Ara es mostren els items 1-20 de 273

  • A CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions 

    Cilardo, Alessandro; Esposito, Luigi; Veniero, Antonio; Mazzeo, Antonino; Beltran, Vicenç; Ayguadé Parra, Eduard (2010)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    After some recent breaks presented in the technical literature, it has become of paramount importance to gain a deeper understanding of the robustness and weaknesses of cryptographic hash functions. In particular, in the ...
  • A collective intelligence approach for building student's trustworthiness profile in online learning 

    Miguel, Jorge; Caballé Llobet, Santiago; Xhafa Xhafa, Fatos; Prieto, Josep; Barolli, Leonard (Institute of Electrical and Electronics Engineers (IEEE), 2014)
    Text en actes de congrés
    Accés obert
    Information and communication technologies have been widely adopted in most of educational institutions to support e-Learning through different learning methodologies such as computer supported collaborative learning, which ...
  • A comparison study for two fuzzy-based systems: improving reliability and security of JXTA-overlay P2P platform 

    Liu, Yi; Sakamoto, Shinji; Matsuo, Keita; Ikeda, Makoto; Barolli, Leonard; Xhafa Xhafa, Fatos (Springer, 2016-07-01)
    Article
    Accés obert
    The reliability of peers is very important for safe communication in peer-to-peer (P2P) systems. The reliability of a peer can be evaluated based on the reputation and interactions with other peers to provide different ...
  • A data visualization approach for trustworthiness in social networks for on-line learning 

    Miguel, Jorge; Caballé Llobet, Santiago; Xhafa Xhafa, Fatos; Snasel, Vaclav (2015)
    Text en actes de congrés
    Accés obert
    Up to now, the problem of ensuring collaborative activities in e-Learning against dishonest students' behaviour has been mainly tackled with technological security solutions. Over the last years, technological security ...
  • A digital memristor emulator for FPGA-based artificial neural networks 

    Vourkas, Ioanis; Abusleme, A.; Ntinas, V.; Sirakoulis, Georgios Ch.; Rubio Sola, Jose Antonio (Institute of Electrical and Electronics Engineers (IEEE), 2016)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    FPGAs are reconfigurable electronic platforms, well-suited to implement complex artificial neural networks (ANNs). To this end, the compact hardware (HW) implementation of artificial synapses is an important step to obtain ...
  • A la seguridad por la privacidad 

    Barceló García, Miquel (2001-07)
    Article
    Accés obert
  • Almost IPP-codes or provably secure digital fingerprinting codes 

    Fernández Muñoz, Marcel; Kabatiansky, Grigory; Moreira Sánchez, José (Institute of Electrical and Electronics Engineers (IEEE), 2015)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    Codes with the Identifiable Parent Property (IPP codes) form a very useful tool in traitor tracing schemes since they guarantee (with probability 1) identification of at least one of the traitors. We consider a natural ...
  • Almost separating and almost secure frameproof codes over q-ary alphabets 

    Moreira Sánchez, José; Fernández Muñoz, Marcel; Kabatiansky, Grigory (2015-03-27)
    Article
    Accés obert
    In this paper we discuss some variations of the notion of separating code for alphabets of arbitrary size. We show how the original definition can be relaxed in two different ways, namely almost separating and almost secure ...
  • A low area probing detector for security IC's 

    Weiner, Michael; Manich Bou, Salvador; Sigl, Georg (2014)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    In this paper, a low cost, Low Area Probing Detector (LAPD) is presented. Probing or microprobing is an attack technique against integrated circuits implementing security functions, such as OTP tokens or smartcards. It ...
  • ALTAIR-SIGVI: un nuevo sistema para combatir el cibercrimen mitigando las vulnerabilidades = ALTAIR-SIGVI: mitigate vulnerabilities, a new way to work against cybercrime 

    Huerta Cerezuela, Víctor (Universidad de Castilla La-Mancha, 2015)
    Article
    Accés obert
    Uno de los retos a los que se enfrentan los administradores de sistemas informáticos hoy es el evitar que los recursos TIC que gestionan se usen para realizar ciberdelitos, o sufrir el impacto en sus propios servicios de ...
  • Altair-T: Sistema de detección y gestión de amenazas sobre activos 

