Articles de revista
Recent Submissions
-
RIAPPA: a robust identity assignment protocol for P2P overlays
(2014-12-01)
Article
Open AccessPeer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed infrastructures, even for Internet scale. But the research community has been questioning the security of these networks ... -
Cross-layer packet scheduler for QoS support over digital video broadcasting-second generation broadband satellite systems
(2014-10-01)
Article
Restricted access - publisher's policyThis article presents a cross-layer packet scheduler to provide end-to-end QoS guarantees for Digital Video Broadcasting-Second Generation (DVB-S2) broadband satellite systems. The scheduler design is based on a cross-layer ... -
A simple closed-form approximation for the packet loss rate of a TCP connection over wireless links
(2014-09-15)
Article
Open AccessThis letter presents a new and simple model for a TCP flow experiencing random packet losses due to both transmission errors and congestion events. From this model, we will derive a straightforward expression of a unified ... -
Evaluation of a query-obfuscation mechanism for the privacy protection of user profile
(2014-06-30)
Article
Open AccessTraces related to our identity are left every day while we browse the Internet. Being the user’s information a very valued asset for most of the companies, user activities on Internet are permanently monitored, and the ... -
Propagation and packet error models in VANET simulations
(2014-05-01)
Article
Restricted access - publisher's policyIn this paper, we review the workflow of the channel and physical layer modules in VANET simulations and briefly survey some of the most used propagation and packet error models in network simulators for this kind of ... -
Certificate revocation system implementation based on the Merkle Hash Tree
(2004-01)
Article
Restricted access - publisher's policyPublic-key cryptography is widely used to provide Internet security services. The public-key infrastructure (PKI) is the infrastructure that supports the public-key cryptography, and the revocation of certificates implies ... -
Dynamic buffer sizing for wireless devices via maximum entropy
(2014-05-15)
Article
Restricted access - publisher's policyBuffer overflow is an important phenomenon in data networks that has much bearing on the overall network performance. Such overflow critically depends on the amount of storage space allotted to the transmission channels. ... -
VSPLIT: a cross-layer architecture for V2I TCP services over 802.11
(2013-12)
Article
Restricted access - publisher's policyThis article proposes VSPLIT, a new architecture based on TCP cross-layering and splitting techniques for optimizing the transport layer performance in vehicular networks for Internet-based Vehicle-to-Infrastructure (V2I) ... -
Energy-efficient physical layer packet authenticator for machine-to-machine networks
(Wiley-Blackwell, 2013-06)
Article
Restricted access - publisher's policyMachine-to-machine networks are spreading over every sector of our society due to their self-organisation capabilities. In these networks, thousands of devices are left unattended for years of operation without the possibility ... -
DocCloud: a document recommender system on cloud computing with plausible deniability
(2013-04-16)
Article
Restricted access - publisher's policyRecommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. ... -
Measuring the privacy of user profiles in personalized information systems
(Elsevier, 2014-04-01)
Article
Restricted access - publisher's policyPersonalized information systems are information-filtering systems that endeavor to tailor information-exchange functionality to the specific interests of their users. The ability of these systems to profile users is, on ... -
Reconciling privacy and efficient utility management in smart cities
(2014-01-01)
Article
Restricted access - publisher's policyA key aspect in the design of smart cities is, undoubtedly, a plan for the efficient management of utilities, enabled by technologies such as those entailing smart metering of the residential consumption of electricity, ...