Go to the content (press return)

Scientific and technological production

1 to 50 of 99 results
 
  • Information security group

     Forne, J.; Fernandez, M.; Pegueroles, J.; Esparza, O.; Muñoz, J.; Hernández-Serrano, J.; Leon, O.; Aguilar, M.; Rebollo-Monedero, D.; Vera-del-Campo, J.; Pallares, E.; Soriano, M.
    Competitive project
  • On codes for Traceability Schemes: Constructions and Bounds  Open access

     Moreira, J.
    Universitat Politècnica de Catalunya
    Theses
  • Constructions of almost secure frameproof codes based on small-bias probability spaces

     Moreira, J.; Fernandez, M.; Kabatiansky, G.
    International Workshop on Security
    p. 53-67
    DOI: 10.1007/978-3-642-41383-4_4
    Presentation's date: 2013-11
    Presentation of work at congresses
  • On the relationship between the traceability properties of Reed-Solomon codes

     Moreira, J.; Fernandez, M.; Soriano, M.
    Advances in mathematics of communications
    Vol. 6, num. 4, p. 467-478
    DOI: 10.3934/amc.2012.6.467
    Date of publication: 2012-11
    Journal article
  • Parallelization of the interpolation process in the Koetter-Vardy soft-decision list decoding algorithm  Open access

     Moreira, J.; Fernandez, M.; Soriano, M.
    International Conference on Computational and Mathematical Methods in Science and Engineering
    p. 1102-1110
    Presentation's date: 2012-07-02
    Presentation of work at congresses
    Access to the full text
  • Códigos para la protección de la propiedad industrial

     Rico, F.; Soriano, M.; Fernandez, M.
    Competitive project
  • Use of turbo codes with low-rate convolutional constituent codes in fingerprinting scenarios

     Tomas, J.; Gómez-Muro, A.; Fernandez, M.; Soriano, M.
    Information Forensics and Security
    p. 1-6
    DOI: 10.1109/WIFS.2011.6123142
    Presentation's date: 2011-11-29
    Presentation of work at congresses
  • C/033194/10 Cooperación Institucional entre las universidades AAU y UPC y académica en el ámbito de las TIC

     Torres, L.; Vidal, E.; Vidal, J.; Serrat, J.; Aguilar, M.; Fernandez, M.
    Competitive project
  • Identifying traitors using the Koetter - Vardy algorithm

     Fernandez, M.; Moreira, J.; Soriano, M.
    IEEE transactions on information theory
    Vol. 57, num. 2, p. 692-704
    DOI: 10.1109/TIT.2010.2095194
    Date of publication: 2011-02
    Journal article
  • Almost separating and almost secure frameproof codes

     Fernandez, M.; Kabatiansky, G.; Moreira, J.
    IEEE International Symposium on Information Theory
    p. 2696-2700
    DOI: 10.1109/ISIT.2011.6034061
    Presentation's date: 2011
    Presentation of work at congresses
  • 12th International Conference on Information and Comunications Security

     Muñoz, J.; Pegueroles, J.; Fernandez, M.; Forne, J.; Soriano, M.
    Competitive project
  • A family of asymptotically good binary fingerprinting codes

     Cotrina, J.; Fernandez, M.
    IEEE transactions on information theory
    Vol. 56, num. 10, p. 5335-5343
    DOI: 10.1109/TIT.2010.2059470
    Date of publication: 2010-10
    Journal article
  • Traitor tracing over YouTube video service-proof of concept

     Tomas, J.; Fernandez, M.; Soriano, M.
    Telecommunication systems
    Vol. 45, num. 1, p. 47-60
    DOI: 10.1007/s11235-009-9236-z
    Date of publication: 2010-09
    Journal article
  • A note about the identifier parent property in Reed-Solomon codes

     Fernandez, M.; Cotrina, J.; Soriano, M.; Domingo, N.
    Computers and security
    Vol. 29, num. 5, p. 628-635
    DOI: 10.1016/j.cose.2009.12.012
    Date of publication: 2010-07
    Journal article
  • Identificació de punts de col·laboració amb la Wollo University

     Vidal, E.; Torres, L.; Aguilar, M.; Prat, L.; Muñoz, X.; Fernandez, M.; Hesselbach, X.; Aragones, X.
    Competitive project
  • GRUP SEGURETAT DE LA INFORMACIÓ (ISG)

     Pallares, E.; Leon, O.; Hernández-Serrano, J.; Pegueroles, J.; Forne, J.; Fernandez, M.; Esparza, O.; Muñoz, J.; Parra-Arnau, J.; Soriano, M.
    Competitive project
  • On the IPP properties of Reed-Solomon codes

