Óscar Lage

ORCID: 0000-0003-1168-1932
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Advanced Malware Detection Techniques
  • Digital Transformation in Industry
  • Experimental Learning in Engineering
  • IoT and Edge/Fog Computing
  • Business, Innovation, and Economy
  • Occupational Health and Safety in Workplaces
  • Technology in Education and Healthcare
  • Digital Platforms and Economics
  • FinTech, Crowdfunding, Digital Finance
  • Numerical Methods and Algorithms
  • Benford’s Law and Fraud Detection
  • Stochastic Gradient Optimization Techniques
  • Cryptographic Implementations and Security
  • Scientific Research and Discoveries
  • Law, AI, and Intellectual Property
  • Advanced Computational Techniques and Applications
  • Digital Filter Design and Implementation
  • Internet of Things and AI
  • Dye analysis and toxicity
  • Energy, Environment, and Transportation Policies
  • Digital Transformation in Law
  • Software Engineering and Design Patterns

Euskadiko Parke Teknologikoa
2019-2024

Tecnalia
2019-2024

Boeing (Spain)
2024

Digital Research Alliance of Canada
2024

Association of Electronic and Information Technologies
2022

University of the Basque Country
2022

Universidad de Deusto
2006-2007

The recent increase in reported incidents of security breaches compromising users' privacy call into question the current centralized model which third-parties collect and control massive amounts personal data. Blockchain has demonstrated that trusted auditable computing is possible using a decentralized network peers accompanied by public ledger. Furthermore, Homomorphic Encryption (HE) guarantees confidentiality not only on computation but also transmission, storage processes. synergy...

10.1016/j.ipm.2021.102745 article EN cc-by-nc-nd Information Processing & Management 2021-09-10

Big data has proven to be a very useful tool for companies and users, but with larger datasets have ended being more competitive than the others thanks machine learning or artificial intelligence. Secure multi-party computation (SMPC) allows smaller jointly train arbitrary models on their private while assuring privacy, thus gives owners ability perform what are currently known as federated algorithms. Besides, blockchain it is possible coordinate audit those computations in decentralized...

10.1145/3652162 article EN ACM Transactions on Privacy and Security 2024-03-16

This paper provides an empirical study to identify the objective of companies that are currently investing in adopting blockchain technologies improve their processes and services. Unlike other studies based on theoretical potential application technology different sectors, main this is analyze real projects investment technology. More than 100 from sectors were examined with aim extracting perceived applicability business value by managers, customers, partners. We identified most demanded...

10.3390/electronics11030438 article EN Electronics 2022-02-01

This paper aims to analyse the potential impact that blockchain technology will have on cybersecurity industry. We look at different applications of in field cybersecurity, as well a new trend decentralisation services. Blockchain is precisely architecture enables processes and business models, which could direct consequence services, industry itself. Cybersecurity companies adapt ecosystem enable crowdsourcing Keywords: Blockchain, Cybersecurity, Disruptive Technology, Technology...

10.6036/10188 article EN DYNA 2021-05-01

The emerging concept of Industry 5.0 presents new challenges related to sustainability, resilience, and worker welfare in industrial companies; that are vital for social development the coming years. We believe blockchain can help face these thanks trust security it provides complex ecosystems such as supply chains. To verify this hypothesis, paper performs a Systematic Literature Review (SLR) based on two stages. A first stage focused analysis publications 5.0. Being novel term with limited...

10.6036/10804 article EN DYNA 2023-06-17

Quantum key distribution (QKD) is a cryptographic technique that enables secure private exchange between geographically distant parties over an insecure channel, protecting confidentiality against potential eavesdroppers. QKD has evolved significantly since its inception with the BB84 protocol proposed by Bennett and Brassard in 1984. Its theoretical foundation relies on quantum physics, particularly uncertainty principle, no-cloning theorem, particle entanglement, which ensures...

10.1364/optcon.530352 article EN cc-by Optics Continuum 2024-07-22

As the 2030s approach, foundation is being laid for next frontier of mobile communications: era 6G. Although 5G not a mature technology in technological adoption, industry promoting this new paradigm 6G networks. The reason rapid evolution, without letting benefits first one bear fruit or be implemented, none other than advance complementary technologies such as: artificial intelligence, distributed computing and cybersecurity. This article presents network technology, its challenges...

10.52152/d11260 article EN DYNA 2024-09-01

Abstract In the era of Big Data and advancement Internet Things, there is an increasing amount valuable information. It important to emphasize that this data usually sensitive or confidential, so security privacy are two highest priorities for organizations when performing Mining. Researchers have explored techniques such as secure multi-party computation (SMPC) in last decades. Nevertheless, still a significant gap between theory SMPC its applicability, especially working with...

10.1007/s10207-024-00939-4 article EN cc-by International Journal of Information Security 2024-11-21

This paper describes an educational tool to facilitate the study of digital signal processing. application offers a GUI support for integrating processing demos, using plugins that execute Octave/Matlab functions. On one hand, this permits students change parameters several examples, classified in categories such as modulations, filter design, speech and image signals analysis other it possibility easily implementing two kinds new plugins, XML based Java based.

10.1109/icassp.2007.366779 article EN 2007-01-01

This document presents a reference architecture for Blockchain-based Threat Registry platform, named BBTR, to share information about treats among different actors. The design of the BBTR guarantees integrity and availability data stored in it is also compatible with privacy requirements, allowing actors participate as users this shared BaaS (Blockchain Service). paper shows how approach can be combined AI techniques extract valuable from threats directly Blockchain, empowering final...

10.1109/iemcon.2019.8936249 article EN 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) 2019-10-01

This paper presents a protocol for Identity Management in Industrial IoT enabled devices, that is based on the principles of Self-Sovereign Identity.The Industry 4.0 transformation has led to sector digitalization and one its major challenges uniquely identify Internet Things unattended devices.The digital identity management must allow increasing security control, it been evolving towards model where device acquires responsibility managing own data through Identity.This studies why approach...

10.12785/ijcds/120153 article EN cc-by-nc-nd International Journal of Computing and Digital Systems 2022-08-06

This paper describes the educational utility named casSP when studying digital signal processing. CasSP offers a GUI support for integrating processing demos using plugins described in XML format and executing Octave/Matlab functions. On one hand, this application enables students to change parameters of several examples. other it possibility implementing new easily.

10.1109/isspa.2007.4555441 article EN 2007-02-01
Coming Soon ...