ISG - Grup de Seguretat de la Informació
The Information Security Group (ISG) focuses its activity on the development and proposal of security services, and their deployment in telecommunication networks.
The Information Security Group (ISG) was created at the Universitat Politecnica de Catalunya (UPC) in 2002. From the very beginning, the main strategic objective of the ISG group was to be a reference security group.
Currently, the group is formed by 9 professors and after 15 years working together, the results are 163 papers in ranked journals, 321 papers in conferences, 60 competitive projects, 20 read thesis, 17 books and book chapters, 12 awards and 9 patents.
The group is leading the security and privacy tasks in the H2020 BIG IoT project including blockchain for enhancing security and privacy on the IoT. The group has also expererience in network forensics, remote tools, cloud forensics and antiforensics tools. In addition, ISG members have worked in traceability and fingerprinting codes, as well as decoding algorithms. Finally, we have experience in authentication and certification at different protocol layers.
Security protocol description through sematics
Copyright protection and digital content distribution rights
Authentication and certificate revocation
Security in wireless/wired networks (IoT, cloud, MANET, VANET, p2p, cognitive, satellite, and sensor networks)
BIGIoT: Bridging the Interoperability Gap of the Internet of Things. Commission of European Communities. H2020-688038-BIG Iot. Budget: 218.300,00 €. Dates: from 2016-01-01 to 2018-12-31. IP: Juan Hernández
ISG-SGR: Information Security Group - Consolidated Research Group. AGAUR. Agència de Gestió d'Ajuts Universitaris i de Recerca. 2017 SGR 782. Budget: 62.280,00 €. Dates: from 2017-01-01 to 2019-12-31. IP: Oscar Esparza
ANFORA: Análisis forense avanzado. Ministerio de Economía y Competitividad. TEC2015-68734-R. Budget: 138.545,00 €. Dates: from 2016-01-01 to 2018-12-31. IP: Miquel Soriano and Juan Hernández
ARPASAT: Arquitectura software para control de tasa en redes integradas satélite-terrestre. Ministerio de Economía y Competitividad. TEC2015-70197-R Budget 99.220,00 €. Dates: from 2016-01-01 to 2019-12-31.
Collections in this community
Articles de revista 
Restricted access - publisher's policyPublic key infrastructures (PKIs) are complex systems that are responsible for giving users enough information to make reasonable trust judgments about one another. The validation of public keys is hence of great importance. ...
QoSatAr: a cross-layer architecture for E2E QoS provisioning over DVB-S2 broadband satellite systems (2012-10-01)
Open AccessThis article presents QoSatAr, a cross-layer architecture developed to provide end-to-end quality of service (QoS) guarantees for Internet protocol (IP) traffic over the Digital Video Broadcasting-Second generation (DVB-S2) ...
Restricted access - publisher's policyThe scarce resources of a mobile ad hoc network (MANET) should not be wasted attending selfish nodes (those nodes that use resources from other nodes to send their own packets, without offering their own resources to forward ...
Restricted access - publisher's policyA PKI (public key infrastructure) provides for a digital certificate that can identify an individual or an organization. However, the existence of a certificate is a necessary but not sufficient evidence for its validity. ...
Restricted access - publisher's policyFindings The study identifies the main components that a trust model must provide, and compares the way they are implemented. It finds that the lack of unity in the different proposed approaches makes it difficult to ...
(Institute of Electrical and Electronics Engineers (IEEE), 2018)
Open AccessMost IoT systems are using or exchanging user related information between system components. This means that privacy is a key factor in these systems. Privacy, both in terms of not allowing unauthorized access to information, ...
(Asociación de Técnicos de Informática, 1995-07)
(Routledge/Taylor and Francis Group, 2018)
Part of book or chapter of book
Restricted access - publisher's policyThis paper reviews the simplified procedure proposed by Ghosn and Sivakumar to model the maximum expected traffic load effect on highway bridges and illustrates the methodology using a set of Weigh-In-Motion (WIM) data ...
Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis (2019-07-09)
Restricted access - publisher's policyk-Anonymous microaggregation is a widespread technique to address the problem of protecting the privacy of the respondents involved beyond the mere suppression of their identifiers, in applications where preserving the ...
Open AccessThe understanding of certain data often requires the collection of similar data from different places to be analysed and interpreted. Interoperability standards and ontologies, are facilitating data interchange around the ...
Incremental k-Anonymous microaggregation in large-scale electronic surveys with optimized scheduling (Institute of Electrical and Electronics Engineers (IEEE), 2018-10-15)
Open AccessImprovements in technology have led to enormous volumes of detailed personal information made available for any number of statistical studies. This has stimulated the need for anonymization techniques striving to attain a ...
Open AccessThis paper presents explicit constructions of fingerprinting codes. The proposed constructions use a class of codes called almost secure frameproof codes. An almost secure frameproof code is a relaxed version of a secure ...