Graphic summary
  • Show / hide key
  • Information


Scientific and technological production
  •  

1 to 49 of 49 results
  • A semi-dynamic, game based and interference aware channel assignment for multi-radio multi-channel wireless mesh networks

     Amiri Nezhad, Maryam; Cerdà Alabern, Llorenç; Bellalta Jimenez, Boris; Guerrero Zapata, Manel
    International journal of Ad Hoc and ubiquitous computing
    Date of publication: 2013-01
    Journal article

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    Channel assignment (CA) has been extensively researched for multi-radio wireless mesh networks (WMNs), but it is still very challenging when it comes to its implementation. In this paper we propose a semi-dynamic and distributed CA mechanism called semi-dynamic interference aware channel assignment (SICA) based on game theory formulation. SICA is an interference aware, distributed CA which preserves the network connectivity without relying on a common channel nor central node for coordination between mesh routers. SICA applies a real time learner algorithm which assumes that nodes do not have perfect information about the network topology. To the best of our knowledge this is the first game formulation of CA which takes the co-channel interference into account. We have simulated SICA and compared against other channel assignment mechanisms proposed in the literature. Simulation results show that SICA outperforms other mechanisms.

  • Channel Assignment protocols for Multi-Radio Multi-Channel Wireless Mesh Netwworks  Open access

     Amiri Nezhad, Maryam
    Defense's date: 2013-01-30
    Department of Computer Architecture, Universitat Politècnica de Catalunya
    Theses

    Read the abstract Read the abstract Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

    The increasing demand for large and low cost wireless coverage, ranging from campus to city wide areas, has motivated a high interest in multi-hop communications with Wireless Mesh Networks (WMN) based on IEEE 802.11s as the most recent and significant standard. Channel Assignment (CA) is mechanism which selects the best channels for an individual wireless node or the entire network aiming to increase the capacity of the network. Channel assignment has been extensively researched for multi-radio WMNs, but it is still very challenging when it comes to its implementation. Although IEEE 802.11s introduces new inter-working, routing and wireless frame forwarding at the link layer, the multi channel architecture receives less attention due to many unsolved challenges that arises while mesh service set works over multiple frequencies. This research work tries to give a solution to the needs of designing an efficient channel assignment mechanism. As a result we have proposed a new static channel assignment based on the fact that not all wireless links are practically useful. Our mechanism prunes the network topology by removing weak wireless links and improves the network performance by reaching a more diverse channel-radio assignation solution. Toward designing a distributed channel assignment we propose a new game theory based formulation of channel assignment which is applicable to a realistic scenario with imperfect information at each router. We have proposed a distributed and hybrid channel assignment protocol based on the game formulation. The proposed channel assignment makes wireless router to be able to follow the unpredictable changes in the wireless environment. We also investigated the types of channel assignment protocols which can be adapted to the IEEE 802.11s based mesh network and improve the network good-put in terms of data delivery ratio and end-to-end delay.

  • Reputation Systems and Secure Communication in Vehicular Networks  Open access

     Antolino Rivas, David
    Defense's date: 2013-05-03
    Universitat Politècnica de Catalunya
    Theses

    Read the abstract Read the abstract Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

