Browsing by Subject "Xifratge (Informàtica)"
Now showing items 1-20 of 47
-
A new class of traceability schemes
(2019)
Conference report
Restricted access - publisher's policyA new class of tracing traitors schemes with traceability property which combines ideas of nonbinary IPP-codes and IPP set systems is proposed. A detailed comparison of the proposed scheme with previously known traceability ... -
Analysis and implementation of a SSO solution for several web portal
(Universitat Politècnica de Catalunya / Aalto University, 2012-08)
Master thesis (pre-Bologna period)
Open Access
Covenantee: Aalto-yliopisto. Sähkötekniikan korkeakouluAnalysis and implementation of a SSO solution for several web portal. -
Análisis Side-Channel mediante aprendizaje automático (machine learning): estudio de técnicas y aplicabilidad
(Universitat Politècnica de Catalunya, 2017-07-04)
Bachelor thesis
Restricted access - confidentiality agreement
Covenantee: Applus+ -
Aplicació d'estadístiques i resultats de competicions d'e-sports
(Universitat Politècnica de Catalunya, 2020-01-28)
Bachelor thesis
Open AccessEls e-sports són un fenomen que cada vegada és més popular. Arreu del món, milions de persones gaudeixen d'aquestes competicions. Per aquest motiu, en aquest projecte s'aspira a desenvolupar una aplicació per a Android ... -
Cifrado en flujo basado en NLFSR
(Asociación de Técnicos de Informática, 1998-07)
Article
Open AccessLos mecanismos de cifrado en flujo constituyen una alternativa interesante para proporcionar confidencialidad en distintos entornos como comunicaciones móviles y redes de alta velocidad. En la literatura se han estudiado ... -
Codificació de missatges mitjançant matrius
(2018-05)
Audiovisual
Open Access -
Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme
(Elsevier, 2019-08)
Article
Open AccessCurrently we are witnessing a rapid integration of social networks and cloud computing, especially on storing social media contents on cloud storage due to its cheap management and easy accessing at any time and from any ... -
Critical analysis and comparison of data protection techniques for genomics data sets
(Universitat Politècnica de Catalunya, 2016-07-04)
Master thesis
Open AccessThis work reviews the current literature on protecting genomic information. The goal is to provide insight on how to define a secure file format for such data. We compare the published ideas to the requirements defined by ... -
Cryptanalysis and improvement of chen-hsiang-shih's remote user authentication scheme using smart cards
(2013-09)
Article
Open AccessRecently, Chen-Hsiang-Shih proposed a new dynamic ID-based remote user authentication scheme. The authors claimed that their scheme was more secure than previous works. However, this paper demonstrates that theirscheme is ... -
Delegació verificable del càlcul de polinomis
(Universitat Politècnica de Catalunya, 2013-02-15)
Master thesis (pre-Bologna period)
Open Access[ANGLÈS] Algorithms to delegate the evaluation of some polynomial, private or not, at some point, private or not, to an untrusted entity. -
Efficient privacy preserving predicate encryption with fine-grained searchable capability for cloud storage
(2016-06-01)
Article
Open AccessWith the fast development in Cloud storage technologies and ever increasing use of Cloud data centres, data privacy and confidentiality has become a must. Indeed, Cloud data centres store each time more sensitive data such ... -
Els codis QR
(Universitat Politècnica de Catalunya, 2022-01-24)
Bachelor thesis
Restricted access - author's decision -
Encriptació de registres en un CRM amb advanced encryption standard
(Universitat Politècnica de Catalunya, 2021-07-01)
Bachelor thesis
Restricted access - confidentiality agreement -
Encriptación de funciones
(2019-12-20)
Audiovisual
Open Access -
Encrypted and secure messages with CAN FD
(Universitat Politècnica de Catalunya, 2021-05-17)
Master thesis
Open AccessThe project intends to portray an approach to design a cryptographic secured way to transmit messages on the well-known CAN bus communication protocol in modern cars. However, due to the requirement of including some message ... -
Encryption and validation of multiple signals for optical identification systems
(IOP Publishing, 2007)
Conference report
Restricted access - publisher's policyMultifactor encryption-authentication technique reinforces optical security by allowing the simultaneous AND-verification of more than one primary image. Instead of basing the identification on a unique signature or piece ... -
Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation
(Springer, 2017-12-29)
Article
Open AccessIn this paper two new ways for efficient secure outsourcing the decryption of key-policy attribute-based encryption (KP-ABE) with energy efficiency are proposed. Based on an observation about the permutation property of ... -
Estudi i millora d'esquemes de clau pública de llindar
(Universitat Politècnica de Catalunya, 2012-06-18)
Master thesis (pre-Bologna period)
Open Access[ANGLÈS] Survey of different encryption schemes emphasizing the improvements on the efficiency and the security of each scheme. Study of Groth-Sahai zero-knowledge proofs. Proposal of a fully secure threshold public key ... -
ETSI EN 319 162-1 v1.1.1. Associated Signature Containers (ASiC). Part 1: Building blocks and ASiC baseline containers
(2016-04-01)
Research report
Open AccessEuropean standard that specifies a format for containers enclosing XAdES and CAdES digital signatures and detached signed documents. It also specifies a baseline profile that minimizes the degree of optionality in the ... -
ETSI EN 319 162-2 v1.1.1. Associated Signature Containers (ASiC). Part 2: Additional ASiC containers
(2016-04-01)
Research report
Open AccessPart 1 of the present multi-part deliverable, ETSI EN 319 162-1 [2] (ASiC part 1 henceforth) specifies the use of container structures for associating either detached CAdES [1] signatures or detached XAdES [i.7] ...