Skip to main content

Showing 1–6 of 6 results for author: Soler, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.17710  [pdf, ps, other

    cs.SE cs.CY

    LLM Contribution Summarization in Software Projects

    Authors: Rafael Corsi Ferrao, Fabio Roberto de Miranda, Diego Pavan Soler

    Abstract: This full paper in innovative practice provides an automated tool to summarize individual code contributions in project-based courses with external clients. Real industry projects offer valuable learning opportunities by immersing students in authentic problems defined by external clients. However, the open-ended and highly variable scope of these projects makes it challenging for instructors and… ▽ More

    Submitted 23 May, 2025; originally announced May 2025.

  2. arXiv:2502.18303  [pdf, other

    cs.CR

    Experimental Analysis of Efficiency of the Messaging Layer Security for Multiple Delivery Services

    Authors: David Soler, Carlos Dafonte, Manuel Fernández-Veiga, Ana Fernández Vilas, Francisco J. Nóvoa

    Abstract: Messaging Layer security (MLS) and its underlying Continuous Group Key Agreement (CGKA) protocol allows a group of users to share a cryptographic secret in a dynamic manner, such that the secret is modified in member insertions and deletions. One of the most relevant contributions of MLS is its efficiency, as its communication cost scales logarithmically with the number of members. However, this c… ▽ More

    Submitted 25 February, 2025; originally announced February 2025.

    Comments: 27 pages, 13 figures. Preprint: Submitted for review to Computers & Security (Elsevier)

  3. arXiv:2405.12042  [pdf, ps, other

    cs.CR

    Attribute-Based Authentication in Secure Group Messaging for Distributed Environments

    Authors: David Soler, Carlos Dafonte, Manuel Fernández-Veiga, Ana Fernández Vilas, Francisco J. Nóvoa

    Abstract: Messaging Layer security (MLS) and its underlying Continuous Group Key Agreement (CGKA) protocol allows a group of users to share a cryptographic secret in a dynamic manner, such that the secret is modified in member insertions and deletions. Although this flexibility makes MLS ideal for implementations in distributed environments, a number of issues need to be overcome. Particularly, the use of d… ▽ More

    Submitted 30 May, 2025; v1 submitted 20 May, 2024; originally announced May 2024.

    Comments: 30 pages, 6 figures. Submitted to Cybersecurity

  4. arXiv:2402.11384  [pdf, other

    cs.LG math-ph math.OC

    Reinforcement learning to maximise wind turbine energy generation

    Authors: Daniel Soler, Oscar Mariño, David Huergo, Martín de Frutos, Esteban Ferrer

    Abstract: We propose a reinforcement learning strategy to control wind turbine energy generation by actively changing the rotor speed, the rotor yaw angle and the blade pitch angle. A double deep Q-learning with a prioritized experience replay agent is coupled with a blade element momentum model and is trained to allow control for changing winds. The agent is trained to decide the best control (speed, yaw,… ▽ More

    Submitted 17 February, 2024; originally announced February 2024.

  5. QKDNetSim+: Improvement of the Quantum Network Simulator for NS-3

    Authors: David Soler, Iván Cillero, Carlos Dafonte, Manuel Fernández-Veiga, Ana Fernández-Vilas, Francisco J. Nóvoa

    Abstract: The first Quantum Key Distribution (QKD) networks are currently being deployed, but the implementation cost is still prohibitive for most researchers. As such, there is a need for realistic QKD network simulators. The \textit{QKDNetSim} module for the network simulator NS-3 focuses on the representation of packets and the management of key material in a QKD network at the application layer. Althou… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

    Comments: 15 pages, 5 figures, preprint submitted to SoftwareX

  6. A Privacy-preserving key transmission protocol to distribute QRNG keys using zk-SNARKs

    Authors: David Soler, Carlos Dafonte, Manuel Fernández-Veiga, Ana Fernández Vilas, Francisco J. Nóvoa

    Abstract: High-entropy random numbers are an essential part of cryptography, and Quantum Random Number Generators (QRNG) are an emergent technology that can provide high-quality keys for cryptographic algorithms but unfortunately are currently difficult to access. Existing Entropy-as-a-Service solutions require users to trust the central authority distributing the key material, which is not desirable in a h… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

    Comments: 36 pages, 6 figures. Submitted to Computer Networks