Now showing items 1-20 of 57

    • A new class of traceability schemes 

      Egorova, Elena; Fernández Muñoz, Marcel; Kabatiansky, Grigory (2019)
      Conference report
      Restricted access - publisher's policy
      A new class of tracing traitors schemes with traceability property which combines ideas of nonbinary IPP-codes and IPP set systems is proposed. A detailed comparison of the proposed scheme with previously known traceability ...
    • A secure vault setup for a crypto wallet 

      Ruiz Alcalá, Alexis (Universitat Politècnica de Catalunya, 2022-10-27)
      Master thesis
      Open Access
      In today's digital world, every user needs to store sensitive data, including personal information, cryptographic keys and/or passwords. For user convenience, this data is usually backed up on a cloud hosting so that users ...
    • Analysis and implementation of a SSO solution for several web portal 

      Magrinyà Bonafont, Xavier (Universitat Politècnica de Catalunya / Aalto University, 2012-08)
      Master thesis (pre-Bologna period)
      Open Access
      Covenantee:   Aalto-yliopisto. Sähkötekniikan korkeakoulu
      Analysis and implementation of a SSO solution for several web portal.
    • Análisis Side-Channel mediante aprendizaje automático (machine learning): estudio de técnicas y aplicabilidad 

      Garos Moyano, Andrea (Universitat Politècnica de Catalunya, 2017-07-04)
      Bachelor thesis
      Restricted access - confidentiality agreement
      Covenantee:   Applus+
    • Aplicació d'estadístiques i resultats de competicions d'e-sports 

      Badia Romero, Marc (Universitat Politècnica de Catalunya, 2020-01-28)
      Bachelor thesis
      Open Access
      Els e-sports són un fenomen que cada vegada és més popular. Arreu del món, milions de persones gaudeixen d'aquestes competicions. Per aquest motiu, en aquest projecte s'aspira a desenvolupar una aplicació per a Android ...
    • Cifrado en flujo basado en NLFSR 

      Gonzalo, R; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1998-07)
      Article
      Open Access
      Los mecanismos de cifrado en flujo constituyen una alternativa interesante para proporcionar confidencialidad en distintos entornos como comunicaciones móvi­les y redes de alta velocidad. En la literatura se han estudiado ...
    • Codificació de missatges mitjançant matrius 

      Hernández Morales, Àlex; Gómez, Roger (2018-05)
      Audiovisual
      Open Access
    • Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme 

      Wang, Xu An; Xhafa Xhafa, Fatos; Ma, Jianfeng; Zheng, Zhiheng (Elsevier, 2019-08)
      Article
      Open Access
      Currently we are witnessing a rapid integration of social networks and cloud computing, especially on storing social media contents on cloud storage due to its cheap management and easy accessing at any time and from any ...
    • Critical analysis and comparison of data protection techniques for genomics data sets 

      Naro, Daniel (Universitat Politècnica de Catalunya, 2016-07-04)
      Master thesis
      Open Access
      This work reviews the current literature on protecting genomic information. The goal is to provide insight on how to define a secure file format for such data. We compare the published ideas to the requirements defined by ...
    • Cryptanalysis and improvement of chen-hsiang-shih's remote user authentication scheme using smart cards 

      Martínez Pelàez, Rafael; Rico Novella, Francisco José; Velarde-Alvarado, P. (2013-09)
      Article
      Open Access
      Recently, Chen-Hsiang-Shih proposed a new dynamic ID-based remote user authentication scheme. The authors claimed that their scheme was more secure than previous works. However, this paper demonstrates that theirscheme is ...
    • Delegació verificable del càlcul de polinomis 

      Obrador Sureda, Marc (Universitat Politècnica de Catalunya, 2013-02-15)
      Master thesis (pre-Bologna period)
      Open Access
      [ANGLÈS] Algorithms to delegate the evaluation of some polynomial, private or not, at some point, private or not, to an untrusted entity.
    • Desenvolupament del mòdul de gestió de llicències per Math Type 7 desktop 

      Ni, Peilin (Universitat Politècnica de Catalunya, 2023-06-28)
      Bachelor thesis
      Open Access
      Covenantee:   Maths For More
      El mòdul de gestió de llicències de l'aplicació de MathType7 actual s'encarrega d'administrar els accessos a l'aplicació donades unes dates introduïdes per l'usuari. Donada l'antiguitat de les tecnologies aplicades, el ...
    • Double image encryption system using a nonlinear joint transform correlator in the Fourier domain 

      Pérez, Ronal A; Pérez Cabré, Elisabet; Vilardy Ortiz, Juan Manuel; Millán Garcia-Varela, M. Sagrario; Torres Moreno, Cesar Orlando (Multidisciplinary Digital Publishing Institute (MDPI), 2023-02-02)
      Article
      Open Access
      In this work, we present a new nonlinear joint transform correlator (JTC) architecture in the Fourier domain (FD) for the encryption and decryption of two simultaneous images. The main features of the proposed system are ...
    • Efficient privacy preserving predicate encryption with fine-grained searchable capability for cloud storage 

      Wang, Xu An; Xhafa Xhafa, Fatos; Cai, Weiyi; Ma, Jianfeng; Wei, Fushan (2016-06-01)
      Article
      Open Access
      With the fast development in Cloud storage technologies and ever increasing use of Cloud data centres, data privacy and confidentiality has become a must. Indeed, Cloud data centres store each time more sensitive data such ...
    • Els codis QR 

      García Caballero, Carla (Universitat Politècnica de Catalunya, 2022-01-24)
      Bachelor thesis
      Open Access
    • Encriptació de registres en un CRM amb advanced encryption standard 

      Pérez Vidal, Aleix (Universitat Politècnica de Catalunya, 2021-07-01)
      Bachelor thesis
      Restricted access - confidentiality agreement
    • Encriptación de funciones 

      Ai, Yining; Betancourth Soto, Camila; Carabantes Morales, Núria; González Cid, Cinta; Maataoui, Fatin (2019-12-20)
      Audiovisual
      Open Access
    • Encrypted and secure messages with CAN FD 

      Acosta Montilla, Alejandro (Universitat Politècnica de Catalunya, 2021-05-17)
      Master thesis
      Open Access
      The project intends to portray an approach to design a cryptographic secured way to transmit messages on the well-known CAN bus communication protocol in modern cars. However, due to the requirement of including some message ...
    • Encryption and validation of multiple signals for optical identification systems 

      Pérez Cabré, Elisabet; Millán Garcia-Varela, M. Sagrario; Javidi, Bahram (IOP Publishing, 2007)
      Conference report
      Restricted access - publisher's policy
      Multifactor encryption-authentication technique reinforces optical security by allowing the simultaneous AND-verification of more than one primary image. Instead of basing the identification on a unique signature or piece ...
    • Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation 

      Zhang, Jindan; Wang, Baocang; Xhafa Xhafa, Fatos; An Wang, Xu; Li, Cong (Springer, 2017-12-29)
      Article
      Open Access
      In this paper two new ways for efficient secure outsourcing the decryption of key-policy attribute-based encryption (KP-ABE) with energy efficiency are proposed. Based on an observation about the permutation property of ...