Recent Submissions

  • A methodology to introduce sustainability into the Final Year Project to foster sustainable engineering projects 

    López Álvarez, David; Sánchez Carracedo, Fermín; Vidal López, Eva María; Pegueroles Vallés, Josep R.; Alier Forment, Marc; Cabré Garcia, José M.; García Almiñana, Jordi; García, Helena (Institute of Electrical and Electronics Engineers (IEEE), 2014)
    Conference report
    Open Access
    The introduction of sustainability skills into higher education curricula is a natural effect of the increasing importance of sustainability in our daily lives. Topics like green computing, sustainable design or environmental ...
  • MAX-MIN based buffer allocation for VANETs 

    Urquiza Aguiar, Luis; Vázquez Rodas, Andrés; Tripp Barba, Carolina; Aguilar Igartua, Mónica; Cruz Llopis, Luis Javier de la; Sanvicente Gargallo, Emilio (Institute of Electrical and Electronics Engineers (IEEE), 2014)
    Conference report
    Restricted access - publisher's policy
    Many proposals have studied the optimization of the EDCA mechanism used by the IEEE 802.11p MAC layer to provide QoS. In this work, we focus on the queuing process done by the different Access Categories (ACs). We propose ...
  • Utilizando certificados implícitos para asignar identidades en Overlays P2P 

    Caubet, Juan; Muñoz Tapia, José Luis; Esparza Martín, Óscar (Universidad de Alicante, 2014)
    Conference report
    Restricted access - publisher's policy
    Desde hace ños, la seguridad en las redes P2P estructuradas está siendo cuestionada, y por ello se han propuesto muchos trabajos con el objetivo de proporcionar enrutamiento seguro, sistemas de reputaci´on, control de ...
  • Tracing traitors by guessing secrets. The q-ary case 

    Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
    Conference report
    Restricted access - publisher's policy
    In this paper we present, by solving a variant of the guessing secrets problem defined by Chung, Graham and Leighton [3], a sequential traitor tracing scheme equipped with an efficient identification algorithm. Sequential ...
  • A note about the traceability properties of linear codes 

    Fernández Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus (Springer, 2007)
    Conference report
    Restricted access - publisher's policy
    We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ...
  • A new class of codes for fingerprinting schemes 

    Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
    Conference report
    Restricted access - publisher's policy
    In this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ...
  • A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings 

    Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (Springer, 2011)
    Conference report
    Restricted access - publisher's policy
    Recommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture ...
  • A privacy-preserving architecture for the semantic web based on tag suppression 

    Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (Springer, 2010)
    Conference report
    Restricted access - publisher's policy
    We propose an architecture that preserves user privacy in the semantic Web via tag suppression. In tag suppression, users may wish to tag some resources and refrain from tagging some others in order to hinder privacy ...
  • New considerations about the correct design of turbo fingerprinting codes 

    Tomás Buliart, Joan; Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel (Springer, 2008)
    Conference report
    Restricted access - publisher's policy
    Since the introduction of turbo codes in 1993, many new applications for this family of codes have been proposed. One of the latest, in the context of digital fingerprinting, is called turbo fingerprinting codes and was ...
  • Nuevo criterio para la estimación de información de estado de certificados en MANET 

    Muñoz Tapia, José Luis; Parra Arnau, Javier; Hernández Gañán, Carlos; Jáimez Moruno, Marc (Universidad Politécnica de Cartagena, 2009)
    Conference report
    Restricted access - publisher's policy
    In general, certificate status validation is a critical operation but it is particularly complex in Mobile Ad-hoc Networks (MANETs). MANET users require solutions to manage both the lack of fixed infrastructure inside ...
  • Constructions of almost secure frameproof codes based on small-bias probability spaces 

    Moreira Sánchez, José; Fernández Muñoz, Marcel; Kabatiansky, Grigory (Springer International Publishing, 2013)
    Conference report
    Restricted access - publisher's policy
    Secure frameproof code is the name given to a separating code when studied in relation to fingerprinting schemes. Separating codes are combinatorial objects that have found to be useful in many areas such as technical ...
  • Securing identity assignment using implicit certificates in P2P overlays 

    Caubet Fernández, Juan; Esparza Martín, Óscar; Alins Delgado, Juan José; Mata Diaz, Jorge; Soriano Ibáñez, Miguel (Springer International Publishing, 2013)
    Conference report
    Restricted access - publisher's policy
    The security of the Peer-to-Peer (P2P) overlays networks has been questioned for years. Many works have been proposed to provide secure routing, anonymity, reputation systems, confidentiality, etc. However, the identity ...

View more