Ponències/Comunicacions de congressos
Recent Submissions
-
A methodology to introduce sustainability into the Final Year Project to foster sustainable engineering projects
(Institute of Electrical and Electronics Engineers (IEEE), 2014)
Conference report
Open AccessThe introduction of sustainability skills into higher education curricula is a natural effect of the increasing importance of sustainability in our daily lives. Topics like green computing, sustainable design or environmental ... -
MAX-MIN based buffer allocation for VANETs
(Institute of Electrical and Electronics Engineers (IEEE), 2014)
Conference report
Restricted access - publisher's policyMany proposals have studied the optimization of the EDCA mechanism used by the IEEE 802.11p MAC layer to provide QoS. In this work, we focus on the queuing process done by the different Access Categories (ACs). We propose ... -
Utilizando certificados implícitos para asignar identidades en Overlays P2P
(Universidad de Alicante, 2014)
Conference report
Restricted access - publisher's policyDesde hace ños, la seguridad en las redes P2P estructuradas está siendo cuestionada, y por ello se han propuesto muchos trabajos con el objetivo de proporcionar enrutamiento seguro, sistemas de reputaci´on, control de ... -
Tracing traitors by guessing secrets. The q-ary case
(Springer, 2005)
Conference report
Restricted access - publisher's policyIn this paper we present, by solving a variant of the guessing secrets problem defined by Chung, Graham and Leighton [3], a sequential traitor tracing scheme equipped with an efficient identification algorithm. Sequential ... -
A note about the traceability properties of linear codes
(Springer, 2007)
Conference report
Restricted access - publisher's policyWe characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ... -
A new class of codes for fingerprinting schemes
(Springer, 2005)
Conference report
Restricted access - publisher's policyIn this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ... -
A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings
(Springer, 2011)
Conference report
Restricted access - publisher's policyRecommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture ... -
A privacy-preserving architecture for the semantic web based on tag suppression
(Springer, 2010)
Conference report
Restricted access - publisher's policyWe propose an architecture that preserves user privacy in the semantic Web via tag suppression. In tag suppression, users may wish to tag some resources and refrain from tagging some others in order to hinder privacy ... -
New considerations about the correct design of turbo fingerprinting codes
(Springer, 2008)
Conference report
Restricted access - publisher's policySince the introduction of turbo codes in 1993, many new applications for this family of codes have been proposed. One of the latest, in the context of digital fingerprinting, is called turbo fingerprinting codes and was ... -
Nuevo criterio para la estimación de información de estado de certificados en MANET
(Universidad Politécnica de Cartagena, 2009)
Conference report
Restricted access - publisher's policyIn general, certificate status validation is a critical operation but it is particularly complex in Mobile Ad-hoc Networks (MANETs). MANET users require solutions to manage both the lack of fixed infrastructure inside ... -
Constructions of almost secure frameproof codes based on small-bias probability spaces
(Springer International Publishing, 2013)
Conference report
Restricted access - publisher's policySecure frameproof code is the name given to a separating code when studied in relation to fingerprinting schemes. Separating codes are combinatorial objects that have found to be useful in many areas such as technical ... -
Securing identity assignment using implicit certificates in P2P overlays
(Springer International Publishing, 2013)
Conference report
Restricted access - publisher's policyThe security of the Peer-to-Peer (P2P) overlays networks has been questioned for years. Many works have been proposed to provide secure routing, anonymity, reputation systems, confidentiality, etc. However, the identity ...