The Information Security Group (ISG) focuses its activity on the development and proposal of security services, and their deployment in telecommunication networks.
The Information Security Group (ISG) was created at the Universitat Politecnica de Catalunya (UPC) in 2002. From the very beginning, the main strategic objective of the ISG group was to be a reference security group.
Currently, the group is formed by 9 professors and after 15 years working together, the results are 163 papers in ranked journals, 321 papers in conferences, 60 competitive projects, 20 read thesis, 17 books and book chapters, 12 awards and 9 patents.
The group is leading the security and privacy tasks in the H2020 BIG IoT project including blockchain for enhancing security and privacy on the IoT. The group has also expererience in network forensics, remote tools, cloud forensics and antiforensics tools. In addition, ISG members have worked in traceability and fingerprinting codes, as well as decoding algorithms. Finally, we have experience in authentication and certification at different protocol layers.


Blockchain technologies
Network forensics
Security protocol description through sematics
Copyright protection and digital content distribution rights
Authentication and certificate revocation
Secure identification
Reputation systems
Security in wireless/wired networks (IoT, cloud, MANET, VANET, p2p, cognitive, satellite, and sensor networks)


BIGIoT: Bridging the Interoperability Gap of the Internet of Things. Commission of European Communities. H2020-688038-BIG Iot. Budget: 218.300,00 €. Dates: from 2016-01-01 to 2018-12-31. IP: Juan Hernández
ISG-SGR: Information Security Group - Consolidated Research Group. AGAUR. Agència de Gestió d'Ajuts Universitaris i de Recerca. 2017 SGR 782. Budget: 62.280,00 €. Dates: from 2017-01-01 to 2019-12-31. IP: Oscar Esparza
ANFORA: Análisis forense avanzado. Ministerio de Economía y Competitividad. TEC2015-68734-R. Budget: 138.545,00 €. Dates: from 2016-01-01 to 2018-12-31. IP: Miquel Soriano and Juan Hernández
ARPASAT: Arquitectura software para control de tasa en redes integradas satélite-terrestre. Ministerio de Economía y Competitividad. TEC2015-70197-R Budget 99.220,00 €. Dates: from 2016-01-01 to 2019-12-31.

Oscar Esparza

Recent Submissions

  • Cifrado en flujo basado en NLFSR 

    Gonzalo, R; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1998-07)
    Open Access
    Los mecanismos de cifrado en flujo constituyen una alternativa interesante para proporcionar confidencialidad en distintos entornos como comunicaciones móvi­les y redes de alta velocidad. En la literatura se han estudiado ...
  • Esquemas de fingerprinting para la protección de derechos de distribución 

    Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Domingo Ferrer, Josep; Sebé Feixas, Francesc (Asociación de Técnicos de Informática, 2002-12)
    Open Access
  • Risk-based decision-making for public key infrastructures using fuzzy logic 

    Hernández Gañán, Carlos; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Mata Diaz, Jorge; Alins Delgado, Juan José (2012-11-01)
    Restricted access - publisher's policy
    Public key infrastructures (PKIs) are complex systems that are responsible for giving users enough information to make reasonable trust judgments about one another. The validation of public keys is hence of great importance. ...
  • QoSatAr: a cross-layer architecture for E2E QoS provisioning over DVB-S2 broadband satellite systems 

    Rendón Morales, Elizabeth; Mata Diaz, Jorge; Alins Delgado, Juan José; Muñoz Tapia, José Luis; Esparza Martín, Óscar (2012-10-01)
    Open Access
    This article presents QoSatAr, a cross-layer architecture developed to provide end-to-end quality of service (QoS) guarantees for Internet protocol (IP) traffic over the Digital Video Broadcasting-Second generation (DVB-S2) ...
  • DECADE: Distributed Emergent Cooperation through ADaptive Evolution in mobile ad hoc networks 

    Mejía Fajardo, Marcela; Peña Traslaviña, Néstor; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Alzate Monroy, Marco (Elsevier, 2012-09)
    Restricted access - publisher's policy
    The scarce resources of a mobile ad hoc network (MANET) should not be wasted attending selfish nodes (those nodes that use resources from other nodes to send their own packets, without offering their own resources to forward ...
  • Design and implementation of a lightweight online certificate validation service 

    Muñoz Tapia, José Luis; Esparza Martín, Óscar; Forné Muñoz, Jorge; Pallarès Segarra, Esteve (2009-07)
    Restricted access - publisher's policy
    A PKI (public key infrastructure) provides for a digital certificate that can identify an individual or an organization. However, the existence of a certificate is a necessary but not sufficient evidence for its validity. ...
  • A review of trust modeling in ad hoc networks 

    Mejia, M; Peña, N; Muñoz Tapia, José Luis; Esparza Martín, Óscar (2009-01)
    Restricted access - publisher's policy
    Findings The study identifies the main components that a trust model must provide, and compares the way they are implemented. It finds that the lack of unity in the different proposed approaches makes it difficult to ...
  • Privacy risk analysis in the IoT domain 

    Hernández Serrano, Juan; Muñoz Tapia, José Luis; León Abarca, Olga; Mikkelsen, Lars; Schwefel, Hans-Peter; Bröring, Arne (Institute of Electrical and Electronics Engineers (IEEE), 2018)
    Conference report
    Open Access
    Most IoT systems are using or exchanging user related information between system components. This means that privacy is a key factor in these systems. Privacy, both in terms of not allowing unauthorized access to information, ...
  • Criptografía y seguridad en comunicaciones 

    Forné Muñoz, Jorge; Melus Moreno, José Luis; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1995-07)
    Open Access
  • Simplified probabilistic model for maximum traffic load from weigh-in-motion data 

    Soriano Ibáñez, Miguel; Casas Rius, Joan Ramon; Ghosn, Michel (Routledge/Taylor and Francis Group, 2018)
    Part of book or chapter of book
    Restricted access - publisher's policy
    This paper reviews the simplified procedure proposed by Ghosn and Sivakumar to model the maximum expected traffic load effect on highway bridges and illustrates the methodology using a set of Weigh-In-Motion (WIM) data ...
  • Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis 

    Rebollo-Monedero, David; Mezher, Ahmad Mohamad; Casanova, Xavier; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2019-07-09)
    Open Access
    k-Anonymous microaggregation is a widespread technique to address the problem of protecting the privacy of the respondents involved beyond the mere suppression of their identifiers, in applications where preserving the ...
  • Knowledge sharing in the health scenario 

    LLuch Ariet, Magi; Brugues de la Torre, Albert; Vallverdú Bayés, Sisco; Pegueroles Vallés, Josep R. (2014-11-28)
    Open Access
    The understanding of certain data often requires the collection of similar data from different places to be analysed and interpreted. Interoperability standards and ontologies, are facilitating data interchange around the ...

View more