Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Juan Hernández Serrano is active.

Publication


Featured researches published by Juan Hernández Serrano.


Journal of Information Science and Engineering | 2008

Shared Self-Organized GKM Protocol for MANETs *

Juan Hernández Serrano; Josep Pegueroles; Miguel Soriano

Services in MANETs tend to be decentralized in order to share their cost between their subscribers. Security is not an exception and thus shared self-organized security schemes must be provided. Group Key Management (GKM) deals with the responsibility of providing privacy and group authentication in group communications focusing in the dynamism of the group (joins and leaves). We present a shared self-organized GKM protocol targeted to MANETs. Main basis of the presented protocol is to extend GKM protocols based on logical trees of keys towards being non-centralized and self-created.


international conference on networks | 2010

Profile-Based Searches on P2P Social Networks

Juan Vera del Campo; Juan Hernández Serrano; Josep Pegueroles

We propose a common vector space to describe documents and users in order to create a social network based on affinities, and explore epidemic algorithms to perform searches based on recommendations. Furthermore, we propose using Fuzzy Distributed Tables to help the localization of isolated, affine clusters.


Advanced Research in Data Privacy | 2015

Managing Privacy in the Internet of Things: DocCloud, a Use Case

Juan Vera del Campo; Josep Pegueroles; Juan Hernández Serrano; Miguel Soriano

In this chapter, we describe nodes in the Internet of Things can configure themselves automatically and offer personalized services to the users while protecting their privacy. We will show how privacy protection can be achieved by means of a use case. We describe DocCloud, a recommender system where users get content recommended by other users based on their personal affinities. To do this, their things connect together based on the affinities of their owners, creating a social network of similar things, and then provide the recommender system on top of this network. We present the architecture of DocCloud and analyze the security mechanisms that the system includes. Specifically, we study the properties of plausible deniability and anonymity of the recommenders and intermediate nodes. In this way, nodes can recommend products to the customers while deny any knowledge about the product they are recommending or their participation in the recommendation process.


International Journal of Communication Systems | 2010

Securing cognitive radio networks

Olga León Abarca; Juan Hernández Serrano; Miguel Soriano Ibáñez


Archive | 2012

Method of processing a data packet on transmission, a method of processing a data packet on reception, and associated devices and nodes

Apostolos Kountouris; Dominique Barthel; Michael Dohler; Andrea Bartoli; Juan Hernández Serrano; Miguel Soriano


RECSI XIII: Actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información. Alicante, 2-5 de septiembre de 2014, 2014, ISBN 978-84-9717-232-0, págs. 87-92 | 2014

On the revocation of malicious users in anonymous and non-traceable VANETs

Cándido Caballero Gil; Jezabel Míriam Molina Gil; Juan Hernández Serrano; Olga León; Miguel Soriano Ibáñez


VIII Jornadas de Ingeniería Telemática | 2009

Un nuevo ataque a TCP para redes de radios cognitivas

Olga León Abarca; Juan Hernández Serrano; Miguel Soriano Ibáñez


Archive | 2012

METHOD OF PROCESSING A DATA PACKET ON TRANSMISSION, METHOD OF PROCESSING A DATA PACKET ON RECEPTION, DEVICE AND NODE EQUIPMENT ASSOCIATED THEREWITH

Apostolos Kountouris; Dominique Barthel; Michael Dohler; Andrea Bartoli; Juan Hernández Serrano; Miguel Soriano


Archive | 2012

Procede de traitement d'un paquet de donnees a l'emission, procede de traitement d'un paquet de donnees a la reception, dispositifs et equipements nœuds associes

Apostolos Kountouris; Dominique Barthel; Michael Dohler; Andrea Bartoli; Juan Hernández Serrano; Miguel Soriano


Archive | 2011

Method for processing a data packet to the issuance, processing method of a data packet to reception, devices and equipment associated nodes

Apostolos Kountouris; Dominique Barthel; Michael Dohler; Andrea Bartoli; Juan Hernández Serrano; Miguel Soriano

Collaboration


Dive into the Juan Hernández Serrano's collaboration.

Top Co-Authors

Avatar

Miguel Soriano

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Josep Pegueroles

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Miguel Soriano Ibáñez

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Juan Vera del Campo

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Miquel Soriano Ibáñez

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Olga León

Polytechnic University of Catalonia

View shared research outputs
Researchain Logo
Decentralizing Knowledge