Browsing by Subject "Security"
Now showing items 1-20 of 115
-
A comparison study for two fuzzy-based systems: improving reliability and security of JXTA-overlay P2P platform
(Springer, 2016-07-01)
Article
Open AccessThe reliability of peers is very important for safe communication in peer-to-peer (P2P) systems. The reliability of a peer can be evaluated based on the reputation and interactions with other peers to provide different ... -
A framework for the definition of metrics for actor-dependency models
(Institute of Electrical and Electronics Engineers (IEEE), 2004)
Conference report
Open AccessThe authors define actor-dependency models as a restricted class of goal-oriented models in which we focus on the actors and dependencies that exist in a system. An example of actor-dependency models are i* strategic ... -
A low area probing detector for security IC's
(2014)
Conference report
Restricted access - publisher's policyIn this paper, a low cost, Low Area Probing Detector (LAPD) is presented. Probing or microprobing is an attack technique against integrated circuits implementing security functions, such as OTP tokens or smartcards. It ... -
A novel cheater and jammer detection scheme for IEEE 802.11-based wireless LANs
(2015-07-05)
Article
Open AccessThe proliferation of IEEE 802.11 networks has made them an easy and attractive target for malicious devices/adversaries which intend to misuse the available network. In this paper, we introduce a novel malicious entity ... -
A pull-based Wireguard control plane
(Universitat Politècnica de Catalunya, 2020-05-04)
Master thesis
Open AccessThis thesis is based on IP security, Internet Protocol (IP) was developed without security or mobility. Later with the time, IPsec was implemented, a secure IP protocol which is complicated, weighty and doesn?t include ... -
A security framework for JXTA-overlay
(Institute of Electrical and Electronics Engineers (IEEE), 2009)
Conference report
Open AccessAt present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key issues when evaluating a P2P system and it ... -
A survey on the recent efforts of the Internet standardization body for securing inter-domain routing
(2015-04-07)
Article
Open AccessThe Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol in the Internet, thus it plays a crucial role in current communications. Unfortunately, it was conceived without any internal security mechanism, ... -
Adding security and privacy to genomic information representation
(2019)
Article
Open AccessProvision of security and privacy to genomic data is a key issue in current genomic information representation. Existing formats do not give a solution to these issues (or they provide a partial one), so new solutions are ... -
Adding security and privacy to genomic information representation
(IOS Press, 2019)
Conference lecture
Open AccessProvision of security and privacy to genomic data is a key issue in current genomic information representation. Existing formats do not give a solution to these issues (or they provide a partial one), so new solutions are ... -
Adding X-security to Carrel: security for agent-based healthcare applications
(2003-06)
External research report
Open AccessThe high growth of Multi-Agent Systems (MAS) in Open Networks with initiatives such as Agentcities1 requires development in many different areas such as scalable and secure agent platforms, location services, directory ... -
Agenda para gente mayor en Android
(Universitat Politècnica de Catalunya, 2014-06-10)
Master thesis (pre-Bologna period)
Restricted access - confidentiality agreement -
An Architecture for Programming Distributed Applications on Fog to Cloud Systems
(Springer, 2018-02-08)
Conference lecture
Open AccessThis paper presents a framework to develop and execute applications in distributed and highly dynamic computing systems composed of cloud resources and fog devices such as mobile phones, cloudlets, and micro-clouds. The ... -
An efficient PHR service system supporting fuzzy keyword search and fine-grained access control
(Springer, 2014-09)
Article
Open AccessOutsourcing of personal health record (PHR) has attracted considerable interest recently. It can not only bring much convenience to patients, it also allows efficient sharing of medical information among researchers. As ... -
An SDN-based architecture for security provisioning in Fog-to-Cloud (F2C) computing systems
(The Science and Information (SAI) Organization, 2017)
Conference report
Open AccessThe unstoppable adoption of cloud and fog computing is paving the way to developing innovative services, some requiring features not yet covered by either fog or cloud computing. Simultaneously, nowadays technology evolution ... -
Aplicació web per a la monitorització de vulnerabilitats de productes software
(Universitat Politécnica de Catalunya, 2018-01-18)
Bachelor thesis
Open AccessEina de monitorització dels productes software d'una organització i notificacions d'aquests productes si presenten alguna vulnerabilitat. Aquest servei inclou una base de dades de vulnerabilitats actualitzada diàriament i ... -
Aplicación de la tecnología de radio cognitiva en redes de área corporal
(Universitat Politècnica de Catalunya, 2017-01-17)
Bachelor thesis
Open AccessFor the past few years, a number of new wireless technologies have emerged, allowing users to access the Internet and a myriad of services through mobile devices such as smartphones, tablets, wearables..., Among others, ... -
Application of JXTA-overlay platform for secure robot control
(2010)
Article
Open AccessIn this paper, we present the evaluation and experimental results of secured robot control in a P2P system. The control system is based on JXTA-Overlay platform. We used secure primitives and functions of JXTA-Overlay for ... -
Approaching the rights management interoperability problem using intelligent brokerage mechanisms
(2011-02-15)
Article
Restricted access - publisher's policyThe digital content industry is facing significant challenges. One of the most significant challenges is the Intellectual Property protection. This challenge has been addressed technologically by using Digital Rights ... -
Artificial Intelligence for obstacles detection using IR camera images
(Universitat Politècnica de Catalunya, 2019-06)
Bachelor thesis
Restricted access - author's decision -
Backside polishing detector: a new protection against backside attacks
(2015)
Conference report
Open AccessSecure chips are in permanent risk of attacks. Physical attacks usually start removing part of the package and accessing the dice by different means: laser shots, electrical or electromagnetic probes, etc. Doing this ...