Browsing by Subject "Telecomunicació -- Mesures de seguretat"
Now showing items 1-8 of 8
-
A novel approach to security enhancement of chaotic DSSS systems
(Institute of Electrical and Electronics Engineers (IEEE), 2016)
Conference report
Open AccessIn this paper, we propose a novel approach to the enhancement of physical layer security for chaotic direct-sequence spread-spectrum (DSSS) communication systems. The main idea behind our proposal is to vary the symbol ... -
A shared CubeSat and LEO constellation for quantum key distribution service and 5G IoT service: QUANGO project overview and design considerations
(International Astronautical Federation, 2021)
Conference report
Restricted access - publisher's policySecure and reliable exchange of data and information plays a crucial role in our society, for example protecting money transfers, commercial transactions, medical data, remote control of sensible infrastructures, etc. ... -
A survey of deep learning techniques for cybersecurity in mobile networks
(2021-06-07)
Article
Open AccessThe widespread use of mobile devices, as well as the increasing popularity of mobile services has raised serious cybersecurity challenges. In the last years, the number of cyberattacks has grown dramatically, as well as ... -
An IR-HARQ scheme for covert communications
(Institute of Electrical and Electronics Engineers (IEEE), 2021)
Conference report
Open AccessThis paper explores the advantages of incremental redundancy hybrid-ARQ schemes for covert communications in which a feedback channel is available. The use of efficient incremental redundancy with sub-codewords of different ... -
Análisis del posible uso del Broadcast Encryption en la televisión de pago
(Universitat Politècnica de Catalunya, 2009-05-06)
Master thesis (pre-Bologna period)
Open AccessEste proyecto se pretende realizar un estudio de los sistemas de difusión de televisión de pago que hay en funcionamiento actualmente y en la medida de lo posible, proponer un nuevo sistema que haga uso de los esquemas ... -
Cost-effective ML-powered polarization-encoded quantum key distribution
(Institute of Electrical and Electronics Engineers (IEEE), 2022-07-01)
Article
Open AccessSecure communications have become a requirement for virtually all kind of applications. Currently, two distant parties can generate shared random secret keys by using public key cryptography. However, quantum computing ... -
Polar coding for the wiretap broadcast channel with multiple messages
(Institute of Electrical and Electronics Engineers (IEEE), 2020)
Conference lecture
Open AccessA polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers and one eaves-dropper. We consider a model in which the transmitter wishes to to reliably send different confidential and ... -
Preventing route leaks using a decentralized approach: an experimental evaluation
(Institute of Electrical and Electronics Engineers (IEEE), 2020)
Conference report
Open AccessIn the inter-domain routing infrastructure, a route leak is defined as a violation of the routing policy agreed between two Autonomous Systems (AS). Route leaks have resulted in large-scale outages on the Internet, taking ...