1,103 research outputs found

    Establecimiento de claves seguro mediante códigos sonoros en dispositivos móviles

    Get PDF
    El objetivo de este trabajo ha sido investigar el uso de canales sonoros para el intercambio de claves en teléfonos inteligentes. Para ello, se ha realizado un diseño y un análisis del problema a resolver, teniendo en cuenta factores como la necesidad de sincronización, los parámetros de escucha, la longitud de la clave que podemos obtener, los ataques a los que sería vulnerable el protocolo, la necesidad de cierta persistencia a nivel local, el uso de la nube, etc. Se ha realizado un análisis de tecnologías relacionadas, eligiendo aquellas que mejor se adaptan a los requisitos del problema y se ha implementado un prototipo capaz de realizar un intercambio de claves y autenticar mutuamente a un par de dispositivos, creando así un canal seguro a través del cual puedan comunicarse en el futuro, sin necesidad de que una tercera parte confiable que certifique la identidad de las partes.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech

    Feasibility and reliability of a Physical Fitness test battery in individuals with Down Syndrome

    Get PDF
    Background: Down syndrome (DS) is a genetic disorder that occurs because of an abnormal division between cells that results in an extra copy of chromosome 21. Some studies show that physical exercise in people with DS increases some cognitive capacities, such as memory, and improves the quality of life. Aim: The main aim of this study was to perform an analysis of the reliability and feasibility of the SAMU-Disability Fitness (DISFIT) battery in adults with DS. Methods: A cross-sectional study with a test–retest design was performed in a maximum interval of 2 weeks in 37 subjects (11 women and 26 men) aged between 21 and 58 years old with DS. Eight field-based fitness tests were proposed to assess the physical fitness (PF) of adults with DS: Body Mass Index (BMI), Waist Circumference (WC), the Timed Up and Go test (TUG), the Deep Trunk Flexibility test (DTF), the Hand Grip test (HG), the Timed Stand Test (TST), the 30-s Sit-Up (SUP) and the 6-Min Walk Test (6MWT). Results: The intra-class correlation coefficient (ICC) in all the tests was good and high (>0.80), except for the 6MWT, whose reliability was fair. Conclusion: The SAMU-DISFIT battery is a reliable and feasible physical fitness battery which has been created with the purpose of establishing tests which measure the four basic components of PF (flexibility, cardiorespiratory fitness, musculoskeletal fitness and motor fitness) in adults with D

    Prueba de concepto de Autoridad de Certificación usando Computación Segura Multiparte

    Get PDF
    Este trabajo pretende analizar el paradigma de la Computación Segura Multiparte y sus posibles aplicaciones en el campo de la criptografía. Se plantea como modelo alternativo, más escalable y seguro al uso de módulos hardware de seguridad para aplicaciones que requieran de Terceras Partes Confiables. Concretamente, se ha integrado un protocolo de criptografía RSA multiparte con la librería certbuilder, para la creación de certificados X.509. De esta forma se asegura que la creación de los certificados raíz de la Infraestructura de Clave Pública se realiza de forma que la generación de claves y firma de éste se ejecute íntegramente sobre el sistema multiparte, con un modelo de tres partes que trabaja con circuitos aritméticos, sin que ninguna de ellas, de forma aislada, tenga posibilidad de comprometer la clave privada correspondiente. Para comprobar la viabilidad del sistema se han realizado pruebas de generación de certificados con diferentes longitudes de clave, siendo el proceso determinante la creación de las claves. Los elevados tiempos hacen que una aplicación como esta no sea asumible en otros escenarios, pero creemos que para el caso de la creación de los certificados raíz de una infraestructura de clave pública las garantías avanzadas de seguridad compensan el tiempo extra.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech

    Cryptographic approaches for confidential computations in blockchain.

