Recent Submissions

  • Cifrado en flujo basado en NLFSR 

    Gonzalo, R; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1998-07)
    Article
    Open Access
    Los mecanismos de cifrado en flujo constituyen una alternativa interesante para proporcionar confidencialidad en distintos entornos como comunicaciones móvi­les y redes de alta velocidad. En la literatura se han estudiado ...
  • Esquemas de fingerprinting para la protección de derechos de distribución 

    Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Domingo Ferrer, Josep; Sebé Feixas, Francesc (Asociación de Técnicos de Informática, 2002-12)
    Article
    Open Access
  • Risk-based decision-making for public key infrastructures using fuzzy logic 

    Hernández Gañán, Carlos; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Mata Diaz, Jorge; Alins Delgado, Juan José (2012-11-01)
    Article
    Restricted access - publisher's policy
    Public key infrastructures (PKIs) are complex systems that are responsible for giving users enough information to make reasonable trust judgments about one another. The validation of public keys is hence of great importance. ...
  • QoSatAr: a cross-layer architecture for E2E QoS provisioning over DVB-S2 broadband satellite systems 

    Rendón Morales, Elizabeth; Mata Diaz, Jorge; Alins Delgado, Juan José; Muñoz Tapia, José Luis; Esparza Martín, Óscar (2012-10-01)
    Article
    Open Access
    This article presents QoSatAr, a cross-layer architecture developed to provide end-to-end quality of service (QoS) guarantees for Internet protocol (IP) traffic over the Digital Video Broadcasting-Second generation (DVB-S2) ...
  • DECADE: Distributed Emergent Cooperation through ADaptive Evolution in mobile ad hoc networks 

    Mejía Fajardo, Marcela; Peña Traslaviña, Néstor; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Alzate Monroy, Marco (Elsevier, 2012-09)
    Article
    Restricted access - publisher's policy
    The scarce resources of a mobile ad hoc network (MANET) should not be wasted attending selfish nodes (those nodes that use resources from other nodes to send their own packets, without offering their own resources to forward ...
  • Design and implementation of a lightweight online certificate validation service 

    Muñoz Tapia, José Luis; Esparza Martín, Óscar; Forné Muñoz, Jorge; Pallarès Segarra, Esteve (2009-07)
    Article
    Restricted access - publisher's policy
    A PKI (public key infrastructure) provides for a digital certificate that can identify an individual or an organization. However, the existence of a certificate is a necessary but not sufficient evidence for its validity. ...
  • A review of trust modeling in ad hoc networks 

    Mejia, M; Peña, N; Muñoz Tapia, José Luis; Esparza Martín, Óscar (2009-01)
    Article
    Restricted access - publisher's policy
    Findings The study identifies the main components that a trust model must provide, and compares the way they are implemented. It finds that the lack of unity in the different proposed approaches makes it difficult to ...
  • Criptografía y seguridad en comunicaciones 

    Forné Muñoz, Jorge; Melus Moreno, José Luis; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1995-07)
    Article
    Open Access
  • Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis 

    Rebollo-Monedero, David; Mezher, Ahmad Mohamad; Casanova, Xavier; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2019-07-09)
    Article
    Open Access
    k-Anonymous microaggregation is a widespread technique to address the problem of protecting the privacy of the respondents involved beyond the mere suppression of their identifiers, in applications where preserving the ...
  • Knowledge sharing in the health scenario 

    LLuch Ariet, Magi; Brugues de la Torre, Albert; Vallverdú Bayés, Sisco; Pegueroles Vallés, Josep R. (2014-11-28)
    Article
    Open Access
    The understanding of certain data often requires the collection of similar data from different places to be analysed and interpreted. Interoperability standards and ontologies, are facilitating data interchange around the ...
  • Incremental k-Anonymous microaggregation in large-scale electronic surveys with optimized scheduling 

    Rebollo Monedero, David; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel; Hernández Baigorri, César (Institute of Electrical and Electronics Engineers (IEEE), 2018-10-15)
    Article
    Open Access
    Improvements in technology have led to enormous volumes of detailed personal information made available for any number of statistical studies. This has stimulated the need for anonymization techniques striving to attain a ...
  • Constructions of almost secure frameproof codes with applications to fingerprinting schemes 

    Moreira, Jose; Fernández Muñoz, Marcel; Kabatiansky, Grigory (2018-04)
    Article
    Open Access
    This paper presents explicit constructions of fingerprinting codes. The proposed constructions use a class of codes called almost secure frameproof codes. An almost secure frameproof code is a relaxed version of a secure ...

View more