Juan Hernández Serrano
Polytechnic University of Catalonia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Juan Hernández Serrano.
Journal of Information Science and Engineering | 2008
Juan Hernández Serrano; Josep Pegueroles; Miguel Soriano
Services in MANETs tend to be decentralized in order to share their cost between their subscribers. Security is not an exception and thus shared self-organized security schemes must be provided. Group Key Management (GKM) deals with the responsibility of providing privacy and group authentication in group communications focusing in the dynamism of the group (joins and leaves). We present a shared self-organized GKM protocol targeted to MANETs. Main basis of the presented protocol is to extend GKM protocols based on logical trees of keys towards being non-centralized and self-created.
international conference on networks | 2010
Juan Vera del Campo; Juan Hernández Serrano; Josep Pegueroles
We propose a common vector space to describe documents and users in order to create a social network based on affinities, and explore epidemic algorithms to perform searches based on recommendations. Furthermore, we propose using Fuzzy Distributed Tables to help the localization of isolated, affine clusters.
Advanced Research in Data Privacy | 2015
Juan Vera del Campo; Josep Pegueroles; Juan Hernández Serrano; Miguel Soriano
In this chapter, we describe nodes in the Internet of Things can configure themselves automatically and offer personalized services to the users while protecting their privacy. We will show how privacy protection can be achieved by means of a use case. We describe DocCloud, a recommender system where users get content recommended by other users based on their personal affinities. To do this, their things connect together based on the affinities of their owners, creating a social network of similar things, and then provide the recommender system on top of this network. We present the architecture of DocCloud and analyze the security mechanisms that the system includes. Specifically, we study the properties of plausible deniability and anonymity of the recommenders and intermediate nodes. In this way, nodes can recommend products to the customers while deny any knowledge about the product they are recommending or their participation in the recommendation process.
International Journal of Communication Systems | 2010
Olga León Abarca; Juan Hernández Serrano; Miguel Soriano Ibáñez
Archive | 2012
Apostolos Kountouris; Dominique Barthel; Michael Dohler; Andrea Bartoli; Juan Hernández Serrano; Miguel Soriano
RECSI XIII: Actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información. Alicante, 2-5 de septiembre de 2014, 2014, ISBN 978-84-9717-232-0, págs. 87-92 | 2014
Cándido Caballero Gil; Jezabel Míriam Molina Gil; Juan Hernández Serrano; Olga León; Miguel Soriano Ibáñez
VIII Jornadas de Ingeniería Telemática | 2009
Olga León Abarca; Juan Hernández Serrano; Miguel Soriano Ibáñez
Archive | 2012
Apostolos Kountouris; Dominique Barthel; Michael Dohler; Andrea Bartoli; Juan Hernández Serrano; Miguel Soriano
Archive | 2012
Apostolos Kountouris; Dominique Barthel; Michael Dohler; Andrea Bartoli; Juan Hernández Serrano; Miguel Soriano
Archive | 2011
Apostolos Kountouris; Dominique Barthel; Michael Dohler; Andrea Bartoli; Juan Hernández Serrano; Miguel Soriano