Scroll Top
Previous publications

Eduardo B. Fernandez, Antonio Muñoz

A cluster of patterns for Trusted Computing Forthcoming

In: International Journal of Information Security, vol. XX, iss. XX, no. XX, pp. XX, Forthcoming.

Abstract | BibTeX

Davide Ferraris, Carmen Fernandez-Gago, Younes Assouyat, Houda Labiod, Wang Haiguang, Javier Lopez

Trust dynamicity for IoT: How do i trust your social IoT cluster?

In: Internet of Things, vol. 30, 2025.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

Digital Twin Security: A Perspective on Efforts From Standardization Bodies

In: IEEE Security & Privacy, vol. 23, iss. 1, pp. 83-90, 2025, ISSN: 1558-4046.

Abstract | BibTeX | Links:

Ruben Rios, Jose A. Montenegro, Antonio Muñoz, Davide Ferraris

Toward the Quantum-Safe Web: Benchmarking Post-Quantum TLS Forthcoming

In: IEEE Network, Forthcoming, ISSN: 0890-8044.

Abstract | BibTeX | Links:

Digital Twin-assisted anomaly detection for industrial scenarios

Cristina Alcaraz, Javier Lopez

Digital Twin-assisted anomaly detection for industrial scenarios

In: International Journal of Critical Infrastructure Protection, vol. 47, pp. 100721, 2024, ISSN: 1874-5482.

Abstract | BibTeX | Links:

Cristina Alcaraz, Iman Hasnaouia Meskini, Javier Lopez

Digital twin communities: an approach for secure DT data sharing

In: International Journal of Information Security, vol. 24, no. 17, 2024, ISSN: 1615-5270.

Abstract | BibTeX | Links:

Daniel Morales, Isaac Agudo, Javier Lopez

Toward a Framework for Cost-Effective and Publicly Verifiable Confidential Computations in Blockchain

In: IEEE Communications Magazine, 2024, ISSN: 1558-1896.

Abstract | BibTeX | Links:

Carmen Fernandez-Gago, Davide Ferraris, Rodrigo Roman, Javier Lopez

Trust interoperability in the Internet of Things

In: Internet of Things, vol. 26, 2024.

Abstract | BibTeX | Links:

DAR-LFC: A data-driven attack recovery mechanism for Load Frequency Control

Andrew D. Syrmakesis, Cristina Alcaraz, Nikos D. Hatziargyriou

DAR-LFC: A data-driven attack recovery mechanism for Load Frequency Control

In: International Journal of Critical Infrastructure Protection, vol. 45, iss. 100678, pp. 100678, 2024, ISSN: 1874-5482.

Abstract | BibTeX | Links:

Jose A. Onieva, Pablo Pérez Jiménez, Javier Lopez

Malware similarity and a new fuzzy hash: Compound Code Block Hash (CCBHash)

In: Computers & Security, vol. 142, 2024, ISBN: 0167-4048.

BibTeX | Links:

Cristina Alcaraz, Javier Lopez

Protecting Digital Twin Networks for 6G-enabled Industry 5.0 Ecosystems

In: IEEE Network Magazine, vol. 37, no. 2, pp. 302-308, 2023, ISSN: 0890-8044.

Abstract | BibTeX | Links:

Davide Ferraris, Carmen Fernandez-Gago, Rodrigo Roman, Javier Lopez

A Survey on IoT Trust Model Frameworks

In: The Journal of Supercomputing, vol. 80, pp. 8259–8296, 2023.

Abstract | BibTeX | Links:

Cristina Alcaraz, Jesus Cumplido, Alicia Triviño

OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0

In: International Journal of Information Security, 2023, ISSN: 1615-5262.

Abstract | BibTeX | Links:

Daniel Morales, Isaac Agudo, Javier Lopez

Private set intersection: A systematic literature review

In: Computer Science Review, vol. 49, no. 100567, 2023, ISSN: 1574-0137.

Abstract | BibTeX | Links:

Rodrigo Roman, Cristina Alcaraz, Javier Lopez, Kouichi Sakurai

Current Perspectives on Securing Critical Infrastructures’ Supply Chains

In: IEEE Security & Privacy, vol. 21, no. 4, pp. 29-38, 2023, ISSN: 1540-7993.

BibTeX | Links:

Antonio Muñoz, Ruben Rios, Rodrigo Roman, Javier Lopez

A survey on the (in)security of Trusted Execution Environments

In: Computers & Security, pp. 103-180, 2023, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Antonio Muñoz, Carmen Fernandez-Gago, Roberto Lopez-Villa

A Test Environment for Wireless Hacking in Domestic IoT Scenarios

In: Mobile Networks and Applications, 2022, ISSN: 1383-469X.