    A thorough review of the state of the art will reveal that most VANET applications rely on Public Key Infrastructure (PKI), which uses user certificates managed by a Certification Authority (CA) to handle security. By doing so, they constrain the ad-hoc nature of the VANET imposing a frequent connection to the CA to retrieve the Certificate Revocation List (CRL) and requiring some degree of roadside infrastructure to achieve that connection. Other solutions propose the usage of group signatures where users organize in groups and elect a group manager. The group manager will need to ensure that group members do not misbehave, i.e., do not spread false information, and if they do punish them, evict them from the group and report them to the CA; thus suffering from the same CRL retrieval problem. In this thesis we present a fourfold contribution to improve security in VANETs. First and foremost, Chains of Trust describes a reputation system where users disseminate Points of Interest (POIs) information over the network while their privacy remains protected. It uses asymmetric cryptography and users are responsible for the generation of their own pair of public and private keys. There is no central entity which stores the information users input into the system; instead, that information is kept distributed among the vehicles that make up the network. On top of that, this system requires no roadside infrastructure. Precisely, our main objective with Chains of Trust was to show that just by relying on people¿s driving habits and the sporadic nature of their encounters with other drivers a successful reputation system could be built. The second contribution of this thesis is the application simulator poiSim. Many¿s the time a new VANET application is presented and its authors back their findings using simulation results from renowned networks simulators like ns-2. The major issue with network simulators is that they were not designed with that purpose in mind and handling simulations with hundreds of nodes requires a massive processing power. As a result, authors run small simulations (between 50 and 100 nodes) with vehicles that move randomly in a squared area instead of using real maps, which rend unrealistic results. We show that by building tailored application simulators we can obtain more realistic results. The application simulator poiSim processes a realistic mobility trace produced by a Multi-agent Microscopic Traffic Simulator developed at ETH Zurich, which accurately describes the mobility patterns of 259,977 vehicles over regional maps of Switzerland for 24 hours. This simulation runs on a desktop PC and lasts approximately 120 minutes. In our third contribution we took Chains of Trust one step further in the protection of user privacy to develop Anonymous Chains of Trust. In this system users can temporarily exchange their identity with other users they trust, thus making it impossible for an attacker to know in all certainty who input a particular piece of information into the system. To the best of our knowledge, this is the first time this technique has been used in a reputation system. Finally, in our last contribution we explore a different form of communication for VANETs. The vast majority of VANET applications rely on the IEEE 802.11p/Wireless Access in Vehicular Environments (WAVE) standard or some other form of radio communication. This poses a security risk if we consider how vulnerable radio transmission is to intentional jamming and natural interferences: an attacker could easily block all radio communication in a certain area if his transmitter is powerful enough. Visual Light Communication (VLC), on the other hand, is resilient to jamming over a wide area because it relies on visible light to transmit information and ,unlike WAVE, it has no scalability problems. In this thesis we show that VLC is a secure and valuable form of communication in VANETs.

  • Wireless Multimedia Sensor Networks, Security and Key Management  Open access

     Almalkawi, Islam
    Defense's date: 2013-07-23
    Universitat Politècnica de Catalunya
    Theses

    Read the abstract Read the abstract Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

    Wireless Multimedia Sensor Networks (WMSNs) have emerged and shifted the focus from the typical scalar wireless sensor networks to networks with multimedia devices that are capable to retrieve video, audio, images, as well as scalar sensor data. WMSNs are able to deliver multimedia content due to the availability of inexpensive CMOS cameras and microphones coupled with the significant progress in distributed signal processing and multimedia source coding techniques. These mentioned characteristics, challenges, and requirements of designing WMSNs open many research issues and future research directions to develop protocols, algorithms, architectures, devices, and testbeds to maximize the network lifetime while satisfying the quality of service requirements of the various applications. In this thesis dissertation, we outline the design challenges of WMSNs and we give a comprehensive discussion of the proposed architectures and protocols for the different layers of the communication protocol stack for WMSNs along with their open research issues. Also, we conduct a comparison among the existing WMSN hardware and testbeds based on their specifications and features along with complete classification based on their functionalities and capabilities. In addition, we introduce our complete classification for content security and contextual privacy in WSNs. Our focus in this field, after conducting a complete survey in WMSNs and event privacy in sensor networks, and earning the necessary knowledge of programming sensor motes such as Micaz and Stargate and running simulation using NS2, is to design suitable protocols meet the challenging requirements of WMSNs targeting especially the routing and MAC layers, secure the wirelessly exchange of data against external attacks using proper security algorithms: key management and secure routing, defend the network from internal attacks by using a light-weight intrusion detection technique, protect the contextual information from being leaked to unauthorized parties by adapting an event unobservability scheme, and evaluate the performance efficiency and energy consumption of employing the security algorithms over WMSNs.

  • Access to the full text
    IT or not to be: the impact of Moodle in the education of developing countries  Open access

     Garcia Almiñana, Jordi; Somé, Michel; Ayguade Parra, Eduard; Cabre Garcia, Jose Maria; Casañ Guerrero, Maria Jose; Frigola Bourlon, Manel; Galanis ., Nikolaos; Garcia-cervigon Gutierrez, Manuel; Guerrero Zapata, Manel; Muñoz Gracia, Maria del Pilar
    Moodle Research Conference
    Presentation's date: 2012-09-15
    Presentation of work at congresses

    Read the abstract Read the abstract Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

