Aleix Dorca Josa

Aleix Dorca Josa
University of Andorra · IT

PhD

About

11
Publications
13,552
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
54
Citations
Additional affiliations
September 2017 - present
University of Andorra
Position
  • Professor
July 2005 - present
University of Andorra
Position
  • Head of Department

Publications

Publications (11)
Article
Full-text available
Attribute-based credentials (ABCs) provide an efficient way to transfer custody of personal and private data to the final user, while minimizing the risk of sensitive data revelation and thus granting anonymity. Nevertheless, this method cannot detect whether one attribute has been used more than once without compromising anonymity when the emitter...
Article
Full-text available
Study design: Randomized crossover study. Objective: To compare exercise, the gold standard, to the postural garment PosturePlusForce® in the management of nonspecific cervical pain in women. We also analyzed both interventions with regards to baseline posture, use of pharmacological pain relievers, compliance, and comfort. Summary of backgroun...
Thesis
Full-text available
Biometric identification systems based on Keystroke Dynamics have been around for almost forty years now. There has always been a lot of interest in identifying individuals using their physiological or behavioral traits. Keystroke Dynamics focuses on the particular way a person types on a keyboard. The objective of the proposed research is to dete...
Conference Paper
Full-text available
Over the last few years, the scope of the university, traditionally focused on young adults, has been revisited; universities have started an opening process towards today's information-driven society to contribute to the transformation of our education system. Since 2007, Universitat d'Andorra (UdA) has embraced this new era by implementing multip...
Conference Paper
Full-text available
Using off-the-shelf keyboards and the possibility of measuring the particular rhythm a user has when typing on a computer system has led to the possibility of identifying these users. Over the years, obtaining good Authentication, Identification and Verification methods has been the main focus of Keystroke Dynamics. The objective of the proposed re...
Conference Paper
Full-text available
User identification using biometric techniques has been a proven method to complement, or substitute, other methods like passwords or tokens when these have not been robust enough. In this article a study is detailed where keystroke dynamics have been used in conjunction with context information of the written words. User samples have been gathered...
Conference Paper
Full-text available
Las redes industriales y, concretamente, las redes de sensores son hoy en día una realidad emergente y con muchas expectativas de cara al futuro sobre todo en entornos empresariales o públicos. Los grandes ayuntamientos están creando las smart-cities con este tipo de estructuras. Entre los estándares que existen parece que hay dos que se imponen, l...
Article
Full-text available
Si tota la formació es fa a distància, per què els exàmens en aquest tipus d'ensenyament no ho són? Probablement hi hauran diverses visions a l'hora de respondre aquesta pregunta. En tot cas, per poc que pensem en la realització d'exàmens a distància ens sorgeixen un seguit de qüestions per resoldre: com podem assegurar l'autenticitat i integritat...
Book
Ten questions and their answers on how dignital signature schemes work and how that may be used in order to sign electronic documents - and also verify signatures. (in Catalan)
Conference Paper
Full-text available
We present design guidelines for a cryptographic scheme destined for an electronic survey software system developed in view of application in higher-education institutions. By using commercial-grade software, we can provide a user-friendly environment that, on the other hand, can also ensure anonymous participation. We describe the implementation o...
Conference Paper
Full-text available
Secure electronic exams are one of the most difficult challenges in e-learning security. The relevance of the examination process for any academic institution implies that different security mechanisms must be applied in order to preserve some security properties during different examination stages. In this paper, we present a secure e-exam managem...

Network

Cited By

Projects

Projects (3)
Project
Evaluate the current offer of Computational Thinking subjects in the Andorran school system and propose strategies to awake STEM skills in younger minds.
Project
Biometric identification systems based on Keystroke Dynamics have been around for almost forty years now. There has always been a lot of interest in identifying persons using their physiological or behavioral traits. Keystroke Dynamics focuses on the particular way a person types on a keyboard. The objective of my current research is to determine how well can the identity of a user be established when using this biometric trait. To do so a template of the user will be built using the context of the written words and the latency between successive keystrokes. Ultimately, the main objective is to determine how much information is needed to have a good degree of certainty that a new sample will be identified as belonging to a particular user.