BibTeX | Links:

George Suciu, Aristeidis Farao, Giorgio Bernardinetti, Ivan Palamá, Mari-Anais Sachian, Alexandru Vulpe, Marius-Constantin Vochin, Pavel Muresan, Michail Bampatsikos, Antonio Muñoz, Christos Xenakis

SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform

In: SENSORS, vol. 22, iss. 6527, no. 17, 2022, ISSN: 1424-8220.

Abstract | BibTeX | Links:

Andrew D. Syrmakesis, Cristina Alcaraz, Nikos D. Hatziargyriou

Classifying resilience approaches for protecting smart grids against cyber threats

In: International Journal of Information Security, vol. 21, pp. 1189–1210, 2022, ISSN: 1615-5262.

Abstract | BibTeX | Links:

Xueou Wang, Xiaolu Hou, Ruben Rios, Nils Ole Tippenhauer, Martin Ochoa

Constrained Proximity Attacks on Mobile Targets

In: ACM Transactions on Privacy and Security (TOPS), vol. 25, no. 10, pp. 1 – 29, 2022, ISSN: 2471-2566.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

Digital Twin: A Comprehensive Survey of Security Threats

In: IEEE Communications Surveys & Tutorials, vol. 24, no. thirdquarter 2022, pp. 1475 – 1503, 2022, ISSN: 1553-877X.

Abstract | BibTeX | Links:

Ishak Meraouche, Sabyasachi Dutta, Sraban Kumar Mohanty, Isaac Agudo, Kouichi Sakurai

Learning multi-party adversarial encryption and its application to secret sharing

In: IEEE Access, 2022, ISSN: 2169-3536.

Abstract | BibTeX | Links:

Ruben Rios, Jose A. Onieva, Rodrigo Roman, Javier Lopez

Personal IoT Privacy Control at the Edge

In: IEEE Security & Privacy, vol. 20, pp. 23 – 32, 2022, ISSN: 1540-7993.

Abstract | BibTeX | Links:

Francesco Flammini, Cristina Alcaraz, Emanuele Bellini, Stefano Marrone, Javier Lopez, Andrea Bondavalli

Towards Trustworthy Autonomous Systems: Taxonomies and Future Perspectives

In: IEEE Transactions on Emerging Topics in Computing, 2022, ISSN: 2168-6750.

Abstract | BibTeX | Links:

Simone Fischer-Hübner, Cristina Alcaraz, Afonso Ferreira, Carmen Fernandez-Gago, Javier Lopez, Evangelos Markatos, Lejla Islami, Mahdi Akil

Stakeholder Perspectives and Requirements on Cybersecurity in Europe

In: Journal of Information Security and Applications, vol. 61, no. 102916, 2021, ISSN: 2214-2126.

BibTeX | Links:

Antonio Muñoz, Aristeidis Farao, Ryan Casas, Christos Xenakis

P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements

In: Information, vol. 12, no. 357, 2021, ISSN: 2078-2489,.

BibTeX | Links:

Isaac Agudo, Manuel Montenegro-Gómez, Javier Lopez

A Blockchain Approach for Decentralized V2X (D-V2X)

In: IEEE Transactions on Vehicular Technology, vol. 70, no. 5, pp. 4001 – 4010, 2021, ISSN: 0018-9545.

Abstract | BibTeX | Links:

Javier Lopez, Juan E. Rubio, Cristina Alcaraz

Digital Twins for Intelligent Authorization in the B5G-enabled Smart Grid

In: IEEE Wireless Communications, vol. 28, pp. 48-55, 2021, ISSN: 1536-1284.

Abstract | BibTeX | Links:

Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez

A model-driven approach to ensure trust in the IoT

In: Human-centric Computing and Information Sciences, vol. 10, no. 50, 2020, ISSN: 2192-1962.

Abstract | BibTeX | Links:

Juan E. Rubio, Rodrigo Roman, Javier Lopez

Integration of a Threat Traceability Solution in the Industrial Internet of Things

In: IEEE Transactions on Industrial Informatics, vol. 16, no. 6575-6583, 2020, ISSN: 1551-3203.

Abstract | BibTeX | Links:

Ana Nieto

Becoming JUDAS: Correlating Users and Devices during a Digital Investigation

In: IEEE Transactions on Information Forensics & Security, vol. 15, pp. 3325-3334, 2020, ISSN: 1556-6013.

Abstract | BibTeX | Links:

Cristina Alcaraz, Juan E. Rubio, Javier Lopez

Blockchain-Assisted Access for Federated Smart Grid Domains: Coupling and Features

In: Journal of Parallel and Distributed Computing, vol. 144, pp. 124-135, 2020, ISSN: 0743-7315.