    E-learning environments, such as Moodle, provide a technology that fosters the improvement of the educational system in developed countries, where education is traditionally performed with relatively high standards of quality. A large number of case studies and research have been conducted to demonstrate how e-learning technologies can be applied to improve both training and learning processes. However, these technologies have not been proved efficient when applied to developing countries. The challenges that must be addressed in developing countries, both technological and societal, are much more complex and the possible solution margins are more constrained than those existing in the context where these technologies have been created. In this paper we show how Moodle can be used to improve the quality of education in developing countries and, even more important, how can be used to turn the educational system more sustainable and effective in the long-term. We describe our experience in implementing a programming course in Moodle for the Higher School of Informatics at the Université Polytechnique de Bobo-Dioulasso, in Burkina Faso (West Africa), joining efforts with local professors in designing and implementing the learning system. The case example has been designed having in mind a number of contextual problems: lack of lecturers, excessive teaching hours per lecturer, massive classes, and curricula organization and stability, among others. We finally discuss how the teaching effort is reduced, the students’ knowledge and capacity improves, and the institutional academic model can be guaranteed with the proposal. For this reason, we claim that information technologies in developing countries are a cost-effective way to guarantee the objectives originally defined in the academic curricula and, therefore, deal with the problem of the education.

  • Access to the full text
    Should next generation wireless mesh networks consider dynamic channel access?  Open access

     Amiri Nezhad, Maryam; Bellalta Jimenez, Boris; Guerrero Zapata, Manel; Cerdà Alabern, Llorenç
    Baltic Congress on Future Internet Communications
    Presentation's date: 2012
    Presentation of work at congresses

    Read the abstract Read the abstract Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

    In today’s computer architectures, many scientific applications are considered to be memory bound. The memory wall, i.e. the large disparity between a processor’s speed and the required time to access off-chip memory, is a yet-to-be-solved problem that can greatly reduce performance and make us underutilise the processors capabilities. Many different approaches have been proposed to tackle this problem, such as the addition of a large cache hierarchy, multithreading or speculative data prefetching. Most of these approaches rely on the prediction of the application’s future behaviour, something that should not be necessary as this information is known by the programmer and is located in the application itself. Instead of designing hardware that attempts to guess the future, the goal should be to provide the programmer with the hardware support required to decide when the data is transferred and where is it transferred to. With this goal in mind, we introduce the Data Transfer Engine, a runtime-assisted, software prefetcher that exploits the information provided by the programmer in order to place data in the cache hierarchy close to the processor that will make use of it. The DTE can not only significantly reduce stall time due to cache misses but, more importantly, it allows us to design new computer architectures that are able to tolerate very high memory latencies.

  • Simulation of points of interest distribution in vehicular networks

     Antolino Rivas, David; Guerrero Zapata, Manel
    Simulation. Transactions of the Society for Modeling and Simulation International
    Date of publication: 2012-11
    Journal article

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    Over the last few years Vehicular Ad-hoc Networks (VANETs) have become a major research topic. Security mechanisms such as Public Key Infrastructure have been customized to provide privacy, authentication, integrity and non-repudiation to vehicle communications. Once the security foundations were established, different applications were built on top: intelligent driving systems, parking spot finders, peer-to-peer content, advertisements distribution, etc. In order to verify the feasibility of those applications in the VANET environment, simulation tools such as ns-2 or Glomosim are used, basing their mobility model on non-uniform distributions. The major difficulty for those simulations resides in the complexity of correctly characterizing vehicular mobility at both macroscopic and microscopic levels. This article leaves the generation of mobility traces to simulators such as Multi-Agent Traffic Simulator or VanetMobiSim and focuses on the implementation of the network application simulator poiSim. poiSim simulates Chains of Trust, a secure points of interest distribution protocol for vehicular networks. This article discusses how, by using customized application simulators, we can obtain more realistic results than by using general network simulators such as ns-2. poiSim processes a 24-hour mobility trace produced by a Multi-Agent Traffic Simulator with over 260,000 nodes, which realistically simulates public and private traffic over regional maps of Switzerland. The result is a Chains of Trust simulation, which accurately portrays reality and can be executed in a personal computer. Finally, it should be noted that poiSim could easily be modified to simulate other protocols in vehicular networks. © 2012 The Society for Modeling and Simulation International