     Fernandez, M.; Cotrina, J.; Soriano, M.; Domingo, N.
    International Information Security Conference
    p. 87-97
    DOI: 10.1007/978-3-642-01244-0_8
    Presentation's date: 2009-05
    Presentation of work at congresses
  • PROVISION SEGURA DE SERVICIOS SOBRE EL P2P (P2PSEC)

     Mata, J.; Pegueroles, J.; Fernandez, M.; Leon, O.; de la Cruz Llopis, Luis J.; Rico, F.; Hernández-Serrano, J.; Forga, J.; Esparza, O.; Martin, I.V.; Alins, J.; Muñoz, J.; Soriano, M.
    Competitive project
  • Improvement of Collusion Secure Convolutional Fingerprinting Information Codes

     Tomas, J.; Fernandez, M.; Soriano, M.
    Lecture notes in computer science
    Vol. 4883, p. 76-88
    DOI: 10.1007/978-3-642-10230-1_6
    Date of publication: 2009
    Journal article
  • On the IPP Properties of Reed-Solomon Codes

     Fernandez, M.; Cotrina, J.; Soriano, M.; Domingo, N.
    IFIP Advances in Information and Communication Technology
    Vol. 297, num. -, p. 87-97
    DOI: 10.1007/978-3-642-01244-0_8
    Date of publication: 2009-01
    Journal article
  • New considerations about the correct design of turbo fingerprinting codes

     Tomas, J.; Fernandez, M.; Soriano, M.
    European Symposium on Research in Computer Security
    p. 501-516
    DOI: 10.1007/978-3-540-88313-5_32
    Presentation's date: 2008-10
    Presentation of work at congresses
  • New Considerations about the Correct Design of Turbo Fingerprinting Codes

     Tomas, J.; Fernandez, M.; Soriano, M.
    Lecture notes in computer science
    Vol. 5283, p. 501-516
    DOI: 10.1007/978-3-540-88313-5_32
    Date of publication: 2008-01
    Journal article
  • A Note About the Traceability Properties of Linear Codes

     Fernandez, M.; Cotrina, J.; Soriano, M.; Domingo, N.
    Lecture notes in computer science
    Vol. 4817, p. 251-258
    DOI: 10.1007/978-3-540-76788-6_20
    Date of publication: 2007-11
    Journal article
  • A note about the traceability properties of linear codes

     Fernandez, M.; Cotrina, J.; Soriano, M.; Domingo, N.
    International Conference on Information Security and Cryptology
    p. 251-258
    DOI: 10.1007/978-3-540-76788-6_20
    Presentation's date: 2007-11
    Presentation of work at congresses
  • Ares. team for Advanced REsearch on information Security and privacy

     Muñoz, J.; Domingo, J.; Soriano, M.; Forne, J.; Pegueroles, J.; Hernández-Serrano, J.; Pallares, E.; Fernandez, M.
    Competitive project
  • Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems

     Tomàs, J.; Fernandez, M.; Soriano, M.
    Lecture notes in computer science
    Vol. 4694, p. 992-999
    DOI: 10.1007/978-3-540-74829-8_121
    Date of publication: 2007-09
    Journal article
  • Tracing illegal redistribution using errors-and-erasures and side information decoding algorithms

     Fernandez, M.; Soriano, M.; Cotrina, J.
    IET information security
    Vol. 1, num. 2, p. 83-90
    DOI: 10.1049/iet-ifs:20055145
    Date of publication: 2007-06
    Journal article
  • Improvement of Collusion Secure Convolutional Fingerprinting Information Codes

     Tomas, J.; Fernandez, M.; Soriano, M.
    Second International Conference on Information Theoretic Security
    p. 79-94
    Presentation of work at congresses
  • On the traceability properties of linear and Chinese Remainder Theorem codes

     Cotrina, J.; Fernandez, M.; Soriano, M.; Domingo, N.
    10th International Conference on Information Security and Cryptology
    p. 251-258
    Presentation of work at congresses
  • A class of non-linear asymptotic fingerprinting codes with epsilon-error

     Fernandez, M.; Cotrina, J.; Soriano, M.
    Online information review
    Vol. 31, num. 1, p. 22-37
    DOI: 10.1108/14684520710731010
    Date of publication: 2007-01
    Journal article
  • Using informed coding and informed embedding to design robust fingerprinting embedding systems

     Tomas, J.; Fernandez, M.; Soriano, M.
    International Conference on Knowledge-Based and Intelligent Information and Engineering Systems
    p. 992-999
    Presentation of work at congresses
  • Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes

     Fernandez, M.; Cotrina, J.
    Lecture notes in computer science
    Vol. 4318, p. 289-303
    Date of publication: 2006-11
    Journal article
  • Soft Decision Decoding of Boneh-Shaw Fingerprinting Codes

