Doctorat en Enginyeria Telemàtica
Collections in this community
-
Articles de revista [92]
Recent Submissions
-
Autopsy of Ethereum's post-merge reward system
(Institute of Electrical and Electronics Engineers (IEEE), 2023)
Conference report
Open AccessLike most modern blockchain networks, Ethereum has relied on economic incentives to promote honest participation in the chain's consensus. The distributed character of the platform, together with the "randomness" or "luck" ... -
A distance-weighted dynamic bandwidth allocation algorithm for improved performance in long-reach passive optical networks for next generation networks
(2023-08-11)
Article
Open AccessIn recent years, there has been an increasing trend towards extending the coverage of passive optical networks (PONs) over large geographical areas. Long-reach PONs (LRPONs) are capable of extending the distance covered ... -
Design and evaluation of a K8s-based system for distributed open-source cellular networks
(Institute of Electrical and Electronics Engineers (IEEE), 2023)
Conference report
Open AccessVirtualization in cellular networks is one of the key areas of research where technologies, infrastructure and challenges are rapidly changing as 5G system architecture demands a paradigm shift. This paper aims to study ... -
Optimizing resource allocation in long-reach PONs for improved performance in 6G networks
(2023)
Conference report
Restricted access - publisher's policyNext-generation cellular networks, such as 6G, will require high-speed and low-latency connectivity to support advanced services and applications. Passive Optical Networks (PONs) have emerged as a promising solution to ... -
The digital platform for the Unite! alliance: the metacampus
(2023)
Conference lecture
Open AccessNine European technology universities constitute the Unite! Alliance, a network that creates a new model for a virtual and physical European interuniversity campus through close cooperation, physical and virtual mobility ... -
Enabling intelligence inclusiveness in edge to cloud continuum challenges and opportunities
(Institute of Electrical and Electronics Engineers (IEEE), 2023)
Conference report
Restricted access - publisher's policyEdge to Cloud Continuum is a concept that integrates cloud computing and cellular networks that has been gaining popularity due to its potential to provide a seamless user experience and address the challenges of managing ... -
Privacy-centered authentication: a new framework and analysis
(2023-09)
Article
Open AccessThe usage of authentication schemes is increasing in our daily life with the ubiquitous spreading Internet services. The verification of user’s identity is still predominantly password-based, despite of being susceptible ... -
SoK: differentially private publication of trajectory data
(2023-04)
Article
Open AccessTrajectory analysis holds many promises, from improvements in traffic management to routing advice or infrastructure development. However, learning users’ paths is extremely privacy-invasive. Therefore, there is a necessity ... -
Enabling multi-tenant cellular IoT services over LEO constellations in future 6G networks
(International Astronautical Federation, 2022)
Conference report
Restricted access - publisher's policySatellite-based, non-terrestrial networks (NTN) are crucial in providing global connectivity coverage, supporting important use cases in future 3rd Generation Partnership Project (3GPP) 6th generation networks (6G). Existing ... -
PlonKup: Reconciling PlonK with plookup
(2022-01-25)
Research report
Open AccessIn 2019, Gabizon, Williamson, and Ciobotaru introduced PlonK – a fast and flexible ZK-SNARK with an updatable and universal structured reference string. PlonK uses a grand product argument to check permutations of wire ... -
La publicación de trayectorias: un estudio sobre la protección de la privacidad
(Universidad de Cantabria, 2022)
Conference report
Open AccessEl analisis de las trayectorias encierra numerosas ´ promesas, desde mejoras en la gestion del tr ´ afico hasta recomen- ´ daciones de ruta, o incluso en el desarrollo de infraestructuras. Sin embargo, conocer los lugares ... -
An adversarial-risk-analysis approach to counterterrorist online surveillance
(Multidisciplinary Digital Publishing Institute (MDPI), 2019-01-24)
Article
Open AccessThe Internet, with the rise of the IoT, is one of the most powerful means of propagating a terrorist threat, and at the same time the perfect environment for deploying ubiquitous online surveillance systems.This paper ...