Now showing items 1-8 of 8

    • A novel approach to security enhancement of chaotic DSSS systems 

      Nguyen, Xuan Quyen; Nguyen, Chuyen T.; Barlet Ros, Pere; Dojen, Reiner (Institute of Electrical and Electronics Engineers (IEEE), 2016)
      Conference report
      Open Access
      In this paper, we propose a novel approach to the enhancement of physical layer security for chaotic direct-sequence spread-spectrum (DSSS) communication systems. The main idea behind our proposal is to vary the symbol ...
    • A shared CubeSat and LEO constellation for quantum key distribution service and 5G IoT service: QUANGO project overview and design considerations 

      Sarica, Danilo; Balossino, Alessandro; Simonetti, Simone; Vallone, Giuseppe; Villoresi, Paolo; Berra, Federico; Guadalupi, Marco; Llorens Aymerich, Isaac; Ferrer, Josep; Ferrús Ferré, Ramón Antonio (International Astronautical Federation, 2021)
      Conference report
      Restricted access - publisher's policy
      Secure and reliable exchange of data and information plays a crucial role in our society, for example protecting money transfers, commercial transactions, medical data, remote control of sensible infrastructures, etc. ...
    • A survey of deep learning techniques for cybersecurity in mobile networks 

      Rodríguez Luna, Eva; Otero Calviño, Beatriz; Gutiérrez Escobar, Norma; Canal Corretger, Ramon (2021-06-07)
      Article
      Open Access
      The widespread use of mobile devices, as well as the increasing popularity of mobile services has raised serious cybersecurity challenges. In the last years, the number of cyberattacks has grown dramatically, as well as ...
    • An IR-HARQ scheme for covert communications 

      Lamarca Orozco, M. Meritxell (Institute of Electrical and Electronics Engineers (IEEE), 2021)
      Conference report
      Open Access
      This paper explores the advantages of incremental redundancy hybrid-ARQ schemes for covert communications in which a feedback channel is available. The use of efficient incremental redundancy with sub-codewords of different ...
    • Análisis del posible uso del Broadcast Encryption en la televisión de pago 

      Ferrer Aguilar, Javier (Universitat Politècnica de Catalunya, 2009-05-06)
      Master thesis (pre-Bologna period)
      Open Access
      Este proyecto se pretende realizar un estudio de los sistemas de difusión de televisión de pago que hay en funcionamiento actualmente y en la medida de lo posible, proponer un nuevo sistema que haga uso de los esquemas ...
    • Cost-effective ML-powered polarization-encoded quantum key distribution 

      Ahmadian, Seyed Morteza; Ruiz Ramírez, Marc; Comellas Colomé, Jaume; Velasco Esteban, Luis Domingo (Institute of Electrical and Electronics Engineers (IEEE), 2022-07-01)
      Article
      Open Access
      Secure communications have become a requirement for virtually all kind of applications. Currently, two distant parties can generate shared random secret keys by using public key cryptography. However, quantum computing ...
    • Polar coding for the wiretap broadcast channel with multiple messages 

      Olmo Alòs, Jaume del; Rodríguez Fonollosa, Javier (Institute of Electrical and Electronics Engineers (IEEE), 2020)
      Conference lecture
      Open Access
      A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers and one eaves-dropper. We consider a model in which the transmitter wishes to to reliably send different confidential and ...
    • Preventing route leaks using a decentralized approach: an experimental evaluation 

      Ferriol Galmés, Miquel; Coll Aumatell, Roger; Cabellos Aparicio, Alberto; Ren, Shoushou; Wei, Xinpeng; Liu, Bingyang (Institute of Electrical and Electronics Engineers (IEEE), 2020)
      Conference report
      Open Access
      In the inter-domain routing infrastructure, a route leak is defined as a violation of the routing policy agreed between two Autonomous Systems (AS). Route leaks have resulted in large-scale outages on the Internet, taking ...