    Berlanga Fuentes, Juan (Universitat Politècnica de Catalunya, 2012-01-19)
    Projecte/Treball Final de Carrera
    Accés obert
    El proyecto Altair-T consiste en el desarrollo e implantación de un framework centralizado para la detección y gestión de amenazas sobre activos mediante la integración de una herramienta de escaneo, un servicio de avisos ...
  • A massive data processing approach for effective trustworthiness in online learning groups 

    Miguel, Jorge; Caballé Llobet, Santiago; Xhafa Xhafa, Fatos; Prieto, Josep (2015-06-10)
    Article
    Accés obert
    This paper proposes a trustworthiness-based approach for the design of secure learning activities in online learning groups. Although computer-supported collaborative learning has been widely adopted in many educational ...
  • A methodological approach for trustworthiness assessment and prediction in mobile online collaborative learning 

    Miguel, Jorge; Caballé Llobet, Santiago; Xhafa Xhafa, Fatos; Prieto, Josep; Barolli, Leonard (Elsevier, 2016)
    Article
    Accés obert
    Trustworthiness and technological security solutions are closely related to online collaborative learning and they can be combined with the aim of reaching information security requirements for e-Learning participants and ...
  • A methodological approach to modelling trustworthiness in online collaborative learning 

    Miguel, Jorge; Caballé Llobet, Santiago; Xhafa Xhafa, Fatos; Prieto, Josep; Barolli, Leonard (Institute of Electrical and Electronics Engineers (IEEE), 2014)
    Text en actes de congrés
    Accés obert
    Trustworthiness and technological security solutions are closely related to online collaborative learning as they can be combined with the aim of reaching information security requirements for e-Learning participants and ...
  • A modeling of certificate revocation and its application to synthesis of revocation traces 

    Hernández Gañán, Carlos; Mata Diaz, Jorge; Muñoz Tapia, José Luis; Hernández Serrano, Juan; Esparza Martín, Óscar; Alins Delgado, Juan José (2012)
    Article
    Accés restringit per política de l'editorial
    One of the hardest tasks of a public key infrastructure (PKI) is to manage revocation. New communication paradigms push the revocation system to the limit and an accurate resource assessment is necessary before implementing ...
  • Ampliación Android del "MONO" packet capturer 

    Alvarez Calixto, Juan Bautista (Universitat Politècnica de Catalunya, 2017-10-31)
    Treball Final de Grau
    Accés restringit per decisió de l'autor
    Digital Forensics can be defined as the use of scientific methods to find evidences in digital sources such as computers, tablets, mobile phones, databases, Network Interface Controllers (NICs), smart devices, etc. These ...
  • Anàlisi d'associacions de memristors per a la generació de bits aleatoris per aplicacions de seguretat hardware 

    Serrano Carranco, Maitane (Universitat Politècnica de Catalunya, 2017-06-15)
    Projecte Final de Màster Oficial
    Accés obert
    Aquest treball té com a objectiu l’anàlisi experimental del comportament elèctric de memristors. El memristor és el quart element fonamental dels circuits, predit al 1971 per Leon Chua i posteriorment implementant al 2008 ...
  • Anàlisi, experimentació i millora d'un sistema de ciber-seguretat de la llar Crowdsourced 

    González Quevedo, Edgar (Universitat Politècnica de Catalunya, 2017-06-15)
    Projecte Final de Màster Oficial
    Accés obert
    Aquest projecte consisteix en l’anàlisi, experimentació i millora de CommunityGuard, un sistema de ciber-seguretat col·laboratiu aplicable a xarxes industrials, empresarials i domèstiques. CommunityGuard consisteix, en ...
  • Análisi forense digital mitjantçant l'us d'eines Open Source 

    Ahmed Akhtar, Adir (Universitat Politècnica de Catalunya, 2009-06-19)
    Projecte/Treball Final de Carrera
    Accés obert
    La finalitat és introduir-se a la computació forense (Anàlisi Forense de Sistemes) i entendre amb deta1l el procés que s'ha de portar a terme, la metodologia a seguir, les eines i técniques disponibles davant un incident ...
  • Anàlisi i implantació del pla de contingència del Banc de Sang i Teixits 

    Ruiz i Àlvarez, Oriol (Universitat Politècnica de Catalunya, 2013-01-23)
    Projecte/Treball Final de Carrera
    Accés restringit per acord de confidencialitat