Now showing items 1-20 of 47

    • A new class of traceability schemes 

      Egorova, Elena; Fernández Muñoz, Marcel; Kabatiansky, Grigory (2019)
      Conference report
      Restricted access - publisher's policy
      A new class of tracing traitors schemes with traceability property which combines ideas of nonbinary IPP-codes and IPP set systems is proposed. A detailed comparison of the proposed scheme with previously known traceability ...
    • Analysis and implementation of a SSO solution for several web portal 

      Magrinyà Bonafont, Xavier (Universitat Politècnica de Catalunya / Aalto University, 2012-08)
      Master thesis (pre-Bologna period)
      Open Access
      Covenantee:   Aalto-yliopisto. Sähkötekniikan korkeakoulu
      Analysis and implementation of a SSO solution for several web portal.
    • Análisis Side-Channel mediante aprendizaje automático (machine learning): estudio de técnicas y aplicabilidad 

      Garos Moyano, Andrea (Universitat Politècnica de Catalunya, 2017-07-04)
      Bachelor thesis
      Restricted access - confidentiality agreement
      Covenantee:   Applus+
    • Aplicació d'estadístiques i resultats de competicions d'e-sports 

      Badia Romero, Marc (Universitat Politècnica de Catalunya, 2020-01-28)
      Bachelor thesis
      Open Access
      Els e-sports són un fenomen que cada vegada és més popular. Arreu del món, milions de persones gaudeixen d'aquestes competicions. Per aquest motiu, en aquest projecte s'aspira a desenvolupar una aplicació per a Android ...
    • Cifrado en flujo basado en NLFSR 

      Gonzalo, R; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1998-07)
      Article
      Open Access
      Los mecanismos de cifrado en flujo constituyen una alternativa interesante para proporcionar confidencialidad en distintos entornos como comunicaciones móvi­les y redes de alta velocidad. En la literatura se han estudiado ...
    • Codificació de missatges mitjançant matrius 

      Hernández Morales, Àlex; Gómez, Roger (2018-05)
      Audiovisual
      Open Access
    • Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme 

      Wang, Xu An; Xhafa Xhafa, Fatos; Ma, Jianfeng; Zheng, Zhiheng (Elsevier, 2019-08)
      Article
      Open Access
      Currently we are witnessing a rapid integration of social networks and cloud computing, especially on storing social media contents on cloud storage due to its cheap management and easy accessing at any time and from any ...
    • Critical analysis and comparison of data protection techniques for genomics data sets 

      Naro, Daniel (Universitat Politècnica de Catalunya, 2016-07-04)
      Master thesis
      Open Access
      This work reviews the current literature on protecting genomic information. The goal is to provide insight on how to define a secure file format for such data. We compare the published ideas to the requirements defined by ...
    • Cryptanalysis and improvement of chen-hsiang-shih's remote user authentication scheme using smart cards 

      Martínez Pelàez, Rafael; Rico Novella, Francisco José; Velarde-Alvarado, P. (2013-09)
      Article
      Open Access
      Recently, Chen-Hsiang-Shih proposed a new dynamic ID-based remote user authentication scheme. The authors claimed that their scheme was more secure than previous works. However, this paper demonstrates that theirscheme is ...
    • Delegació verificable del càlcul de polinomis 

      Obrador Sureda, Marc (Universitat Politècnica de Catalunya, 2013-02-15)
      Master thesis (pre-Bologna period)
      Open Access
      [ANGLÈS] Algorithms to delegate the evaluation of some polynomial, private or not, at some point, private or not, to an untrusted entity.
    • Efficient privacy preserving predicate encryption with fine-grained searchable capability for cloud storage 

      Wang, Xu An; Xhafa Xhafa, Fatos; Cai, Weiyi; Ma, Jianfeng; Wei, Fushan (2016-06-01)
      Article
      Open Access
      With the fast development in Cloud storage technologies and ever increasing use of Cloud data centres, data privacy and confidentiality has become a must. Indeed, Cloud data centres store each time more sensitive data such ...
    • Els codis QR 

      García Caballero, Carla (Universitat Politècnica de Catalunya, 2022-01-24)
      Bachelor thesis
      Restricted access - author's decision
    • Encriptació de registres en un CRM amb advanced encryption standard 

      Pérez Vidal, Aleix (Universitat Politècnica de Catalunya, 2021-07-01)
      Bachelor thesis
      Restricted access - confidentiality agreement
    • Encriptación de funciones 

      Ai, Yining; Betancourth Soto, Camila; Carabantes Morales, Núria; González Cid, Cinta; Maataoui, Fatin (2019-12-20)
      Audiovisual
      Open Access
    • Encrypted and secure messages with CAN FD 

      Acosta Montilla, Alejandro (Universitat Politècnica de Catalunya, 2021-05-17)
      Master thesis
      Open Access
      The project intends to portray an approach to design a cryptographic secured way to transmit messages on the well-known CAN bus communication protocol in modern cars. However, due to the requirement of including some message ...
    • Encryption and validation of multiple signals for optical identification systems 

      Pérez Cabré, Elisabet; Millán Garcia-Varela, M. Sagrario; Javidi, Bahram (IOP Publishing, 2007)
      Conference report
      Restricted access - publisher's policy
      Multifactor encryption-authentication technique reinforces optical security by allowing the simultaneous AND-verification of more than one primary image. Instead of basing the identification on a unique signature or piece ...
    • Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation 

      Zhang, Jindan; Wang, Baocang; Xhafa Xhafa, Fatos; An Wang, Xu; Li, Cong (Springer, 2017-12-29)
      Article
      Open Access
      In this paper two new ways for efficient secure outsourcing the decryption of key-policy attribute-based encryption (KP-ABE) with energy efficiency are proposed. Based on an observation about the permutation property of ...
    • Estudi i millora d'esquemes de clau pública de llindar 

      Costa Mirada, Núria (Universitat Politècnica de Catalunya, 2012-06-18)
      Master thesis (pre-Bologna period)
      Open Access
      [ANGLÈS] Survey of different encryption schemes emphasizing the improvements on the efficiency and the security of each scheme. Study of Groth-Sahai zero-knowledge proofs. Proposal of a fully secure threshold public key ...
    • ETSI EN 319 162-1 v1.1.1. Associated Signature Containers (ASiC). Part 1: Building blocks and ASiC baseline containers 

      Caccia, Andrea; Rizzo, Luigi; Cruellas Ibarz, Juan Carlos; Funk, Alexander; Röck, Andrea (2016-04-01)
      Research report
      Open Access
      European standard that specifies a format for containers enclosing XAdES and CAdES digital signatures and detached signed documents. It also specifies a baseline profile that minimizes the degree of optionality in the ...
    • ETSI EN 319 162-2 v1.1.1. Associated Signature Containers (ASiC). Part 2: Additional ASiC containers 

      Caccia, Andrea; Rizzo, Luigi; Cruellas Ibarz, Juan Carlos; Funk, Alexander; Röck, Andrea (2016-04-01)
      Research report
      Open Access
      Part 1 of the present multi-part deliverable, ETSI EN 319 162-1 [2] (ASiC part 1 henceforth) specifies the use of container structures for associating either detached CAdES [1] signatures or detached XAdES [i.7] ...