- Blockchain Technology Applications and Security
- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Advanced Malware Detection Techniques
- Digital Transformation in Industry
- Experimental Learning in Engineering
- IoT and Edge/Fog Computing
- Business, Innovation, and Economy
- Occupational Health and Safety in Workplaces
- Technology in Education and Healthcare
- Digital Platforms and Economics
- FinTech, Crowdfunding, Digital Finance
- Numerical Methods and Algorithms
- Benford’s Law and Fraud Detection
- Stochastic Gradient Optimization Techniques
- Cryptographic Implementations and Security
- Scientific Research and Discoveries
- Law, AI, and Intellectual Property
- Advanced Computational Techniques and Applications
- Digital Filter Design and Implementation
- Internet of Things and AI
- Dye analysis and toxicity
- Energy, Environment, and Transportation Policies
- Digital Transformation in Law
- Software Engineering and Design Patterns
Euskadiko Parke Teknologikoa
2019-2024
Tecnalia
2019-2024
Boeing (Spain)
2024
Digital Research Alliance of Canada
2024
Association of Electronic and Information Technologies
2022
University of the Basque Country
2022
Universidad de Deusto
2006-2007
The recent increase in reported incidents of security breaches compromising users' privacy call into question the current centralized model which third-parties collect and control massive amounts personal data. Blockchain has demonstrated that trusted auditable computing is possible using a decentralized network peers accompanied by public ledger. Furthermore, Homomorphic Encryption (HE) guarantees confidentiality not only on computation but also transmission, storage processes. synergy...
Big data has proven to be a very useful tool for companies and users, but with larger datasets have ended being more competitive than the others thanks machine learning or artificial intelligence. Secure multi-party computation (SMPC) allows smaller jointly train arbitrary models on their private while assuring privacy, thus gives owners ability perform what are currently known as federated algorithms. Besides, blockchain it is possible coordinate audit those computations in decentralized...
This paper provides an empirical study to identify the objective of companies that are currently investing in adopting blockchain technologies improve their processes and services. Unlike other studies based on theoretical potential application technology different sectors, main this is analyze real projects investment technology. More than 100 from sectors were examined with aim extracting perceived applicability business value by managers, customers, partners. We identified most demanded...
This paper aims to analyse the potential impact that blockchain technology will have on cybersecurity industry. We look at different applications of in field cybersecurity, as well a new trend decentralisation services. Blockchain is precisely architecture enables processes and business models, which could direct consequence services, industry itself. Cybersecurity companies adapt ecosystem enable crowdsourcing Keywords: Blockchain, Cybersecurity, Disruptive Technology, Technology...
The emerging concept of Industry 5.0 presents new challenges related to sustainability, resilience, and worker welfare in industrial companies; that are vital for social development the coming years. We believe blockchain can help face these thanks trust security it provides complex ecosystems such as supply chains. To verify this hypothesis, paper performs a Systematic Literature Review (SLR) based on two stages. A first stage focused analysis publications 5.0. Being novel term with limited...
Quantum key distribution (QKD) is a cryptographic technique that enables secure private exchange between geographically distant parties over an insecure channel, protecting confidentiality against potential eavesdroppers. QKD has evolved significantly since its inception with the BB84 protocol proposed by Bennett and Brassard in 1984. Its theoretical foundation relies on quantum physics, particularly uncertainty principle, no-cloning theorem, particle entanglement, which ensures...
As the 2030s approach, foundation is being laid for next frontier of mobile communications: era 6G. Although 5G not a mature technology in technological adoption, industry promoting this new paradigm 6G networks. The reason rapid evolution, without letting benefits first one bear fruit or be implemented, none other than advance complementary technologies such as: artificial intelligence, distributed computing and cybersecurity. This article presents network technology, its challenges...
Abstract In the era of Big Data and advancement Internet Things, there is an increasing amount valuable information. It important to emphasize that this data usually sensitive or confidential, so security privacy are two highest priorities for organizations when performing Mining. Researchers have explored techniques such as secure multi-party computation (SMPC) in last decades. Nevertheless, still a significant gap between theory SMPC its applicability, especially working with...
This paper describes an educational tool to facilitate the study of digital signal processing. application offers a GUI support for integrating processing demos, using plugins that execute Octave/Matlab functions. On one hand, this permits students change parameters several examples, classified in categories such as modulations, filter design, speech and image signals analysis other it possibility easily implementing two kinds new plugins, XML based Java based.
This document presents a reference architecture for Blockchain-based Threat Registry platform, named BBTR, to share information about treats among different actors. The design of the BBTR guarantees integrity and availability data stored in it is also compatible with privacy requirements, allowing actors participate as users this shared BaaS (Blockchain Service). paper shows how approach can be combined AI techniques extract valuable from threats directly Blockchain, empowering final...
This paper presents a protocol for Identity Management in Industrial IoT enabled devices, that is based on the principles of Self-Sovereign Identity.The Industry 4.0 transformation has led to sector digitalization and one its major challenges uniquely identify Internet Things unattended devices.The digital identity management must allow increasing security control, it been evolving towards model where device acquires responsibility managing own data through Identity.This studies why approach...
This paper describes the educational utility named casSP when studying digital signal processing. CasSP offers a GUI support for integrating processing demos using plugins described in XML format and executing Octave/Matlab functions. On one hand, this application enables students to change parameters of several examples. other it possibility implementing new easily.