Ara es mostren els items 25-36 de 64

    • Security analysis of a protocol based on multiagents systems for clinical data exchange 

      Brugues de la Torre, Albert; LLuch Ariet, Magi; Pegueroles Vallés, Josep R. (Institute of Electrical and Electronics Engineers (IEEE), 2013)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      This work describes the security architecture of MOSAIC, a protocol for clinical data exchange with multilateral agreement support. The blocks of the architecture are derived from a series of common attacks that can be ...
    • Designing CDIO capstone projects: a systems thinking approach 

      Alarcón Cot, Eduardo José; Bou Balust, Elisenda; Camps Carmona, Adriano José; Bragós Bardia, Ramon; Oliveras Vergés, Albert; Pegueroles Vallés, Josep R.; Sayrol Clols, Elisa; Marqués Acosta, Fernando (2013)
      Text en actes de congrés
      Accés obert
      Given the all-pervasiveness of Systems thinking -which consists of thinking about things as systemsas a way of reasoning, in this work we will describe its application to make an interpretation of how to conceive and ...
    • On the self-similarity nature of the revocation data 

      Gañán, Carlos; Mata Diaz, Jorge; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Alins Delgado, Juan José (Springer, 2012)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      One of the hardest tasks of a Public Key Infrastructure (PKI) is to manage revocation. Different revocation mechanisms have been proposed to invalidate the credentials of compromised or misbe- having users. All these ...
    • Multimedia copyright protection platform demonstrator 

      Soriano Ibáñez, Miguel; Fernández Muñoz, Marcel; Sayrol Clols, Elisa; Tomás Buliart, Joan; Casanellas, Joan; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan (Springer, 2005)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      The work presented in this paper consists in the development of a portable platform to protect the copyright and distribution rights of digital contents, and empirically demonstrate the capacity of several marking and ...
    • Building hierarchical public key infrastructures in mobile ad-hoc networks 

      Satizábal Echavarría, Isabel Cristina; Forné Muñoz, Jorge; Hernández Serrano, Juan; Pegueroles Vallés, Josep R. (Springer, 2006)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Dynamism of mobile ad-hoc networks implies changing trust relationships among their nodes that can be established using peer-to-peer PKIs. Here, certification paths can be built although part of the infrastructure is ...
    • Parallelization of the interpolation process in the Koetter-Vardy soft-decision list decoding algorithm 

      Moreira Sánchez, José; Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel (2012)
      Comunicació de congrés
      Accés obert
      List decoding is a decoding strategy that provides a set of codewords at the output of the channel decoder. Since this technique corrects errors beyond the correcting bound of the code, upper layers in the application or ...
    • RAR: Un mecanismo "Risk-Aware" para redes vehiculares 

      Hernández Gañán, Carlos; Muñoz Tapia, José Luis; Hinarejos Campos, M. Francisca; Isern Deyà, Andreu; Alins Delgado, Juan José (2012)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Las redes vehiculares requieren de alg ́ un meca- nismo para autenticar los mensajes, identificar a los veh ́ ıculos leg ́ ıtimos y sacar de la red aqu ́ ellos que no presenten un comportamiento adecuado. La ...
    • RAR: Risk aware revocation mechanism for vehicular networks 

      Hernández Gañán, Carlos; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Mata Diaz, Jorge; Alins Delgado, Juan José; Silva Cárdenas, Carlos; Bartra Gardini, Gumercindo (2012)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Vehicular Ad Hoc Networks (VANETs) require some mechanism to authenticate messages, identify valid vehicles, and remove misbehaving ones. A Public Key Infrastructure (PKI) can provide this functionality using digital ...
    • Almost separating and almost secure frameproof codes 

      Fernández Muñoz, Marcel; Kabatiansky, Grigory; Moreira Sánchez, José (2011)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      The theory of separating codes has been applied in several areas of science ranging from automata synthesis to the protection of distribution rights. In this paper, we introduce a relaxed version of separating and secure ...
    • Impact of the revocation service in PKI prices 

      Hernández Gañán, Carlos; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Mata Diaz, Jorge; Alins Delgado, Juan José (2012)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      The ability to communicate securely is needed for many network applications. Public key infrastructure (PKI) is the most extended solution to verify and confirm the identity of each party involved in any secure transaction ...
    • Available bandwidth-aware routing in urban vehicular ad-hoc networks 

      Tripp Barba, Carolina; Mezher, Ahmad Mohamad; Aguilar Igartua, Mónica; Guérin-Lassous, Isabelle; Sarr, Cheikh (2012)
      Comunicació de congrés
      Accés obert
      Vehicular communication for intelligent transportation systems will provide safety, comfort for passengers, and more efficient travels. This type of network has the advantage to warn drivers of any event occurred in the ...
    • Supporting mobility in GKM over ad-hoc network using a decentralized and spontaneous algorithm 

      Hernández Serrano, Juan; Pegueroles Vallés, Josep R.; Soriano Ibáñez, Miguel (Springer, 2007)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Recently there have been a noticeable growth of ad-hoc environments with peer-to-peer relations. Such environments decentralize the services in order to share their cost between their members. As a result, a decentralized ...