Full 1
Full 1

Authors: Zhiyong Zhang, Constantinos Patsakis, Athanasios Zigomitros, Achilleas Papageorgiou, Agusti Solanas, Hui Zhu, Cheng Huang, Hui Li, Hong Zhu, Shengli Tian, Kevin Lü, WeiTao Song, Bin Hu, Bin Yang, Xingming Sun, Xianyi Chen, Jianjun Zhang, Xu Li, Ayesha Kanwal, Rahat Masood, Muhammad Awais Shibli, Rafia Mumtaz, Qingqi Pei, Dingyu Yan, Lichuan Ma, Zi Li, Yang Liao, Zhen Yang, Kaiming Gao, Kefeng Fan, Yingxu Lai, Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Li Yang, Kanliang Wang.

Description: Page 1. CONTENTS SPECIAL FOCUS ON SECURITY, TRUST AND RISK IN MULTIMEDIA SOCIAL NETWORKS 515 Security, Trust and Risk in Multimedia Social Networks Zhiyong Zhang 518 Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures Constantinos Patsakis, Athanasios Zigomitros, Achilleas Papageorgiou and Agusti Solanas 536 Information Diffusion Model Based on Privacy Setting in Online Social Networking Services Hui Zhu, Cheng Huang and Hui Li 549 Privacy-Preserving Data Publication with Features of Independent ?-Diversity Hong Zhu, Shengli Tian and Kevin Lü 572 Approach to Detecting Type-Flaw Attacks Based on Extended Strand Spaces WeiTao Song and Bin Hu 588 Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows Bin Yang, Xingming Sun, Xianyi Chen, Jianjun Zhang and Xu Li

Lei Zhang, Qianhong Wu, Agusti Solanas, Josep Domingo-Ferrer

IEEE Transactions on vehicular Technology 59 (4), 1606-1617

Description: Existing authentication protocols to secure vehicular ad hoc networks (VANETs) raise challenges such as certificate distribution and revocation, avoidance of computation and communication bottlenecks, and reduction of the strong reliance on tamper-proof devices. This paper efficiently copes with these challenges with a decentralized group-authentication protocol in the sense that the group is maintained by each roadside unit (RSU) rather than by a centralized authority, as in most existing protocols that are employing group signatures. In our proposal, we employ each RSU to maintain and manage an on-the-fly group within its communication range. Vehicles entering the group can anonymously broadcast vehicle- to-vehicle (V2V) messages, which can be instantly verified by the vehicles in the same group (and neighboring groups). Later, if the message is found to be false, a third party can be invoked to disclose the identity of the message originator. Our protocol efficiently exploits the specific features of vehicular mobility, physical road limitations, and properly distributed RSUs. Our design leads to a robust VANET since, if some RSUs occasionally collapse, only the vehicles that are driving in those collapsed areas will be affected. Due to the numerous RSUs sharing the load to maintain the system, performance does not significantly degrade when more vehicles join the VANET; hence, the system is scalable.

Agusti Solanas, Edgar Batista, Frederic Borras, Antoni Martínez-Ballesté, Constantinos Patsakis

5as Jornadas Científicas sobre RFID, 1-6

Description: Population pyramids have rapidly changed their shape worldwide. Specially in industrialised countries, where a steady ageing process is taking place. Due to the ageing of the population, age-related illnesses such as mild cognitive impairment (MCI) and dementia are becoming commonplace and healthcare systems struggle to im- prove the quality of life of patients and carers. Wandering and disorientation are common symptoms amongst patients with MCI, and they could lead to fatal outcomes. In this position article we propose a wandering detection technique based on the analysis of randomness in patients’ trajectories, which are gathered by means of standard low-cost mobile phones with GPS.

Antoni Martínez-Ballesté, Pablo A Pérez-Martínez, Agusti Solanas

IEE Communications Magazine 51 (6), 136-141

Description: Cities are growing steadily, and the process of urbanization is a common trend in the world. Although cities are getting bigger, they are not necessarily getting better. With the aim to pro- vide citizens with a better place to live, a new concept of a city was born: the smart city. The real meaning of smart city is not strictly defined, but it has gained much attention, and many cities are taking action in order to be considered “smart.” These smart cities, founded on the use of information and communication technologies, aim at tackling many local problems, from local economy and transportation to quality of life and e-governance. Although technology helps to solve many of these local problems, their ability to gather unprecedented amounts of information could endanger the privacy of citizens. In this article we identify a number of privacy breaches that can appear within the context of smart cities and their services. We leverage some concepts of previously defined privacy models and define the concept of citizens’ privacy as a model with five dimensions: identity privacy, query privacy, loca- tion privacy, footprint privacy and owner privacy. By means of several examples of smart city ser- vices, we define each privacy dimension and show how existing privacy enhancing technolo- gies could be used to preserve citizens’ privacy.

Page 1 of 29

Slide 1
Join us
Follow our last publications and stay connected!

Av. Països Catalans, 26, 43470 Tarragona, Catalonia, Spain