Ponències/Comunicacions de congressos: Recent submissions
Now showing items 1-12 of 19
-
Privacy risk analysis in the IoT domain
(Institute of Electrical and Electronics Engineers (IEEE), 2018)
Conference report
Open AccessMost IoT systems are using or exchanging user related information between system components. This means that privacy is a key factor in these systems. Privacy, both in terms of not allowing unauthorized access to information, ... -
Multimedia fingerprinting with noise via signature codes for weighted noisy adder channels and compressed sensing
(2017)
Conference report
Open AccessWe propose a new coding scheme for multimedia fingerprinting resistant to noise. Our scheme is based on signature codes for weighted noisy adder channel. The scheme (codes) can trace the entire coalition of pirates and ... -
Improved existence bounds on IPP codes using the Clique Lovász Local Lemma
(Institute of Electrical and Electronics Engineers (IEEE), 2017)
Conference report
Restricted access - publisher's policyNowadays, one of the biggest problems that challenges distributors of digital content is, precisely, protecting such content against redistribution. Those who trade with any of the multiple digital information formats ... -
On the road to secure and privacy-preserving IoT ecosystems
(Springer, 2017)
Conference report
Restricted access - publisher's policyThe Internet of Things (IoT) is on the rise. Today, various IoT platforms are already available, giving access to myriads of things. Initiatives such as BIG IoT are bringing those IoT platforms together in order to form ... -
Computational improvements in parallelized k-anonymous microaggregation of large databases
(2017)
Conference report
Restricted access - publisher's policyThe technical contents of this paper fall within the field of statistical disclosure control (SDC), which concerns the postprocessing of the demographic portion of the statistical results of surveys containing sensitive ... -
Códigos de fingerprinting binarios. Nuevos paradigmas de identificación
(2016)
Conference report
Open AccessLos códigos con la Identifiable Parent Property garantizan, con probabilidad 1, la identificación de como mínimo de uno de los traidores en sistemas de Traitor Tracing. Desafortunadamente, para el caso de códigos binarios ... -
A stochastic optimization model for the placement of road site units
(Springer, 2015)
Conference lecture
Restricted access - publisher's policyIn this paper, we propose a simple and scalable optimization model for the deployment of road site units (RSUs). The model takes advantage of the inherent stochasticity provided by the vehicles’ movements by using mobility ... -
Almost IPP-codes or provably secure digital fingerprinting codes
(Institute of Electrical and Electronics Engineers (IEEE), 2015)
Conference report
Restricted access - publisher's policyCodes with the Identifiable Parent Property (IPP codes) form a very useful tool in traitor tracing schemes since they guarantee (with probability 1) identification of at least one of the traitors. We consider a natural ... -
MobilitApp: analysing mobility data of citizens in the metropolitan area of Barcelona
(Springer, 2015)
Conference lecture
Restricted access - publisher's policyMobilitApp is a platform designed to provide smart mobility services in urban areas. It is designed to help citizens and transport authorities alike. Citizens will be able to access the MobilitApp mobile application and ... -
Potential mass surveillance and privacy violations in proximity-based social applications
(IEEE Press, 2016)
Conference lecture
Open AccessProximity-based social applications let users interact with people that are currently close to them, by revealing some information about their preferences and whereabouts. This information is acquired through passive ... -
On Web user tracking: how third-party http requests track users' browsing patterns for personalised advertising
(2016)
Conference report
Open AccessOn today's Web, users trade access to their private data for content and services. Advertising sustains the business model of many websites and applications. Efficient and successful advertising relies on predicting ... -
Enabling secure multicast using a new java LKH rekeying tool
(2003)
Conference report
Restricted access - publisher's policyThe most promising protocols for multicast key management are those based on multilevel logical binary trees of Key Encryption Keys (KEKs). One of these protocols, Logical Key Hierarchy (LKH) has become a standard de facto ...