BibTeX | Links:

Davide Ferraris, Daniel Bastos, Carmen Fernandez-Gago, Fadi El-Moussa

A Trust Model for Popular Smart Home Devices

In: International Journal of Information Security, 2020, ISSN: 1615-5262.

Abstract | BibTeX | Links:

Cristina Alcaraz, Giuseppe Bernieri, Federica Pascucci, Javier Lopez, Roberto Setola

Covert Channels-based Stealth Attacks in Industry 4.0

In: IEEE Systems Journal., vol. 13, pp. 3980-3988, 2019, ISSN: 1932-8184.

Abstract | BibTeX | Links:

Juan E. Rubio, Cristina Alcaraz, Rodrigo Roman, Javier Lopez

Current Cyber-Defense Trends in Industrial Control Systems

In: Computers & Security Journal, vol. 87, 2019, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Jose A. Onieva, Ruben Rios, Rodrigo Roman, Javier Lopez

Edge-Assisted Vehicular Networks Security

In: IEEE Internet of Things Journal, vol. 6, pp. 8038-8045, 2019, ISSN: 2327-4662.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

Escrowed decryption protocols for lawful interception of encrypted data

In: IET Information Security, vol. 13, pp. 498 – 507, 2019, ISSN: 1751-8709.

Abstract | BibTeX | Links:

Juan E. Rubio, Rodrigo Roman, Cristina Alcaraz, Yan Zhang

Tracking APTs in Industrial Ecosystems: A Proof of Concept

In: Journal of Computer Security, vol. 27, pp. 521-546, 2019, ISSN: 0167-4048.

BibTeX | Links:

Rodrigo Roman, Ruben Rios, Jose A. Onieva, Javier Lopez

Immune System for the Internet of Things using Edge Technologies

In: IEEE Internet of Things Journal, vol. 6, pp. 4774-4781, 2019, ISSN: 2327-4662.

Abstract | BibTeX | Links:

Martin Kolar, Carmen Fernandez-Gago, Javier Lopez

A Model Specification for the Design of Trust Negotiations

In: Computers & Security, vol. 84, pp. 288-300, 2019, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Detection of Node Capture Attack in Wireless Sensor Networks

Sarita Agrawal, Manik Lal Das, Javier Lopez

Detection of Node Capture Attack in Wireless Sensor Networks

In: IEEE Systems Journal, vol. 13, pp. 238 – 247, 2019, ISSN: 1932-8184.

BibTeX

Ana Nieto, Ruben Rios

Cybersecurity Profiles based on Human-Centric IoT Devices

In: Human-centric Computing and Information Sciences, vol. 9, no. 1, pp. 1-23, 2019, ISSN: 2192-1962.

BibTeX | Links:

Davide Ferraris, Carmen Fernandez-Gago

TrUStAPIS: A Trust Requirements Elicitation Method for IoT

In: International Journal of Information Security, pp. 111-127, 2019, ISSN: 1615-5262.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

A Cyber-Physical Systems-Based Checkpoint Model for Structural Controllability

In: IEEE Systems Journal, vol. 12, pp. 3543-3554, 2018, ISSN: 1932-8184.

Abstract | BibTeX | Links:

Ana Nieto, Antonio Acien, Gerardo Fernandez

Crowdsourcing analysis in 5G IoT: Cybersecurity Threats and Mitigation

In: Mobile Networks and Applications (MONET), pp. 881-889, 2018, ISSN: 1383-469X.

Abstract | BibTeX | Links:

Hiroshi Tsunoda, Rodrigo Roman, Javier Lopez, Glenn Mansfield Keeni

Feasibility of Societal Model for Securing Internet of Things

In: KSII Transactions on Internet and Information Systems, vol. 12, no. 8, pp. 3567-3588, 2018, ISSN: 1976-7277.

Abstract | BibTeX | Links:

Javier Lopez, Juan E. Rubio, Cristina Alcaraz

A Resilient Architecture for the Smart Grid

In: IEEE Transactions on Industrial Informatics, vol. 14, pp. 3745-3753, 2018, ISSN: 1551-3203.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Stefanos Gritzalis

Evolution and Trends in the Security of the Internet of Things

In: IEEE Computer, vol. 51, pp. 16-25, 2018, ISSN: 0018-9162.

BibTeX | Links:

Survey of IoT-enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services

Ioannis Stellios, Panayiotis Kotzanikolaou, Mihalis Psarakis, Cristina Alcaraz, Javier Lopez

Survey of IoT-enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services

In: IEEE Communications Surveys and Tutorials, vol. 20, pp. 3453-3495, 2018, ISSN: 1553-877X.