    Get PDF
    Blockchain technologies have been widely re- searched in the last decade, mainly because of the revolution they propose for different use cases. Moving away from centralized solutions that abuse their capabilities, blockchain looks like a great solution for integrity, transparency, and decentral- ization. However, there are still some problems to be solved, lack of privacy being one of the main ones. In this paper, we focus on a subset of the privacy area, which is confidentiality. Although users are increasingly aware of the importance of confidentiality, blockchain poses a barrier to the confidential treatment of data. We initiate the study of cryptographic confidential computing tools and focus on how these technologies can endow the blockchain with better capabilities, i.e., enable rich and versatile applications while pro- tecting users’ data. We identify Zero Knowledge Proofs, Fully Homomorphic Encryption, and Se- cure Multiparty Computation as good candidates to achieve this.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech

    La imagen de la mujer en el videojuego

    Get PDF
    La representación de la mujer en el mundo del videojuego se presenta en la actualidad de una manera muy distinta a la de hace unos años. Con la crítica y la evolución del sector, ha aumentado el número de protagonistas y consumidoras femeninas. La mayoría de los videojuegos que se encuentran actualmente en el mercado ya no reproducen estereotipos sexistas. Y si los hay, están presentes en la misma medida en que lo están en el cine, en los libros o en las series de televisión

    Presiones y amenazas dentro de la profesión periodística: un estudio en los profesionales de la prensa de Almería

    Get PDF
    El siguiente artículo recoge los principales resultados de un estudio cuantitativo que tuvo como objetivo indagar en las condiciones profesionales de los periodistas almerienses en la prensa, y que repercuten en el ejercicio de la libertad de expresión. Se exponen las principales trabas a las que se enfrentan en el trabajo periodístico y se explicitan las presiones que experimentan. Entre los resultados se destaca que los propios periodistas han asumido este tipo de situaciones como un aspecto normal de su trabajo.The following article gathers the main results of a quantitative study that it had as aim to investigate into the professional conditions of the journalists from Almería in the press, and that affect in the exercise of the freedom of expression. The main troubles faced during the journalistic work also the pressures experimented have been exposed. Inside the results stands that the own journalists have assumed this type of situations as a normal aspect of their works

    Private set intersection: A systematic literature review

    Get PDF
    Secure Multi-party Computation (SMPC) is a family of protocols which allow some parties to compute a function on their private inputs, obtaining the output at the end and nothing more. In this work, we focus on a particular SMPC problem named Private Set Intersection (PSI). The challenge in PSI is how two or more parties can compute the intersection of their private input sets, while the elements that are not in the intersection remain private. This problem has attracted the attention of many researchers because of its wide variety of applications, contributing to the proliferation of many different approaches. Despite that, current PSI protocols still require heavy cryptographic assumptions that may be unrealistic in some scenarios. In this paper, we perform a Systematic Literature Review of PSI solutions, with the objective of analyzing the main scenarios where PSI has been studied and giving the reader a general taxonomy of the problem together with a general understanding of the most common tools used to solve it. We also analyze the performance using different metrics, trying to determine if PSI is mature enough to be used in realistic scenarios, identifying the pros and cons of each protocol and the remaining open problems.This work has been partially supported by the projects: BIGPrivDATA (UMA20-FEDERJA-082) from the FEDER Andalucía 2014– 2020 Program and SecTwin 5.0 funded by the Ministry of Science and Innovation, Spain, and the European Union (Next Generation EU) (TED2021-129830B-I00). The first author has been funded by the Spanish Ministry of Education under the National F.P.U. Program (FPU19/01118). Funding for open access charge: Universidad de Málaga/CBU

    Server-Side GNSS Spoofing Detection Challenges for Vehicle Tracking Applications.

    Get PDF
    This paper focuses on the risks linked to the Global Navigation Satellite System (GNSS) and introduces a scenario involving a data-transmitting device connected to a cloud-based service. We explore potential attackers and the diverse attacks possible during the communication and data processing stages of the scenario. Additionally, we categorize current detection methods based on the information they employ to detect spoofing attacks and discuss their limitations concerning Server-Side detection. Ultimately, we propose solutions and future lines of work to mitigate these problems.This work is part of the research project SECUREDGE (Security Services Platform for the Protection of Edge Scenarios), with PID2019-110565RB-I00, funded by AEI/10.13039/501100011033 Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech
    corecore