SERTEL - Serveis Telemàtics
Collections in this community
-
Altres [2]
-
Articles de revista [56]
-
Llibres [1]
Recent Submissions
-
RIAPPA: a robust identity assignment protocol for P2P overlays
(2014-12-01)
Article
Open AccessPeer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed infrastructures, even for Internet scale. But the research community has been questioning the security of these networks ... -
A methodology to introduce sustainability into the Final Year Project to foster sustainable engineering projects
(Institute of Electrical and Electronics Engineers (IEEE), 2014)
Conference report
Open AccessThe introduction of sustainability skills into higher education curricula is a natural effect of the increasing importance of sustainability in our daily lives. Topics like green computing, sustainable design or environmental ... -
Cross-layer packet scheduler for QoS support over digital video broadcasting-second generation broadband satellite systems
(2014-10-01)
Article
Restricted access - publisher's policyThis article presents a cross-layer packet scheduler to provide end-to-end QoS guarantees for Digital Video Broadcasting-Second Generation (DVB-S2) broadband satellite systems. The scheduler design is based on a cross-layer ... -
MAX-MIN based buffer allocation for VANETs
(Institute of Electrical and Electronics Engineers (IEEE), 2014)
Conference report
Restricted access - publisher's policyMany proposals have studied the optimization of the EDCA mechanism used by the IEEE 802.11p MAC layer to provide QoS. In this work, we focus on the queuing process done by the different Access Categories (ACs). We propose ... -
Utilizando certificados implícitos para asignar identidades en Overlays P2P
(Universidad de Alicante, 2014)
Conference report
Restricted access - publisher's policyDesde hace ños, la seguridad en las redes P2P estructuradas está siendo cuestionada, y por ello se han propuesto muchos trabajos con el objetivo de proporcionar enrutamiento seguro, sistemas de reputaci´on, control de ... -
A simple closed-form approximation for the packet loss rate of a TCP connection over wireless links
(2014-09-15)
Article
Open AccessThis letter presents a new and simple model for a TCP flow experiencing random packet losses due to both transmission errors and congestion events. From this model, we will derive a straightforward expression of a unified ... -
MHT-based mechanism for certificate revocation in VANETs
(Springer, 2014-07)
Part of book or chapter of book
Restricted access - publisher's policyVehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A Public Key Infrastructure (PKI) can be utilized to provide these functionalities ... -
Evaluation of a query-obfuscation mechanism for the privacy protection of user profile
(2014-06-30)
Article
Open AccessTraces related to our identity are left every day while we browse the Internet. Being the user’s information a very valued asset for most of the companies, user activities on Internet are permanently monitored, and the ... -
Propagation and packet error models in VANET simulations
(2014-05-01)
Article
Restricted access - publisher's policyIn this paper, we review the workflow of the channel and physical layer modules in VANET simulations and briefly survey some of the most used propagation and packet error models in network simulators for this kind of ... -
Certificate revocation system implementation based on the Merkle Hash Tree
(2004-01)
Article
Restricted access - publisher's policyPublic-key cryptography is widely used to provide Internet security services. The public-key infrastructure (PKI) is the infrastructure that supports the public-key cryptography, and the revocation of certificates implies ... -
Tracing traitors by guessing secrets. The q-ary case
(Springer, 2005)
Conference report
Restricted access - publisher's policyIn this paper we present, by solving a variant of the guessing secrets problem defined by Chung, Graham and Leighton [3], a sequential traitor tracing scheme equipped with an efficient identification algorithm. Sequential ... -
A note about the traceability properties of linear codes
(Springer, 2007)
Conference report
Restricted access - publisher's policyWe characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ...