No results founds

2023 (3)

McMenamin C, Daza V. An AMM minimizing user-level extractable value and loss-versus-rebalancing. CEUR Workshop Proceedings 2023; 3460.

Preetam S, Compastie M, Daza V, Siddiqui S. An Approach for Intelligent Behaviour-Based Threat Modelling with Explanations. In: -. 2023 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2023 - Proceedings. 2023. p. 197-200.

Rawat A, Daza V, Signorini M. Not Enough IoT After All: Visiting Transactional Characteristics of IoT Blockchains. CEUR Workshop Proceedings 2023; 3460.

2022 (11)

Franzoni F, Salleras X, Daza V. AToM: Active topology monitoring for the bitcoin peer-to-peer network. Peer-to-Peer Networking and Applications 2022; (15): 408-425.

Franzoni F, Daza V. Clover: An anonymous transaction relay protocol for the bitcoin P2P network. Peer-to-Peer Networking and Applications 2022; (15): 290-303.

McMenamin C.; Daza V.; Fitzi M.; O'Donoghue P.. FairTraDEX: A Decentralised Exchange Preventing Value Extraction. In: Song D. Proceedings of the 2021 ACM CCS Workshop on Decentralized Finance and Security. Association for Computing Machinery; 2022. p. 39-46.

Daza V.; Zhang K.; Zhao Z.. Message from the DAPPS 2022 Technical Program Committee Chairs. In: IEEE International Conference on Decentralized Applications and Infrastructures. Proceedings - 4th IEEE International Conference on Decentralized Applications and Infrastructures, DAPPS 2022. Institute of Electrical and Electronics Engineers Inc.; 2022.

Daza V, Haque A, Scafuro A, Zacharakis A, Zapico A. Mutual Accountability Layer: Accountable Anonymity Within Accountable Trust. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2022; 13301 LNCS(0): 318-336.

Belles-Munoz M, Baylina J, Daza V, Munoz-Tapia JL. New Privacy Practices for Blockchain Software. IEEE Software 2022.

Rawat A, Daza V, Signorini M. Offline Scaling of IoT Devices in IOTA Blockchain. Sensors 2022; 22(4).

Mazorra B.; Reynolds M.; Daza V.. Price of MEV: Towards a Game Theoretical Approach to MEV. In: Song D. Proceedings of the 2021 ACM CCS Workshop on Decentralized Finance and Security. Association for Computing Machinery; 2022. p. 15-22.

Franzoni F, Daza V. SoK: Network-Level Attacks on the Bitcoin P2P Network. IEEE Access 2022; 10(0): 94924-94962.

2021 (4)

Boldrin L.; Daza V.; De Prisco R.; Rovira S.; Sivo S.. A trust module for the interaction with virtual charachters. In: Yang J, Li K, Tu W, Xiao Z, Wang L. Proceedings 7th International Conference on Systems and Informatics (ICSAI 2021). Chongqing: 2021.

McMenamin C.; Daza V.; Pontecorvi M.. Achieving state machine replication without honest players. In: Association for Computing Machinery. AFT 2021 - Proceedings of the 2021 3rd ACM Conference on Advances in Financial Technologies. Association for Computing Machinery, Inc; 2021. p. 1-4.

Belles-Muñoz M, Whitehat B, Baylina J, Daza V, Muñoz-Tapia JL. Twisted Edwards Elliptic Curves for Zero-Knowledge Circuits. Mathematics 2021; 9(23): 1-21.

Salleras X.; Daza V.. ZPiE: Zero-knowledge proofs in embedded systems. Mathematics 2021; 9(20): 1-17.

2020 (6)

Franzoni F.; Daza V.. Improving Bitcoin Transaction Propagation by Leveraging Unreachable Nodes. In: IEEE International Conference on Blockchain, IEEE Computer Society, Institute of Electrical and Electronics Engineers. 2020 IEEE International Conference on Blockchain proceedings 2-6 November 2020, virtual event. IEEE Computer Society, Conference Publishing Services; 2020. p. 196-203.

Franzoni F, Daza V, Abellán I. Leveraging bitcoin testnet for bidirectional botnet command and control systems. In: Bonneau J, Heninger N (eds.). Financial Cryptography and Data Security 2020. 24th International Conference, FC 2020. Kota Kinabalu. Sabah: Springer; 2020. p. 1-17.

Franzoni F.; Abellan I.; Daza V.. Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2020; 12059 LNCS(0): 3-19.

Daza V.; Rafols C.; Zacharakis A.. Updateable Inner Product Argument with Logarithmic Verifier and Applications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2020; 12110 LNCS(0): 527-557.

2019 (2)

Daza V.; Salleras X.. LASER: Lightweight and Secure Remote Keyless Entry Protocol. In: AA. VV.. In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications SciTePress; 2019. p. 372-377.

Daza V.; Gonzalez A.; Pindado Z.; Rafols C.; Silva J.. Shorter quadratic QA-NIZK proofs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2019; 11442: 314-343.

2017 (3)

Daza V, Pietro RD, Lombardi F, Signorini M. CoLLIDE: CLoud Latency-based IDEntification. Procedia Computer Science 2017; 113: 81-88.

Daza V, Di Pietro R, Klimek I, Signorini M. CONNECT: CONtextual NamE disCovery for blockchain-based services in the IoT. In: AA.VV.. 201 IEEE International Conference on Communications (ICC 2017) Piscataway: IEEE; 2017. p. 1-6.

Daza V, Makriyannis N. Designing Fully Secure Protocols for Secure Two-Party Computation of Constant- Domain Functions. In: Kalai Y, Reyzin L (Eds.). 15th International Conference, TCC 2017. Springer; 2017. p. 581-611.

2016 (1)

Daza V.; Pietro R.D.; Lombardi F.; Signorini M.. FRoDO: Fraud Resilient Device for Off-Line Micro-Payments. IEEE Transactions on Dependable and Secure Computing 2016; 13(2): 296-311.

2015 (3)

Triay J.; Minguillon J.; Sancho-Vinuesa T.; Daza V.. Exploring the effectiveness of video viewing in an introductory x-MOOC of algebra. CEUR Workshop Proceedings 2015; 1599: 63-70.

Daza V, Signorini M. Smart User Authentication for an Improved Data Privacy. In: Navarro-Arribas, Guillermo, Torra, Vicenç (Eds.). Advanced Research in Data Privacy. Studies in Computational Intelligence; 2015. p. 345-363.

Daza V.; Di Pietro R.; Lombardi F.; Signorini M.. SOLDI: Secure off-line disposable credits to secure mobile micro payments. Communications in Computer and Information Science 2015; 554: 340-362.

2014 (5)

Daza V.; Di Pietro R.; Lombardi F.; Signorini M.. Force: Fully off-line secure credits for mobile micro payments. In: Samarati P, Obaidat MS, Holzinger A. SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications. SciTePress; 2014. p. 125-136.

Oliver M, Hernández-Leo D, Daza V, Martín C, Albó L.. MOOCs en España. Panorama actual de los Cursos Masivos Abiertos en Línea en las universidades españolas. 2014.

Bellalta B.; Faridi A.; Barcelo J.; Daza V.; Oliver M.. Performance analysis of a Multiuser Multi-Packet Transmission system for WLANs in non-saturation conditions. Computer Networks 2014; 60: 88-100.

Sancho T, Daza V. Strategy for monitoring and evaluation of learning in introductory algebra MOOC. Digital Education Review 2014; 25(1): 36-50.

2013 (1)

Daza V.; Makriyannis N.; Rovira Riera C.. MOOC attack: Closing the gap between pre-university and university mathematics. Open Learning 2013; 28(3): 227-238.

2012 (2)

Tsao, T.; Alexander, R.; Dohler, M.; Daza, V.; Lozano, A.. A Security Framework for Routing over Low Power and Lossy Networks, IETF Requirement Draft for Routing over Low Power and Lossy Networks (ROLL). [Work in progress]. 2012.

Moreno, Verónica; Hernández Leo, Davinia; Daza, Vanesa. El Programa EnginyCat a l'Escola Superior Politècnica Mentoría, suport acadèmic i adaptació al nou context formatiu.. Revista del CIDUI 2012; (1).

2011 (3)

Nikounia, H.; Jahangir, A.; Daza, V.. A distributed group rekeying scheme for wireless sensor networks. In: Lorenz, Pascal (ed.). ICSNC 2011, The Sixth International Conference on Systems and Networks Communications. XPS (Xpert Publishing Services); 2011. p. 127-135.

Bellalta B.; Daza V.; Oliver M.. An approximate queueing model for multi-rate multi-user MIMO systems. IEEE Communications Letters 2011; 15(4): 392-394.

Bellalta B.; Daza V.; Barcelo J.; Oliver M.. Buffer sizing in TxSDMA systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2011; 6886: 241-253.

2010 (1)

Daza V.; Herranz J.; Morillo P.; Rafols C.. Extensions of access structures and their cryptographic applications. Applicable Algebra in Engineering, Communications and Computing 2010; 21(4): 257-284.

2009 (2)

Daza V.; Herranz J.; Saez G.. Flaws in some self-healing key distribution schemes with revocation. Information Processing Letters 2009; 109(11): 523-526.

Daza V.; Domingo-Ferrer J.; Sebe F.; Viejo A.. Trustworthy privacy-preserving car-generated announcements in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology 2009; 58(4): 1876-1886.

2008 (4)

Daza V.; Herranz J.; Morillo P.; Rafols C.. 'Ad-hoc' threshold broadcast encryption with shorter ciphertexts. Electronic Notes in Theoretical Computer Science 2008; 192(2): 3-15.

Domingo-Ferrer J.; Daza V.; Sebe F.; Viejo A.. Location privacy via unlinkability: An alternative to cloaking and perturbation. In: Marius Truta T, Xiong L, Fotouhi F. PAIS '08 post-proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society Nantes, France, March 29, 2008. ACM; 2008. p. 1-2.

Cramer R.; Daza V.; Gracia I.; Urroz J.J.; Leander G.; Marti-Farre J.; Padro C.. On codes, matroids and secure multi-party computation from linear secret sharing schemes. IEEE Transactions on Information Theory 2008; 54(6): 2644-2657.

Daza V.; Herranz J.; Saez G.. On the computational security of a distributed key distribution scheme. IEEE Transactions on Computers 2008; 57(8): 1087-1097.

2007 (6)

Solanas A.; Domingo-Ferrer J.; Martinez-Balleste A.; Daza V.. A distributed architecture for scalable private RFID tag identification. Computer Networks 2007; 51(9): 2268-2279.

Castella-Roca J.; Daza V.; Domingo-Ferrer J.; Manjon J.A.; Sebe F.; Viejo A.. An incentive-based system for information providers over peer-to-peer mobile ad-hoc networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2007; 4617: 380-392.

Daza V.; Herranz J.; Morillo P.; Rafols C.. CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2007; 4784: 35-50.

Daza V.; Herranz J.; Morillo P.; Rafols C.. Cryptographic techniques for mobile ad-hoc networks. Computer Networks 2007; 51(18): 4938-4950.

Daza V.; Morillo P.; Rafols C.. On dynamic distribution of private keys over MANETs. Electronic Notes in Theoretical Computer Science 2007; 171(1): 33-41.

Daza V.; Domingo-Ferrer J.. On partial anonymity in secret sharing. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2007; 4582: 193-202.

2006 (2)

Castellà-Roca, J.; Daza, V.; Domingo-Ferrer, J; Sebé, F.. Privacy homomorphisms for e-gambling and mental poker. In: -. 2006 IEEE International Conference on Granular Computing. Piscataway: IEEE; 2006. p. 788-791.

Castella-Roca J.; Daza V.; Domingo-Ferrer J.; Sebe F.. Privacy homomorphisms for E-gambling and mental poker. In: EEE International Conference on Granular Computing, Yan-Qing Zhang, Tsau Y. Lin, IEEE Computational Intelligence Society, Georgia State University. 2006 IEEE International Conference on Granular Computing Atlanta, USA, May 10-12, 2006. IEEE; 2006. p. 788-791.

2005 (1)

Cramer, R.; Daza, V.; Gracia, I.; Jiménez Urroz, J.; Leander, G.; Martí-Farré, J.; Padró, C. On codes, matroids and secure multi-party computation from linear secret sharing schemes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2005; 3621: 327-343.

2004 (6)

Mir, J.; Borrell, J.; Daza, V. An anonymous communication channel. Upgrade 2004; 5(6): 9-14.

Blundo C.; D''Arco P.; Daza V.; Padro C.. Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures. Theoretical Computer Science 2004; 320(2-3): 269-291.

Daza, Vanesa. On Linear Secret Sharing Schemes and Distributed Cryptographic Protocols (Thesis). 2004.

Daza, Vanesa; Padró, Carles (advisor). On Linear Secret Sharing Schemes and Distributed Cryptographic Protocols [Ph. D. thesis]. Barcelona: Universitat Politècnica de Catalunya. Departament de Matemàtica Aplicada IV; 2004.

Daza, V.; Herranz, J.; Sáez, G. Protocols useful on the Internet from distributed signature schemes. International Journal of Information Security 2004; 3(2): 61-69.

Mir, J.; Borrell, J.; Daza, V. Un canal de comunicaciones anónimo. Novática revista de la Asociación de Técnicos de Informática 2004; (172): 10-14.

2003 (1)

Daza V.; Herranz J.; Saez G.. Constructing general dynamic group key distribution schemes with decentralized user join. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2003; 2727: 464-475.

2002 (1)

Daza V.; Herranz J.; Padro C.; Saez G.. A distributed and computationally secure key distribution scheme. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2002; 2433: 342-356.

2001 (1)

Blundo C.; D¿Arco P.; Daza V.; Padro C.. Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2001; 2200: 1-17.