Recent Submissions

  • RIAPPA: a robust identity assignment protocol for P2P overlays 

    Caubet Fernández, Juan; Esparza Martín, Óscar; Muñoz Tapia, José Luis; Alins Delgado, Juan José; Mata Diaz, Jorge (2014-12-01)
    Article
    Open Access
    Peer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed infrastructures, even for Internet scale. But the research community has been questioning the security of these networks ...
  • Cross-layer packet scheduler for QoS support over digital video broadcasting-second generation broadband satellite systems 

    Rendón Morales, Elizabeth; Mata Diaz, Jorge; Alins Delgado, Juan José; Muñoz Tapia, José Luis; Esparza Martín, Óscar (2014-10-01)
    Article
    Restricted access - publisher's policy
    This article presents a cross-layer packet scheduler to provide end-to-end QoS guarantees for Digital Video Broadcasting-Second Generation (DVB-S2) broadband satellite systems. The scheduler design is based on a cross-layer ...
  • A simple closed-form approximation for the packet loss rate of a TCP connection over wireless links 

    Mata Diaz, Jorge; Alins Delgado, Juan José; Muñoz Tapia, José Luis; Esparza Martín, Óscar (2014-09-15)
    Article
    Open Access
    This letter presents a new and simple model for a TCP flow experiencing random packet losses due to both transmission errors and congestion events. From this model, we will derive a straightforward expression of a unified ...
  • Evaluation of a query-obfuscation mechanism for the privacy protection of user profile 

    Estrada, Jose Antonio; Rodríguez, Ana Fernanda; Parra-Arnau, Javier; Forné Muñoz, Jorge (2014-06-30)
    Article
    Open Access
    Traces related to our identity are left every day while we browse the Internet. Being the user’s information a very valued asset for most of the companies, user activities on Internet are permanently monitored, and the ...
  • Propagation and packet error models in VANET simulations 

    Urquiza Aguiar, Luis; Tripp Barba, Carolina; Martín Faus, Isabel Victoria; Aguilar Igartua, Mónica (2014-05-01)
    Article
    Restricted access - publisher's policy
    In this paper, we review the workflow of the channel and physical layer modules in VANET simulations and briefly survey some of the most used propagation and packet error models in network simulators for this kind of ...
  • Certificate revocation system implementation based on the Merkle Hash Tree 

    Muñoz Tapia, José Luis; Forné Muñoz, Jorge; Esparza Martín, Óscar; Soriano Ibáñez, Miguel (2004-01)
    Article
    Restricted access - publisher's policy
    Public-key cryptography is widely used to provide Internet security services. The public-key infrastructure (PKI) is the infrastructure that supports the public-key cryptography, and the revocation of certificates implies ...
  • Dynamic buffer sizing for wireless devices via maximum entropy 

    Vázquez Rodas, Andrés; Cruz Llopis, Luis Javier de la; Aguilar Igartua, Mónica; Sanvicente Gargallo, Emilio (2014-05-15)
    Article
    Restricted access - publisher's policy
    Buffer overflow is an important phenomenon in data networks that has much bearing on the overall network performance. Such overflow critically depends on the amount of storage space allotted to the transmission channels. ...
  • VSPLIT: a cross-layer architecture for V2I TCP services over 802.11 

    Reñé Vicente, Sergi; Esparza Martín, Óscar; Alins Delgado, Juan José; Mata Diaz, Jorge; Muñoz Tapia, José Luis (2013-12)
    Article
    Restricted access - publisher's policy
    This article proposes VSPLIT, a new architecture based on TCP cross-layering and splitting techniques for optimizing the transport layer performance in vehicular networks for Internet-based Vehicle-to-Infrastructure (V2I) ...
  • Energy-efficient physical layer packet authenticator for machine-to-machine networks 

    Bartoli, Andrea; Hernández Serrano, Juan; León Abarca, Olga; Kountouris, Apostolous; Barthel, Dominique (Wiley-Blackwell, 2013-06)
    Article
    Restricted access - publisher's policy
    Machine-to-machine networks are spreading over every sector of our society due to their self-organisation capabilities. In these networks, thousands of devices are left unattended for years of operation without the possibility ...
  • DocCloud: a document recommender system on cloud computing with plausible deniability 

    Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2013-04-16)
    Article
    Restricted access - publisher's policy
    Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. ...
  • Measuring the privacy of user profiles in personalized information systems 

    Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (Elsevier, 2014-04-01)
    Article
    Restricted access - publisher's policy
    Personalized information systems are information-filtering systems that endeavor to tailor information-exchange functionality to the specific interests of their users. The ability of these systems to profile users is, on ...
  • Reconciling privacy and efficient utility management in smart cities 

    Rebollo Monedero, David; Bartoli, Andrea; Hernández Serrano, Juan; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2014-01-01)
    Article
    Restricted access - publisher's policy
    A key aspect in the design of smart cities is, undoubtedly, a plan for the efficient management of utilities, enabled by technologies such as those entailing smart metering of the residential consumption of electricity, ...

View more