9 research outputs found

    From Transcripts to Insights for Recommending the Curriculum to University Students

    Get PDF

    Comparative Study of Keccak SHA-3 Implementations

    Get PDF
    This paper conducts an extensive comparative study of state-of-the-art solutions for im- plementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologies. This research aims to provide valuable insights into selecting and optimizing Keccak SHA-3 implementations. Our study encompasses an in-depth analysis of hardware, software, and software–hardware (hybrid) solutions. We assess the strengths, weaknesses, and performance metrics of each approach. Critical factors, including computational efficiency, scalability, and flexibility, are evaluated across differ- ent use cases. We investigate how each implementation performs in terms of speed and resource utilization. This research aims to improve the knowledge of cryptographic systems, aiding in the informed design and deployment of efficient cryptographic solutions. By providing a comprehensive overview of SHA-3 implementations, this study offers a clear understanding of the available options and equips professionals and researchers with the necessary insights to make informed decisions in their cryptographic endeavors

    PRICHAIN: A Partially Decentralized Implementation of UbiPri Middleware Using Blockchain

    Get PDF
    With the popularization of the Internet-of-Things, various applications have emerged to make life easier. These applications generate a large amount of user data. Analyzing the data obtained from these applications, one can infer personal information about each user. Considering this, it is clear that ensuring privacy in this type of application is essential. To guarantee privacy various solutions exist, one of them is UbiPri middleware. This paper presents a decentralized implementation of UbiPri middleware using the Ethereum blockchain. Smart contracts were used in conjunction with a communication gateway and a distributed storage service to ensure users privacy. The results obtained show that the implementation of this work ensures privacy at different levels, data storage security, and performance regarding scalability in the Internet of Things environments.info:eu-repo/semantics/publishedVersio

    Survey of smart parking systems

    Get PDF
    The large number of vehicles constantly seeking access to congested areas in cities means that finding a public parking place is often difficult and causes problems for drivers and citizens alike. In this context, strategies that guide vehicles from one point to another, looking for the most optimal path, are needed. Most contributions in the literature are routing strategies that take into account different criteria to select the optimal route required to find a parking space. This paper aims to identify the types of smart parking systems (SPS) that are available today, as well as investigate the kinds of vehicle detection techniques (VDT) they have and the algorithms or other methods they employ, in order to analyze where the development of these systems is at today. To do this, a survey of 274 publications from January 2012 to December 2019 was conducted. The survey considered four principal features: SPS types reported in the literature, the kinds of VDT used in these SPS, the algorithms or methods they implement, and the stage of development at which they are. Based on a search and extraction of results methodology, this work was able to effectively obtain the current state of the research area. In addition, the exhaustive study of the studies analyzed allowed for a discussion to be established concerning the main difficulties, as well as the gaps and open problems detected for the SPS. The results shown in this study may provide a base for future research on the subject.Fil: Diaz Ogás, Mathias Gabriel. Universidad Nacional de San Juan. Facultad de Ciencias Exactas, Físicas y Naturales; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - San Juan; ArgentinaFil: Fabregat Gesa, Ramon. Universidad de Girona; EspañaFil: Aciar, Silvana Vanesa. Universidad Nacional de San Juan. Facultad de Ciencias Exactas, Físicas y Naturales; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - San Juan; Argentin

    DYNAMIC RESPONSE OF HIGH-SPEED RAIL DUE TO TRAIN BRAKING

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    loTsafe: Método y sistema de comunicaciones seguras para ecosistemas loT

    Get PDF
    La presente tesis se desarrolla en el sector de las telecomunicaciones y está relacionada particularmente con el campo de la Ingeniería Telemática. De forma más específica, el trabajo persigue diseñar y validar una tecnología de red mejorada de comunicación segura que pueda constituirse como alternativa a las existentes actualmente en determinados escenarios. El objetivo primario de esta red es desacoplar la seguridad de las aplicaciones de los dispositivos IoT a partir de la definición de contextos de seguridad, y facilitar las comunicaciones entre procesos remotos de forma cuasi-transparente. Estos contextos se configuran a partir de la separación de privilegios de entornos de tipo Portable Operating System Interface (POSIX), junto con marcado y filtrado de paquetes locales Internet Protocol (IP). Esta configuración se puede implementar fácilmente aprovechando el protocolo Secure Socket Shell (SSH) y tomando ciertas ideas de Multi Protocol Label Switching (MPLS), pero también de conmutación de circuitos. El campo inmediato de aplicación abarca las infraestructuras y ecosistemas del Internet de las Cosas (IoT) que cuenten con dispositivos POSIX con capacidad para soportar SSH, algo bastante factible en una mayoría de los entornos IoT. Los principales beneficios de esta solución persiguen acortar los tiempos de desarrollo, facilitar la conectividad y simplificar el mantenimiento y las actualizaciones de seguridad. <br /
    corecore