     Schaatun, H.; Fernandez, M.
    IEICE transactions on fundamentals of electronics communications and computer
    Vol. E89-A, num. 10, p. 2603-2608
    Date of publication: 2006-10
    Journal article
  • A practical solution for distribution rights protection in multicast environments

     Pegueroles, J.; Fernandez, M.; Rico, F.; Soriano, M.
    Lecture notes in computer science
    Vol. 3982, num. 1, p. 527-536
    DOI: 10.1007/11751595_56
    Date of publication: 2006-05
    Journal article
  • Multicast Copyright Protection System Based on a Trusted Soft-Engine

     Pegueroles, J.; Fernandez, M.; Rico, F.; Soriano, M.
    International journal of business data communications and networking
    Vol. 2, num. 2, p. 55-67
    DOI: 10.4018/jbdcn.2006040104
    Date of publication: 2006-04
    Journal article
  • Secure E-Commerce Distributed Platform of Multimedia Contents over Heterogeneous Networks (SECCONET)

     de la Cruz Llopis, Luis J.; Soriano, M.; Aguilar, M.; Esparza, O.; Pegueroles, J.; Fernandez, M.; Rico, F.; Mata, J.; Forga, J.; Alins, J.; Muñoz, J.; Martin, I.V.; Hernández-Serrano, J.
    Competitive project
  • e-Representative

     Soriano, M.; Forne, J.; Pegueroles, J.; Fernandez, M.; Muñoz, J.; Esparza, O.
    Competitive project
  • Familias de códigos localizadores basadas en el Teorema Chino del Resto

     Cotrina, J.; Fernandez, M.; Soriano, M.
    IX Reunion Española sobre Criptologia y Seguridad de la Informacion
    p. 361-369
    Presentation of work at congresses
  • Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes

     Fernandez, M.; Cotrina, J.
    Second SKLOIS Conference, Inscrypt 2006
    p. 289-303
    Presentation of work at congresses
  • Families of traceability codes based on the Chinese Remainder Theorem

     Cotrina, J.; Fernandez, M.; Casademont, J.
    2006 IEEE Information Theory Workshop
    p. 121-125
    Presentation of work at congresses
  • Watermarking de Software: Estado del arte

     Tomàs, J.; Ciurana, M.; Fernandez, M.; Soriano, M.
    IX Reunion Española sobre Criptologia y Seguridad de la Informacion
    p. 142-157
    Presentation of work at congresses
  • Obtaining Traceability Codes from Chinese Reminder Theorem Codes

     Fernandez, M.; Soriano, M.; Cotrina, J.
    IEICE transactions on fundamentals of electronics communications and computer
    Vol. E89, num. 1, p. 227-230
    Date of publication: 2006-01
    Journal article
  • A practical solution for distribution rights protection in multicast environments

     Pegueroles, J.; Fernandez, M.; Rico, F.; Soriano, M.
    The 2006 International Conference on Computational Science and its Applications
    p. 527-536
    Presentation of work at congresses
  • SECONNET. Plataforma Distribuida Para Comercio Electronico Seguro De Contenidos Multimedia Sobre Redes Heterogeneas De Banda Ancha

     Soriano, M.; Aguilar, M.; Mata, J.; Esparza, O.; Muñoz, J.; Pegueroles, J.; Postigo-Boix, M.; Hernández-Serrano, J.; Fernandez, M.; Martin, I.V.
    Competitive project
  • Grupo de investigación consolidado GRC-ISG

     Soriano, M.; Pallares, E.; Esparza, O.; Muñoz, J.; Forne, J.; Fernandez, M.; Hernández-Serrano, J.
    Competitive project
  • A new class of codes for fingerprinting schemes

     Fernandez, M.; Soriano, M.; Cotrina, J.
    Information Security Practice and Experience Conference
    p. 398-409
    DOI: 10.1007/978-3-540-31979-5_34
    Presentation's date: 2005-09-20
    Presentation of work at congresses
  • Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information

     Soriano, M.; Fernandez, M.; Cotrina, J.
    Lecture notes in computer science
    Vol. 3710, p. 231-243
    DOI: 10.1007/11551492_18
    Date of publication: 2005-09
    Journal article
  • A Family of Collusion 2-Secure Codes

     Cotrina, J.; Fernandez, M.; Soriano, M.
    Lecture notes in computer science
    Vol. 3727, p. 387-397
    DOI: 10.1007/11558859_28
    Date of publication: 2005-06
    Journal article
  • Practical Scenarios for the van Trung-Martirosyan Codes

     Fernandez, M.; Soriano, M.; Cotrina, J.
    Lecture notes in computer science
    Vol. 3481, p. 624-633
    DOI: 10.1007/11424826_66
    Date of publication: 2005-05
    Journal article