Ara es mostren els items 1-20 de 102

    • A construction of traceability set systems with polynomial tracing algorithm 

      Egorova, Elena; Fernández Muñoz, Marcel; Kabatiansky, Grigory (Institute of Electrical and Electronics Engineers (IEEE), 2019)
      Text en actes de congrés
      Accés obert
      A family F of w-subsets of a finite set X is called a set system with the identifiable parent property if for any w-subset contained in the union of some t sets, called traitors, of F at least one of these sets can be ...
    • A la seguridad por la privacidad 

      Barceló Garcia, Miquel (2001-07)
      Article
      Accés obert
    • A multimetric predictive ANN-based routing protocol for vehicular ad hoc networks 

      Lemus Cárdenas, Leticia; Mezher, Ahmad Mohamad; Barbecho Bautista, Pablo Andrés; Astudillo León, Juan Pablo; Aguilar Igartua, Mónica (Institute of Electrical and Electronics Engineers (IEEE), 2021-06-11)
      Article
      Accés obert
      Vehicular networks support intelligent transportation system (ITS) to improve drivers’ safety and traffic efficiency on the road by exchanging traffic-related information between vehicles and also between vehicles and ...
    • A privacy-preserving fuzzy interest matching protocol for friends finding in social networks 

      Wang, Xu An; Xhafa Xhafa, Fatos; Luo, Xiaoshuang; Zhang, Shuaiwei; Ding, Yong (Springer, 2017-02-07)
      Article
      Accés obert
      Nowadays, it is very popular to make friends, share photographs, and exchange news throughout social networks. Social networks widely expand the area of people’s social connections and make communication much smoother than ...
    • A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings 

      Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (2012)
      Article
      Accés restringit per política de l'editorial
      Recommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture ...
    • A survey of machine and deep learning methods for privacy protection in the Internet of things 

      Rodríguez Luna, Eva; Otero Calviño, Beatriz; Canal Corretger, Ramon (Multidisciplinary Digital Publishing Institute (MDPI), 2023-01-21)
      Article
      Accés obert
      Recent advances in hardware and information technology have accelerated the proliferation of smart and interconnected devices facilitating the rapid development of the Internet of Things (IoT). IoT applications and services ...
    • A survey on web tracking: mechanisms, implications, and defenses 

      Bujlow, Tomasz; Carela Español, Valentín; Solé Pareta, Josep; Barlet Ros, Pere (2017-08-01)
      Article
      Accés obert
      Privacy seems to be the Achilles' heel of today's web. Most web services make continuous efforts to track their users and to obtain as much personal information as they can from the things they search, the sites they visit, ...
    • An efficient PHR service system supporting fuzzy keyword search and fine-grained access control 

      Xhafa Xhafa, Fatos; Wang, Jianfeng; Chen, Xiaofeng; Liu, Joseph K.; Li, Jin; Krause, Paul (Springer, 2014-09)
      Article
      Accés obert
      Outsourcing of personal health record (PHR) has attracted considerable interest recently. It can not only bring much convenience to patients, it also allows efficient sharing of medical information among researchers. As ...
    • Analysis and evaluation of security developments in electronic payment methods 

      Mendieta Zurita, Joshua Ivan (Universitat Politècnica de Catalunya, 2019-09-06)
      Projecte Final de Màster Oficial
      Accés obert
      This master thesis with the name "Analysis and Evaluation of Security Developments in Electronic Payment Methods," aims to make a compendium of the technologies and standards used on today's payment card transactions since ...
    • Analysis and improvement of security and privacy techniques for genomic information 

      García Perez, José Antonio (Universitat Politècnica de Catalunya, 2021-10-28)
      Projecte Final de Màster Oficial
      Accés obert
      The purpose of this thesis is to review the current literature of privacy preserving techniques for genomic information on the last years. Based on the analysis, we propose a long-term classification system for the reviewed ...
    • Analysis of the univariate microaggregation disclosure risk 

      Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2009-08-07)
      Article
      Accés restringit per política de l'editorial
      Microaggregation is a protection method used by statistical agencies to limit the disclosure risk of confidential information. Formally, microaggregation assigns each original datum to a small cluster and then replaces ...
    • Análisis e implantación de medidas de Seguridad para el Cumplimiento de la Ley Orgánica de Protección de Datos 15/1999 y su Real Decreto 1720/2007 

      Cardona Alvarez, Jordi (Universitat Politècnica de Catalunya, 2015-10-30)
      Projecte/Treball Final de Carrera
      Accés restringit per acord de confidencialitat
      Realitzat a/amb:   Ernst & Young
    • Anonymizing data via polynomial regression 

      Nin Guerrero, Jordi; Pont Tuset, Jordi; Medrano Gracia, Pau; Larriba Pey, Josep; Muntés Mulero, Víctor (2007)
      Text en actes de congrés
      Accés obert
      The amount of confidential information accessible through the Internet is growing continuously. In this scenario, the improvement of anonymizing methods becomes crucial to avoid revealing sensible information of individuals. ...
    • Aplicación del método de Benders para ajuste controlado de tablas (CTA) 

      Baena Mirabete, Daniel (Universitat Politècnica de Catalunya, 2008-02)
      Projecte Final de Màster Oficial
      Accés obert
      La presente memoria tiene como objeto de estudio el desarrollo de un método óptimo (Descomposición de Benders) para CTA como MILP que mejore la calidad de los resultados. La memoria está dividida en 3 bloques. En un ...
    • Approaching the rights management interoperability problem using intelligent brokerage mechanisms 

      Serrão, Carlos; Rodríguez Luna, Eva; Delgado Mercè, Jaime (2011-02-15)
      Article
      Accés restringit per política de l'editorial
      The digital content industry is facing significant challenges. One of the most significant challenges is the Intellectual Property protection. This challenge has been addressed technologically by using Digital Rights ...
    • Attacking pairing-free attribute-based encryption schemes 

      Herranz Sotoca, Javier (Institute of Electrical and Electronics Engineers (IEEE), 2020)
      Article
      Accés obert
      Combining several results that have been published in the last years, it is known that it is impossible to design simple and secure attribute-based encryption schemes that work in (classical) settings like the RSA or the ...
    • Attribute selection in multivariate microaggregation 

      Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2008)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of the cluster. When the number of attributes ...
    • Authorization schema for electronic health-care records: for Uganda 

      Martínez Fernández, Alexis (Universitat Politècnica de Catalunya / KTH Royal Institute of Technology, 2012-08-23)
      Projecte Final de Màster Oficial
      Accés obert
      Realitzat a/amb:   Kungliga Tekniska högskolan
      This thesis discusses how to design an authorization schema focused on ensuring each patient's data privacy within a hospital information system.
    • Beyond multivariate microaggregation for large record anonymization 

      Nin Guerrero, Jordi (2014)
      Article
      Accés obert
      Microaggregation is one of the most commonly employed microdata protection methods. The basic idea of microaggregation is to anonymize data by aggregating original records into small groups of at least k elements and, ...
    • Block coordinate descent decomposition for statistical data protection using controlled tabular adjustment 

      González Alastrué, José Antonio; Castro Pérez, Jordi (2009-10)
      Report de recerca
      Accés restringit per acord de confidencialitat
      Tabular data is routinely released by national statistical agencies (NSA) to disseminate aggregated information from some particular microdata. Prior to publication, these tables have to be treated to preserve information ...