    Over the last few years Vehicular Ad-hoc Networks (VANETs) have become a major research topic. Security mechanisms such as Public Key Infrastructure have been customized to provide privacy, authentication, integrity and non-repudiation to vehicle communications. Once the security foundations were established, different applications were built on top: intelligent driving systems, parking spot finders, peer-to-peer content, advertisements distribution, etc. In order to verify the feasibility of those applications in the VANET environment, simulation tools such as ns-2 or Glomosim are used, basing their mobility model on non-uniform distributions. The major difficulty for those simulations resides in the complexity of correctly characterizing vehicular mobility at both macroscopic and microscopic levels. This article leaves the generation of mobility traces to simulators such as Multi-Agent Traffic Simulator or VanetMobiSim and focuses on the implementation of the network application simulator poiSim. poiSim simulates Chains of Trust, a secure points of interest distribution protocol for vehicular networks. This article discusses how, by using customized application simulators, we can obtain more realistic results than by using general network simulators such as ns-2. poiSim processes a 24-hour mobility trace produced by a Multi-Agent Traffic Simulator with over 260,000 nodes, which realistically simulates public and private traffic over regional maps of Switzerland. The result is a Chains of Trust simulation, which accurately portrays reality and can be executed in a personal computer. Finally, it should be noted that poiSim could easily be modified to simulate other protocols in vehicular networks.

  • Chains of trust in vehicular networks: a secure points of interest dissemination strategy

     Antolino Rivas, David; Guerrero Zapata, Manel
    Ad hoc networks
    Date of publication: 2012-08
    Journal article

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    This article describes a scheme which to the best of our knowledge is the first one to use user signatures to share information about Points of Interest in Vehicular Ad hoc Networks. In this scheme, users rate restaurants, hotels, etc. and sign those rates with their private key. Then, they broadcast that information and other vehicles store it for future use. When another user needs a Point of Interest recommendation he queries the system for the other users stored reviews and after he visits that Points of Interest for himself, he evaluates it and his level of trust in the reviewers with rates similar to his own increases. In the end, a user will be able to request to his vehicle information on a certain Point of Interest category and itwill respond with the recommendations made by other users, prioritizing the ones in the user’s Web of Trust.poi-Sim is the tool designed to simulate this scheme. It processes a 24 h mobility trace produced by a Multi-Agent Traffic Simulator, which realistically simulates public and private traffic over regional maps of Switzerland. The result is a Chains of Trust simulation with over 260,000 nodes, which shows that the proposed scheme performs satisfactorily in a realistic scenario.

  • Utility based channel assignment: a centralized channel assignment mechanism for multi radio multi channel wireless mesh networks

     Amiri Nezhad, Maryam; Cerdà Alabern, Llorenç; Guerrero Zapata, Manel
    Scientific research and essays
    Date of publication: 2012-09-06
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • A cross-layer-based clustered multipath routing with QoS-aware scheduling for wireless multimedia sensor networks

     Almalkawi, Islam; Guerrero Zapata, Manel; Al-Karaki, Jamal N.
    International journal of distributed sensor networks
    Date of publication: 2012
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation

     Antolino Rivas, David; Barcelò Ordinas, José María; Guerrero Zapata, Manel; Morillo Pozo, Julian David
    Journal of network and computer applications
    Date of publication: 2011-11
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • COOPERACIÓN Y OPORTUNISMO EN REDES DE ACCESO INALÁMBRICAS Y HETEROGÉNEAS

     Cerdà Alabern, Llorenç; Guerrero Zapata, Manel; Morillo Pozo, Julian David; Garcia Vidal, Jorge; Barcelò Ordinas, José María
    Participation in a competitive project

     Share

  • A secure cluster-based multipath routing protocol for WMSNs

     Almalkawi, Islam; Guerrero Zapata, Manel; Al-Karaki, Jamal N.
    Sensors
    Date of publication: 2011-04-15
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Semantic Web for Reliable Citation Analysis in Scholarly Publishing

     Tous Liesa, Ruben; Guerrero Zapata, Manel; Delgado Mercé, Jaime
    Information technology and libraries
    Date of publication: 2011-03
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Wireless Multimedia Sensor Networks: Current Trends and Future Directions

     Almalkawi, Islam; Guerrero Zapata, Manel; Al-Karaki, Jamal N.; Morillo Pozo, Julian David
    Sensors
    Date of publication: 2010-07-09
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • The future of security in Wireless Multimedia Sensor Networks: a position paper