Abstract | BibTeX | Links:

Lorena Cazorla, Cristina Alcaraz, Javier Lopez

Cyber Stealth Attacks in Critical Information Infrastructures

In: IEEE Systems Journal, vol. 12, pp. 1778-1792, 2018, ISSN: 1932-8184.

Abstract | BibTeX | Links:

Cristina Alcaraz

Cloud-Assisted Dynamic Resilience for Cyber-Physical Control Systems

In: IEEE Wireless Communications, vol. 25, no. 1, pp. 76-82, 2018, ISSN: 1536-1284.

BibTeX | Links:

Ana Nieto, Ruben Rios, Javier Lopez

IoT-Forensics meets Privacy: Towards Cooperative Digital Investigations

In: Sensors, vol. 18, no. 492, 2018, ISSN: 1424-8220.

Abstract | BibTeX | Links:

Javier Lopez, Juan E. Rubio

Access control for cyber-physical systems interconnected to the cloud

In: Computer Networks, vol. 134, pp. 46 – 54, 2018, ISSN: 1389-1286.

BibTeX | Links:

Rodrigo Roman, Javier Lopez, Masahiro Mambo

Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges

In: Future Generation Computer Systems, vol. 78, pp. 680-698, 2018, ISSN: 0167-739X.

Abstract | BibTeX | Links:

Ruben Rios, Carmen Fernandez-Gago, Javier Lopez

Modelling Privacy-Aware Trust Negotiations

In: Computers & Security, vol. 77, pp. 773-789, 2018, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Ana Nieto, Nikolaos Nomikos, Javier Lopez, Charalambos Skianis

Dynamic Knowledge-based Analysis in non-Secure 5G Green Environments using Contextual Data

In: IEEE Systems Journal, vol. 11, no. 99, pp. 2479-2489, 2017, ISSN: 1932-8184.

Abstract | BibTeX | Links:

Cristina Alcaraz

Resilient Industrial Control Systems based on Multiple Redundancy

In: International Journal of Critical Infrastructures (IJCIS), vol. 13, no. 2/3, pp. 278 – 295, 2017, ISSN: 1741-8038.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez, Kim-Kwang Raymond Choo

Resilient Interconnection in Cyber-Physical Control Systems

In: Computers & Security, vol. 71, pp. 2-14, 2017, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Javier Lopez, Ruben Rios, Feng Bao, Guilin Wang

Evolving privacy: From sensors to the Internet of Things

In: Future Generation Computer Systems, vol. 75, pp. 46–57, 2017, ISSN: 0167-739X.

Abstract | BibTeX | Links:

Juan E. Rubio, Cristina Alcaraz, Javier Lopez

Recommender System for Privacy-Preserving Solutions in Smart Metering

In: Pervasive and Mobile Computing, vol. 41, pp. 205-218, 2017, ISSN: 1574-1192.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

Proxy Re-Encryption: Analysis of Constructions and its Application to Secure Access Delegation

In: Journal of Network and Computer Applications, vol. 87, pp. 193-209, 2017, ISSN: 1084-8045.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez, Stephen Wolthusen

OCPP Protocol: Security Threats and Challenges

In: IEEE Transactions on Smart Grid, vol. 8, pp. 2452 – 2459, 2017, ISSN: 1949-3053.

Abstract | BibTeX | Links:

Carmen Fernandez-Gago, Francisco Moyano, Javier Lopez

Modelling Trust Dynamics in the Internet of Things

In: Information Sciences, vol. 396, pp. 72-82, 2017, ISSN: 0020-0255.

Abstract | BibTeX | Links:

Ana Nieto, Rodrigo Roman, Javier Lopez

Testificación Digital

In: Revista SIC, vol. 122, pp. 94-98, 2016, ISSN: 1136-0623.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

On the Application of Generic CCA-Secure Transformations to Proxy Re-Encryption

In: Security and Communication Networks, vol. 9, pp. 1769-1785, 2016, ISSN: 1939-0114.

Abstract | BibTeX | Links:

David Nuñez, Carmen Fernandez-Gago, Jesús Luna

Eliciting Metrics for Accountability of Cloud Systems

In: Computers & Security, vol. 62, pp. 149-164, 2016, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Ana Nieto, Rodrigo Roman, Javier Lopez

Digital Witness: Digital Evidence Management Framework for the Internet of Things

In: ERCIM News, no. 106, pp. 9-9, 2016, ISSN: 0926-4981.

BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez

A Model-driven Approach for Engineering Trust and Reputation into Software Services

In: Journal of Network and Computer Applications, vol. 69, pp. 134-151, 2016, ISSN: 1084-8045.

BibTeX | