{"id":31210,"date":"1997-01-01T00:00:00","date_gmt":"1997-01-01T00:00:00","guid":{"rendered":"https:\/\/www.deberes.net\/tesis\/sin-categoria\/estudio-y-desarrollo-de-un-esquema-criptografico-para-realizar-votaciones-seguras-sobre-una-red-local\/"},"modified":"1997-01-01T00:00:00","modified_gmt":"1997-01-01T00:00:00","slug":"estudio-y-desarrollo-de-un-esquema-criptografico-para-realizar-votaciones-seguras-sobre-una-red-local","status":"publish","type":"post","link":"https:\/\/www.deberes.net\/tesis\/matematicas\/estudio-y-desarrollo-de-un-esquema-criptografico-para-realizar-votaciones-seguras-sobre-una-red-local\/","title":{"rendered":"Estudio y desarrollo de un esquema criptografico para realizar votaciones seguras sobre una red local."},"content":{"rendered":"<h2>Tesis doctoral de <strong> Joan Borrell Viader <\/strong><\/h2>\n<p>La tesis presenta el dise\u00f1o de un esquema criptografico que permite llevar a cabo votaciones sobre una red local de ordenadores. Dicho esquema garantiza los principios de privacidad, democracia, correccion e imparcialidad de las votaciones que regula, asegurando ademas la libertad de comportamiento (abstencion, votos nulos, &#8230;) De los votantes. La baja complejidad criptografica y de comunicaciones del esquema permite su implementacion sobre una red de ordenadores usual. Acompa\u00f1a al dise\u00f1o del esquema un analisis detallado del mismo para dirigir su desarrollo real sobre una red local, con la utilizacion de llamadas a procedimientos remotos sobre tcp\/ip y la herramienta de desarrollo de aplicaciones seguras \u00absecude\u00bb.<\/p>\n<p>&nbsp;<\/p>\n<h3>Datos acad\u00e9micos de la tesis doctoral \u00ab<strong>Estudio y desarrollo de un esquema criptografico para realizar votaciones seguras sobre una red local.<\/strong>\u00ab<\/h3>\n<ul>\n<li><strong>T\u00edtulo de la tesis:<\/strong>\u00a0 Estudio y desarrollo de un esquema criptografico para realizar votaciones seguras sobre una red local. <\/li>\n<li><strong>Autor:<\/strong>\u00a0 Joan Borrell Viader <\/li>\n<li><strong>Universidad:<\/strong>\u00a0 Aut\u00f3noma de barcelona<\/li>\n<li><strong>Fecha de lectura de la tesis:<\/strong>\u00a0 01\/01\/1997<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Direcci\u00f3n y tribunal<\/h3>\n<ul>\n<li><strong>Director de la tesis<\/strong>\n<ul>\n<li>Josep Rifa Coma<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tribunal<\/strong>\n<ul>\n<li>Presidente del tribunal: Lloren\u00ed\u00a7 Huguet Rotger <\/li>\n<li>Josep Domingo Ferrer (vocal)<\/li>\n<li>Manel Medinas Llinas (vocal)<\/li>\n<li>Carles Padro Laimon (vocal)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tesis doctoral de Joan Borrell Viader La tesis presenta el dise\u00f1o de un esquema criptografico que permite llevar a cabo [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[1890,332,4149,126,40832,2535],"tags":[87194,57721,40351,12503,12504,40349],"class_list":["post-31210","post","type-post","status-publish","format-standard","hentry","category-ciencia-de-los-ordenadores","category-ciencias-tecnologicas","category-diseno-y-componentes-de-sistemas-de-informacion","category-matematicas","category-redes-de-ordenadores","category-tecnologia-de-los-ordenadores","tag-carles-padro-laimon","tag-joan-borrell-viader","tag-josep-domingo-ferrer","tag-josep-rifa-coma","tag-lloreni-huguet-rotger","tag-manel-medinas-llinas"],"_links":{"self":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/31210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/comments?post=31210"}],"version-history":[{"count":0,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/31210\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/media?parent=31210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/categories?post=31210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/tags?post=31210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}