     Guerrero Zapata, Manel; Zilan, Ruken; Barcelò Ordinas, José María; Bicakci, Kemal; Tavli, Bülent
    Telecommunication systems
    Date of publication: 2010-09
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • XARXES DE COMPUTADORS I SISTEMES DISTRIBUÏTS

     Navarro Moldes, Leandro; Guerrero Zapata, Manel; Barcelò Ordinas, José María; Morillo Pozo, Julian David; Cerdà Alabern, Llorenç; Trullols Cruces, Oscar; Garcia Vidal, Jorge
    Participation in a competitive project

     Share

  • Aplicación Web para la demostración de proyectos

     Freitag, Felix; Liarte, Laura; Navarro Moldes, Leandro; Cabellos Aparicio, Alberto; Guerrero Zapata, Manel
    Congrés Internacional de Docència Universitària i Innovació
    Presentation's date: 2008-07-02
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Chapter 5: Secure Routing in Wireless Mesh Networks

     Guerrero Zapata, Manel
    Date of publication: 2008-07
    Book chapter

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Chapter 10: Key Management in Wireless Mesh Networks

     Guerrero Zapata, Manel
    Date of publication: 2008-07
    Book chapter

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • SAODV: secure AODV and simple ad hoc key management (SAKM)

     Guerrero Zapata, Manel
    Date of publication: 2008
    Book

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • TSI2007-66869-C02-01 "Integración de Redes Ad Hoc, Mesh y Celulares"

     Garcia Vidal, Jorge; Guerrero Zapata, Manel; Barcelò Ordinas, José María; Morillo Pozo, Julian David; Cerdà Alabern, Llorenç; Alaei, Mohammad; Fusté Vilella, David; Trullols Cruces, Oscar
    Participation in a competitive project

     Share

  • Secure and efficient data collection in sensor networks

     Cano, Cristina; Guerrero Zapata, Manel; Bellalta Jimenez, Boris
    Lecture notes in computer science
    Date of publication: 2008-01-16
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • A Protocol Stack for Cooperative Network

     Garcia Vidal, Jorge; Guerrero Zapata, Manel; Morillo Pozo, Julian David; Fusté, D
    Lecture notes in computer science
    Date of publication: 2007-03
    Journal article

     Share Reference managers Reference managers Open in new window

  • A Protocol Stack for Cooperative Wireless Networks

     Garcia Vidal, Jorge; Guerrero Zapata, Manel; Morillo Pozo, Julian David; Fusté Vilella, David
    Date of publication: 2007-05
    Book chapter

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Comparación de las diferentes aproximaciones a las asignaturas de proyectos en la FIB

     Serral Gracia, Rene; Cabellos Aparicio, Alberto; Artigas Vidal, Pau; Guerrero Zapata, Manel; Velasco Esteban, Luis; Freitag, Felix
    Date of publication: 2007-02
    Book chapter

     Share Reference managers Reference managers Open in new window

  • Comparativa de les assignatures de projectes a la FIB

     Serral Gracia, Rene; Cabellos Aparicio, Alberto; Artigas Vidal, Pau; Guerrero Zapata, Manel; Velasco Esteban, Luis; Freitag, Felix
    Date of publication: 2007-02
    Book chapter

     Share Reference managers Reference managers Open in new window

  • Evolució de l'assignatura PXC

     Freitag, Felix; Toribio Gonzalez, Angel; Marques Puig, Joan Manel; Guerrero Zapata, Manel; Serral Gracia, Rene; Cabellos Aparicio, Alberto
    Jornades de Docència del Departament d'Arquitectura de Computadors. 10 Anys de Jornades
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Comparación de las diferentes aproximaciones a las asignaturas de proyectos en la FIB

     Serral Gracia, Rene; Cabellos Aparicio, Alberto; Artigas Vidal, Pau; Guerrero Zapata, Manel; Velasco Esteban, Luis; Freitag, Felix
    Jornades de Docència del Departament d'Arquitectura de Computadors. 10 Anys de Jornades
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • La Docencia de Redes de Computadoras y Sistemas Distribuidos para Ingenieros Informáticos

     Guerrero Zapata, Manel
    CEDI 2007 II Congreso Español de Informática
    Presentation's date: 2007-09-11
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • La Docencia de Redes de Computadoras y Sistemas Distribuidos para Ingenieros Informáticos

