1,598 research outputs found
Tomatlán (Córdoba) (Municipio). Batallas. Planos. 1817
Al verso anotado en tinta sepia: "Croquis de la acción de Tomatlán", y a lápiz: "Nº 65"Sumario: Plano del terreno donde luchó el Batallón de Castilla contra los rebeldes, entre el río Xamapa y la Barranca de TomatlánCopia Digital. Real Academia de la Historia : 2010En esta misma colección se conserva una copia del croquis (Manso Porto, Carmen, Cartografía histórica de América, nº 104. Sign. C-I a 53)Forma de ingreso: Donado a la RAH por su correspondiente Fernando de Gabriel y Ruiz de Apodaca (Memorias de la RAH, t. X, 1886, nº 65, p. 846)Orientado con lis. Relieve por sombreado. Indica caminos de Chocamán y Xamapa.
A la derecha, tabla explicativa de los principales puntos, indicados en el plano por clave numéricaManuscrito firmado por José María de Fuentes. Dedicatoria: "Al Exmo. Sor. Virrey de N. E. D. Juan Ruiz de ApodacaManuscrito dibujado a plumilla en tinta chin
Towards a comparable evaluation for VANET protocols: NS-2 experiments builder assistant and extensible test bed
Proceedings of: 9th Embedded Security in Cars Conference (ESCAR 2011), November 9 to 10, 2011, Dresden, GermanyIn order to validate an Intelligent Transportation System (ITS) application or service, simulation techniques are usually employed. Nowadays, there are two problems associated to this kind of validation: the relative complexity of existing simulators and the lack of common criteria in the creation of simulation experiments. The first one makes it hard for users not familiar with a simulation tool to create and execute comprehensive experiments. The second one leads to a situation in which different proposals are validated in different scenarios, thus making it difficult to compare their performance. This work contributes on addressing both problems by proposing VanSimFM, an open-source assistant tool for creating NS-2 simulation experiments, and by defining an extensible test bed which contains a set of simulation scenarios. The test bed is intended to represent the different situations that may be found in a real vehicular environment.This work is partially supported by Ministerio de Ciencia e Innovacion of Spain, project E-SAVE, under grant TIN2009-13461.No publicad
Chiquihuite (Córdoba) (Río). Batallas. Planos. 1817
Al verso anotado en tinta sepia: "Croquis de la acción del Chiquiuite", y a lápiz: "Nº 65"Sumario: Plano del terreno donde luchó el Batallón de Castilla contra los rebeldes, entre el río del Chiquihuite y el de Atoyac, en el municipio de CórdobaCopia Digital. Real Academia de la Historia : 2010Forma de ingreso: Donado a la RAH por su correspondiente Fernando de Gabriel y Ruiz de Apodaca (Memorias de la RAH, t. X, 1886, nº 65, p. 846)Orientado con lis. Relieve por sombreado. Indica camino para Córdoba.
A la derecha incluye una tabla explicativa de los principales puntos, indicados en el plano por clave numéricaManuscrito firmado por José María de Fuentes con Dedicatoria: "Al Exmo. Sor. Virrey de N. E. D. Juan Ruiz de Apodaca"Manuscrito dibujado a plumilla en tinta chin
Modelo de procedimiento sancionador electrónico aplicado al control del tráfico vehicular
RECSI 2010. XI Reunión Española sobre Criptología y Seguridad de la Información, Universitat Rovira i Virgili, Tarragona, España, 7-10 Septiembre 2010El incumplimiento de las leyes origina la imposición de sanciones. Una buena gestión de las sanciones se convierte en un factor clave para que éstas sean eficaces. Por este motivo, se han producido impulsos legislativos que persiguen el
desarrollo electrónico de los procedimientos. No obstante, hasta el momento no se ha propuesto la realización electrónica del procedimiento sancionador completo en el ámbito del control del
tráfico vehicular. En este trabajo se propone un modelo para la implantación del procedimiento sancionador electrónico en dicho contexto, mejorando la capacidad de participación de los
ciudadanos interesados en el mismo. Particularmente y por las implicaciones legales del procedimiento, se abordan en detalle los
aspectos de seguridad necesarios.Este trabajo ha sido parcialmente financiado por el Ministerio de Ciencia e Innovación (España), dentro del Plan Nac. de Investigación Científica, Desarrollo e Innovación Tecnológica
2008-2011, contrato TIN2009-13461 (proy. E-SAVE).Publicad
Overview of security issues in Vehicular ad-hoc networks
Vehicular ad-hoc networks (VANETs) are a promising communication scenario. Several new applications are envisioned, which will improve traffic management and safety. Nevertheless, those applications have stringent security requirements, as they affect road traffic safety. Moreover, VANETs face several security threats. As VANETs present some unique features (e.g. high mobility of nodes, geographic extension, etc.) traditional security mechanisms are not always suitable. Because of that, a plethora of research contributions have been presented so far. This chapter aims to describe and analyze the most representative VANET security developments
Witness-based evidence generation in Vehicular Ad-Hoc Networks
7th Conference Embebedd Security in Cars: ESCAR 2009, Düsseldorf, Germany, Nov. 24-25, 2009Vehicular ad-hoc networks (VANETs) are a novel
communication scenario. They allow vehicle-to-vehicle (V2V)
and vehicle-to-infrastructure (V2I) communications. New services
are envisioned through these networks affecting road traffic
safety. Current proposals are based on sharing each vehicle´s
perceptions about their own environment. Nevertheless, it is also
possible for a vehicle to know the status of their neighbours in a
given moment. Thus, a vehicle can obtain from their neighbours
their perceptions about its status. Neighbours then become
witnesses. Sometimes it is necessary to prove a vehicle´s behavior
in a given moment (e.g. accident dispute, speeding fines, etc.).
As own sensors can be tampered with, having testimonies from
witnesses can contribute to have a reliable source of information.
In this work a protocol to obtain such testimonies and generate
digital evidences is proposed. A security analysis is performed to
verify the accomplishment of evidence generation requirements.Publicad
CERTILOC: Implementation of a spatial-temporal certification service compatible with several localization technologies
The Third International Conference on Availability, Reliability and Security: ARES 2008 (March 4-7, 2008, Barcelona, Spain)Recently researchers are being encouraged to
address security and privacy requirements for location
information. This work contributes to this area by
presenting CERTILOC, a prototype of a spatialtemporal
certification service that is interoperable with
representative localization technologies (GSM Cell-ID
and GPS). Our work is completed with a broad threat
analysis on spatial-temporal certification services and
an exposition of legal considerations that can be made
if used in work scenarios.Publicad
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus
Open Access funding provided thanks to the CRUE-CSIC agreement with Springer Nature. This work was supported by the Madrid Government (Comunidad de Madrid-Spain) under the multiannual agreement with UC3M (“fostering young doctor research”, DEPROFAKE-CM-UC3M) and in the context of the V PRICIT research and technological innovation regional program; by CAM by grant CYNAMON P2018/TCS-4566-CM, co-funded with ERDF; by 1208 Min. of Science and Innovation of Spain by grant ODIO PID2019-1209 111429RB-C21 (AEI/10.13039/50110 12100011033); and by Funding for APC: Universidad Carlos III de Madrid (Read & Publish Agreement CRUE-CSIC 2023)
- …