ISG - Grup de Seguretat de la Informació
The Information Security Group (ISG) focuses its activity on the development and proposal of security services, and their deployment in telecommunication networks.
The Information Security Group (ISG) was created at the Universitat Politecnica de Catalunya (UPC) in 2002. From the very beginning, the main strategic objective of the ISG group was to be a reference security group.
Currently, the group is formed by 9 professors and after 15 years working together, the results are 163 papers in ranked journals, 321 papers in conferences, 60 competitive projects, 20 read thesis, 17 books and book chapters, 12 awards and 9 patents.
The group is leading the security and privacy tasks in the H2020 BIG IoT project including blockchain for enhancing security and privacy on the IoT. The group has also expererience in network forensics, remote tools, cloud forensics and antiforensics tools. In addition, ISG members have worked in traceability and fingerprinting codes, as well as decoding algorithms. Finally, we have experience in authentication and certification at different protocol layers.
Security protocol description through sematics
Copyright protection and digital content distribution rights
Authentication and certificate revocation
Security in wireless/wired networks (IoT, cloud, MANET, VANET, p2p, cognitive, satellite, and sensor networks)
BIGIoT: Bridging the Interoperability Gap of the Internet of Things. Commission of European Communities. H2020-688038-BIG Iot. Budget: 218.300,00 €. Dates: from 2016-01-01 to 2018-12-31. IP: Juan Hernández
ISG-SGR: Information Security Group - Consolidated Research Group. AGAUR. Agència de Gestió d'Ajuts Universitaris i de Recerca. 2017 SGR 782. Budget: 62.280,00 €. Dates: from 2017-01-01 to 2019-12-31. IP: Oscar Esparza
ANFORA: Análisis forense avanzado. Ministerio de Economía y Competitividad. TEC2015-68734-R. Budget: 138.545,00 €. Dates: from 2016-01-01 to 2018-12-31. IP: Miquel Soriano and Juan Hernández
ARPASAT: Arquitectura software para control de tasa en redes integradas satélite-terrestre. Ministerio de Economía y Competitividad. TEC2015-70197-R Budget 99.220,00 €. Dates: from 2016-01-01 to 2019-12-31.
Articles de revista 
(Asociación de Técnicos de Informática, 1995-07)
(Routledge/Taylor and Francis Group, 2018)
Part of book or chapter of book
Restricted access - publisher's policyThis paper reviews the simplified procedure proposed by Ghosn and Sivakumar to model the maximum expected traffic load effect on highway bridges and illustrates the methodology using a set of Weigh-In-Motion (WIM) data ...
Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis (2019-07-09)
Restricted access - publisher's policyk-Anonymous microaggregation is a widespread technique to address the problem of protecting the privacy of the respondents involved beyond the mere suppression of their identifiers, in applications where preserving the ...
Open AccessThe understanding of certain data often requires the collection of similar data from different places to be analysed and interpreted. Interoperability standards and ontologies, are facilitating data interchange around the ...
Incremental k-Anonymous microaggregation in large-scale electronic surveys with optimized scheduling (Institute of Electrical and Electronics Engineers (IEEE), 2018-10-15)
Open AccessImprovements in technology have led to enormous volumes of detailed personal information made available for any number of statistical studies. This has stimulated the need for anonymization techniques striving to attain a ...
Open AccessThis paper presents explicit constructions of fingerprinting codes. The proposed constructions use a class of codes called almost secure frameproof codes. An almost secure frameproof code is a relaxed version of a secure ...
Open AccessThe development of analytical models to analyze the behavior of vehicular ad hoc networks (VANETs) is a challenging aim. Adaptive methods are suitable for many algorithms (e.g., choice of forwarding paths, dynamic resource ...
Multimedia fingerprinting with noise via signature codes for weighted noisy adder channels and compressed sensing (2017)
Open AccessWe propose a new coding scheme for multimedia fingerprinting resistant to noise. Our scheme is based on signature codes for weighted noisy adder channel. The scheme (codes) can trace the entire coalition of pirates and ...
(Institute of Electrical and Electronics Engineers (IEEE), 2017)
Restricted access - publisher's policyNowadays, one of the biggest problems that challenges distributors of digital content is, precisely, protecting such content against redistribution. Those who trade with any of the multiple digital information formats ...
(Multidisciplinary Digital Publishing Institute (MDPI), 2018-01-01)
Open AccessRoad safety applications envisaged for Vehicular Ad Hoc Networks (VANETs) depend largely on the dissemination of warning messages to deliver information to concerned vehicles. The intended applications, as well as some ...
Restricted access - publisher's policyThe Internet of Things (IoT) is on the rise. Today, various IoT platforms are already available, giving access to myriads of things. Initiatives such as BIG IoT are bringing those IoT platforms together in order to form ...
Restricted access - publisher's policyThe technical contents of this paper fall within the field of statistical disclosure control (SDC), which concerns the postprocessing of the demographic portion of the statistical results of surveys containing sensitive ...