1,598 research outputs found

    Tomatlán (Córdoba) (Municipio). Batallas. Planos. 1817

    Get PDF
    Al verso anotado en tinta sepia: "Croquis de la acción de Tomatlán", y a lápiz: "Nº 65"Sumario: Plano del terreno donde luchó el Batallón de Castilla contra los rebeldes, entre el río Xamapa y la Barranca de TomatlánCopia Digital. Real Academia de la Historia : 2010En esta misma colección se conserva una copia del croquis (Manso Porto, Carmen, Cartografía histórica de América, nº 104. Sign. C-I a 53)Forma de ingreso: Donado a la RAH por su correspondiente Fernando de Gabriel y Ruiz de Apodaca (Memorias de la RAH, t. X, 1886, nº 65, p. 846)Orientado con lis. Relieve por sombreado. Indica caminos de Chocamán y Xamapa. A la derecha, tabla explicativa de los principales puntos, indicados en el plano por clave numéricaManuscrito firmado por José María de Fuentes. Dedicatoria: "Al Exmo. Sor. Virrey de N. E. D. Juan Ruiz de ApodacaManuscrito dibujado a plumilla en tinta chin

    Towards a comparable evaluation for VANET protocols: NS-2 experiments builder assistant and extensible test bed

    Get PDF
    Proceedings of: 9th Embedded Security in Cars Conference (ESCAR 2011), November 9 to 10, 2011, Dresden, GermanyIn order to validate an Intelligent Transportation System (ITS) application or service, simulation techniques are usually employed. Nowadays, there are two problems associated to this kind of validation: the relative complexity of existing simulators and the lack of common criteria in the creation of simulation experiments. The first one makes it hard for users not familiar with a simulation tool to create and execute comprehensive experiments. The second one leads to a situation in which different proposals are validated in different scenarios, thus making it difficult to compare their performance. This work contributes on addressing both problems by proposing VanSimFM, an open-source assistant tool for creating NS-2 simulation experiments, and by defining an extensible test bed which contains a set of simulation scenarios. The test bed is intended to represent the different situations that may be found in a real vehicular environment.This work is partially supported by Ministerio de Ciencia e Innovacion of Spain, project E-SAVE, under grant TIN2009-13461.No publicad

    Chiquihuite (Córdoba) (Río). Batallas. Planos. 1817

    Get PDF
    Al verso anotado en tinta sepia: "Croquis de la acción del Chiquiuite", y a lápiz: "Nº 65"Sumario: Plano del terreno donde luchó el Batallón de Castilla contra los rebeldes, entre el río del Chiquihuite y el de Atoyac, en el municipio de CórdobaCopia Digital. Real Academia de la Historia : 2010Forma de ingreso: Donado a la RAH por su correspondiente Fernando de Gabriel y Ruiz de Apodaca (Memorias de la RAH, t. X, 1886, nº 65, p. 846)Orientado con lis. Relieve por sombreado. Indica camino para Córdoba. A la derecha incluye una tabla explicativa de los principales puntos, indicados en el plano por clave numéricaManuscrito firmado por José María de Fuentes con Dedicatoria: "Al Exmo. Sor. Virrey de N. E. D. Juan Ruiz de Apodaca"Manuscrito dibujado a plumilla en tinta chin

    Modelo de procedimiento sancionador electrónico aplicado al control del tráfico vehicular

    Get PDF
    RECSI 2010. XI Reunión Española sobre Criptología y Seguridad de la Información, Universitat Rovira i Virgili, Tarragona, España, 7-10 Septiembre 2010El incumplimiento de las leyes origina la imposición de sanciones. Una buena gestión de las sanciones se convierte en un factor clave para que éstas sean eficaces. Por este motivo, se han producido impulsos legislativos que persiguen el desarrollo electrónico de los procedimientos. No obstante, hasta el momento no se ha propuesto la realización electrónica del procedimiento sancionador completo en el ámbito del control del tráfico vehicular. En este trabajo se propone un modelo para la implantación del procedimiento sancionador electrónico en dicho contexto, mejorando la capacidad de participación de los ciudadanos interesados en el mismo. Particularmente y por las implicaciones legales del procedimiento, se abordan en detalle los aspectos de seguridad necesarios.Este trabajo ha sido parcialmente financiado por el Ministerio de Ciencia e Innovación (España), dentro del Plan Nac. de Investigación Científica, Desarrollo e Innovación Tecnológica 2008-2011, contrato TIN2009-13461 (proy. E-SAVE).Publicad

    Overview of security issues in Vehicular ad-hoc networks

    Get PDF
    Vehicular ad-hoc networks (VANETs) are a promising communication scenario. Several new applications are envisioned, which will improve traffic management and safety. Nevertheless, those applications have stringent security requirements, as they affect road traffic safety. Moreover, VANETs face several security threats. As VANETs present some unique features (e.g. high mobility of nodes, geographic extension, etc.) traditional security mechanisms are not always suitable. Because of that, a plethora of research contributions have been presented so far. This chapter aims to describe and analyze the most representative VANET security developments

    Witness-based evidence generation in Vehicular Ad-Hoc Networks

    Get PDF
    7th Conference Embebedd Security in Cars: ESCAR 2009, Düsseldorf, Germany, Nov. 24-25, 2009Vehicular ad-hoc networks (VANETs) are a novel communication scenario. They allow vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. New services are envisioned through these networks affecting road traffic safety. Current proposals are based on sharing each vehicle´s perceptions about their own environment. Nevertheless, it is also possible for a vehicle to know the status of their neighbours in a given moment. Thus, a vehicle can obtain from their neighbours their perceptions about its status. Neighbours then become witnesses. Sometimes it is necessary to prove a vehicle´s behavior in a given moment (e.g. accident dispute, speeding fines, etc.). As own sensors can be tampered with, having testimonies from witnesses can contribute to have a reliable source of information. In this work a protocol to obtain such testimonies and generate digital evidences is proposed. A security analysis is performed to verify the accomplishment of evidence generation requirements.Publicad

    CERTILOC: Implementation of a spatial-temporal certification service compatible with several localization technologies

    Get PDF
    The Third International Conference on Availability, Reliability and Security: ARES 2008 (March 4-7, 2008, Barcelona, Spain)Recently researchers are being encouraged to address security and privacy requirements for location information. This work contributes to this area by presenting CERTILOC, a prototype of a spatialtemporal certification service that is interoperable with representative localization technologies (GSM Cell-ID and GPS). Our work is completed with a broad threat analysis on spatial-temporal certification services and an exposition of legal considerations that can be made if used in work scenarios.Publicad

    Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus

    Get PDF
    Open Access funding provided thanks to the CRUE-CSIC agreement with Springer Nature. This work was supported by the Madrid Government (Comunidad de Madrid-Spain) under the multiannual agreement with UC3M (“fostering young doctor research”, DEPROFAKE-CM-UC3M) and in the context of the V PRICIT research and technological innovation regional program; by CAM by grant CYNAMON P2018/TCS-4566-CM, co-funded with ERDF; by 1208 Min. of Science and Innovation of Spain by grant ODIO PID2019-1209 111429RB-C21 (AEI/10.13039/50110 12100011033); and by Funding for APC: Universidad Carlos III de Madrid (Read & Publish Agreement CRUE-CSIC 2023)
    corecore