Ponències/Comunicacions de congressos
Recent Submissions
-
A protocol for data exchange with free samples using smart contracts
(Jornadas de Ingeniería Telemática (JITEL), 2021)
Conference report
Open AccessDistrust between data providers and data consumers is one of the main obstacles hampering digitaldata commerce to take off. Data providers want to get paid for what they offer, while data consumers want to know exactly ... -
A construction of traceability set systems with polynomial tracing algorithm
(Institute of Electrical and Electronics Engineers (IEEE), 2019)
Conference report
Open AccessA family F of w-subsets of a finite set X is called a set system with the identifiable parent property if for any w-subset contained in the union of some t sets, called traitors, of F at least one of these sets can be ... -
A new class of traceability schemes
(2019)
Conference report
Restricted access - publisher's policyA new class of tracing traitors schemes with traceability property which combines ideas of nonbinary IPP-codes and IPP set systems is proposed. A detailed comparison of the proposed scheme with previously known traceability ... -
Privacy risk analysis in the IoT domain
(Institute of Electrical and Electronics Engineers (IEEE), 2018)
Conference report
Open AccessMost IoT systems are using or exchanging user related information between system components. This means that privacy is a key factor in these systems. Privacy, both in terms of not allowing unauthorized access to information, ... -
Multimedia fingerprinting with noise via signature codes for weighted noisy adder channels and compressed sensing
(2017)
Conference report
Open AccessWe propose a new coding scheme for multimedia fingerprinting resistant to noise. Our scheme is based on signature codes for weighted noisy adder channel. The scheme (codes) can trace the entire coalition of pirates and ... -
Improved existence bounds on IPP codes using the Clique Lovász Local Lemma
(Institute of Electrical and Electronics Engineers (IEEE), 2017)
Conference report
Restricted access - publisher's policyNowadays, one of the biggest problems that challenges distributors of digital content is, precisely, protecting such content against redistribution. Those who trade with any of the multiple digital information formats ... -
On the road to secure and privacy-preserving IoT ecosystems
(Springer, 2017)
Conference report
Restricted access - publisher's policyThe Internet of Things (IoT) is on the rise. Today, various IoT platforms are already available, giving access to myriads of things. Initiatives such as BIG IoT are bringing those IoT platforms together in order to form ... -
Computational improvements in parallelized k-anonymous microaggregation of large databases
(2017)
Conference report
Restricted access - publisher's policyThe technical contents of this paper fall within the field of statistical disclosure control (SDC), which concerns the postprocessing of the demographic portion of the statistical results of surveys containing sensitive ... -
Códigos de fingerprinting binarios. Nuevos paradigmas de identificación
(2016)
Conference report
Open AccessLos códigos con la Identifiable Parent Property garantizan, con probabilidad 1, la identificación de como mínimo de uno de los traidores en sistemas de Traitor Tracing. Desafortunadamente, para el caso de códigos binarios ... -
A stochastic optimization model for the placement of road site units
(Springer, 2015)
Conference lecture
Restricted access - publisher's policyIn this paper, we propose a simple and scalable optimization model for the deployment of road site units (RSUs). The model takes advantage of the inherent stochasticity provided by the vehicles’ movements by using mobility ... -
Almost IPP-codes or provably secure digital fingerprinting codes
(Institute of Electrical and Electronics Engineers (IEEE), 2015)
Conference report
Restricted access - publisher's policyCodes with the Identifiable Parent Property (IPP codes) form a very useful tool in traitor tracing schemes since they guarantee (with probability 1) identification of at least one of the traitors. We consider a natural ... -
MobilitApp: analysing mobility data of citizens in the metropolitan area of Barcelona
(Springer, 2015)
Conference lecture
Restricted access - publisher's policyMobilitApp is a platform designed to provide smart mobility services in urban areas. It is designed to help citizens and transport authorities alike. Citizens will be able to access the MobilitApp mobile application and ...