     Garcia Vidal, Jorge; Cerdà Alabern, Llorenç; Barcelò Ordinas, José María; Guerrero Zapata, Manel; Morillo Pozo, Julian David
    CEDI 2007 II Congreso Español de Informática
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Key Management and Delayed Verification for Ad Hoc Networks

     Guerrero Zapata, Manel
    Journal of high speed networks
    Date of publication: 2006-01
    Journal article

     Share Reference managers Reference managers Open in new window

  • EuroNGI (7th Framework Program)

     Garcia Vidal, Jorge; Guerrero Zapata, Manel
    Participation in a competitive project

     Share

  • A Protocol Stack for Cooperative Wireless Networks

     Garcia Vidal, Jorge; Guerrero Zapata, Manel; Morillo Pozo, Julian David
    Third Workshop on Wireless and Mobility
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • A simple model of the IEEE 802.11 MAC protocol with heterogeneous traffic flows

     Guerrero Zapata, Manel; Bellalta Jimenez, Boris; Oliver I Riera, Miquel; Meo, M
    Date of publication: 2005-11
    Book chapter

     Share Reference managers Reference managers Open in new window

  • Shortcut Detection and Route Repair in Ad-hoc Networks

     Guerrero Zapata, Manel
    Date of publication: 2005-03
    Book chapter

     Share Reference managers Reference managers Open in new window

  • Securing Ad hoc Routing Protocols

     Guerrero Zapata, Manel; Asokan, N
    Date of publication: 2005-09
    Book chapter

     Share Reference managers Reference managers Open in new window

  • Key Management and Delayed Verification for Ad Hoc Networks

     Guerrero Zapata, Manel
    3rd International Trusted Internet Workshop (TIW 2004)
    Presentation's date: 2004-12-19
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • TEC2004-06437-C05-05 PINTA: Proyecto Integrador de Tecnologías de Acceso

     Guerrero Zapata, Manel; Garcia Vidal, Jorge; Cerdà Alabern, Llorenç; Barcelò Ordinas, José María; Morillo Pozo, Julian David
    Participation in a competitive project

     Share

  • Key Management and Delayed Verification for Ad Hoc Networks

     Guerrero Zapata, Manel
    Lecture notes in computer science
    Date of publication: 2004-12
    Journal article

     Share Reference managers Reference managers Open in new window

  • EuroNGI Network of Excellence, Design and Engineering of the Next Generation Internet, towards convergent multi-service networks

     Guerrero Zapata, Manel; Garcia Vidal, Jorge; Cerdà Alabern, Llorenç; Barcelò Ordinas, José María; Domingo Aladren, Maria Del Carmen; Morillo Pozo, Julian David
    Participation in a competitive project

     Share

  • TIC2003-09279C02-01 SIMA Servicios Inteligentes Mobiles Avanzados

     Guerrero Zapata, Manel
    Participation in a competitive project

     Share

  • Computer Networks

     Guerrero Zapata, Manel
    Collaboration in journals

     Share

  • Secure Ad hoc On-Demand Distance Vector Routing

     Guerrero Zapata, Manel
    Mobile computing and communications review
    Date of publication: 2002-07
    Journal article

     Share Reference managers Reference managers Open in new window

  • Secure Ad hoc On-Demand Distance Vector (SAODV) Routing

     Guerrero Zapata, Manel
    AODV Next Generation (AODVng) 2002 Workshop
    Presentation's date: 2002-06-08
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • How to Design Wireless Security Mechanisms

     Guerrero Zapata, Manel
    1st Workshop on Security in Ad-Hoc Networks
    Presentation's date: 2002-12-02
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Securing Ad hoc Routing Protocols

     Guerrero Zapata, Manel
    2002 ACM Workshop on Wireless Security (WiSe 2002)
    Presentation's date: 2002-09-28
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Representación gráfica de funciones tridimensionales

     Guerrero Zapata, Manel
    Solo programadores
    Date of publication: 1998-07
    Journal article

     Share Reference managers Reference managers Open in new window

  • Visión estereoscópica (La cuarta dimensión)

     Guerrero Zapata, Manel
    Solo programadores
    Date of publication: 1997-09
    Journal article

     Share Reference managers Reference managers Open in new window