Ponències/Comunicacions de congressos: Enviaments recents
Ara es mostren els items 25-36 de 64
-
Security analysis of a protocol based on multiagents systems for clinical data exchange
(Institute of Electrical and Electronics Engineers (IEEE), 2013)
Text en actes de congrés
Accés restringit per política de l'editorialThis work describes the security architecture of MOSAIC, a protocol for clinical data exchange with multilateral agreement support. The blocks of the architecture are derived from a series of common attacks that can be ... -
Designing CDIO capstone projects: a systems thinking approach
(2013)
Text en actes de congrés
Accés obertGiven the all-pervasiveness of Systems thinking -which consists of thinking about things as systemsas a way of reasoning, in this work we will describe its application to make an interpretation of how to conceive and ... -
On the self-similarity nature of the revocation data
(Springer, 2012)
Text en actes de congrés
Accés restringit per política de l'editorialOne of the hardest tasks of a Public Key Infrastructure (PKI) is to manage revocation. Different revocation mechanisms have been proposed to invalidate the credentials of compromised or misbe- having users. All these ... -
Multimedia copyright protection platform demonstrator
(Springer, 2005)
Text en actes de congrés
Accés restringit per política de l'editorialThe work presented in this paper consists in the development of a portable platform to protect the copyright and distribution rights of digital contents, and empirically demonstrate the capacity of several marking and ... -
Building hierarchical public key infrastructures in mobile ad-hoc networks
(Springer, 2006)
Text en actes de congrés
Accés restringit per política de l'editorialDynamism of mobile ad-hoc networks implies changing trust relationships among their nodes that can be established using peer-to-peer PKIs. Here, certification paths can be built although part of the infrastructure is ... -
Parallelization of the interpolation process in the Koetter-Vardy soft-decision list decoding algorithm
(2012)
Comunicació de congrés
Accés obertList decoding is a decoding strategy that provides a set of codewords at the output of the channel decoder. Since this technique corrects errors beyond the correcting bound of the code, upper layers in the application or ... -
RAR: Un mecanismo "Risk-Aware" para redes vehiculares
(2012)
Text en actes de congrés
Accés restringit per política de l'editorialLas redes vehiculares requieren de alg ́ un meca- nismo para autenticar los mensajes, identificar a los veh ́ ıculos leg ́ ıtimos y sacar de la red aqu ́ ellos que no presenten un comportamiento adecuado. La ... -
RAR: Risk aware revocation mechanism for vehicular networks
(2012)
Text en actes de congrés
Accés restringit per política de l'editorialVehicular Ad Hoc Networks (VANETs) require some mechanism to authenticate messages, identify valid vehicles, and remove misbehaving ones. A Public Key Infrastructure (PKI) can provide this functionality using digital ... -
Almost separating and almost secure frameproof codes
(2011)
Text en actes de congrés
Accés restringit per política de l'editorialThe theory of separating codes has been applied in several areas of science ranging from automata synthesis to the protection of distribution rights. In this paper, we introduce a relaxed version of separating and secure ... -
Impact of the revocation service in PKI prices
(2012)
Text en actes de congrés
Accés restringit per política de l'editorialThe ability to communicate securely is needed for many network applications. Public key infrastructure (PKI) is the most extended solution to verify and confirm the identity of each party involved in any secure transaction ... -
Available bandwidth-aware routing in urban vehicular ad-hoc networks
(2012)
Comunicació de congrés
Accés obertVehicular communication for intelligent transportation systems will provide safety, comfort for passengers, and more efficient travels. This type of network has the advantage to warn drivers of any event occurred in the ... -
Supporting mobility in GKM over ad-hoc network using a decentralized and spontaneous algorithm
(Springer, 2007)
Text en actes de congrés
Accés restringit per política de l'editorialRecently there have been a noticeable growth of ad-hoc environments with peer-to-peer relations. Such environments decentralize the services in order to share their cost between their members. As a result, a decentralized ...