario; Pérez Cabré, Elisabet (Institute of Electrical and Electronics Engineers (IEEE), 2016)
      Conference lecture
      Open Access
    • Efficient privacy preserving predicate encryption with fine-grained searchable capability for cloud storage 

      Wang, Xu An; Xhafa Xhafa, Fatos; Cai, Weiyi; Ma, Jianfeng; Wei, Fushan (2016-06-01)
      Article
      Open Access
      With the fast development in Cloud storage technologies and ever increasing use of Cloud data centres, data privacy and confidentiality has become a must. Indeed, Cloud data centres store each time more sensitive data such ...
    • Encriptación de funciones 

      Ai, Yining; Betancourth Soto, Camila; Carabantes Morales, Núria; González Cid, Cinta; Maataoui, Fatin (2019-12-20)
      Audiovisual
      Open Access
    • Encrypted and secure messages with CAN FD 

      Acosta Montilla, Alejandro (Universitat Politècnica de Catalunya, 2021-05-17)
      Master thesis
      Open Access
      The project intends to portray an approach to design a cryptographic secured way to transmit messages on the well-known CAN bus communication protocol in modern cars. However, due to the requirement of including some message ...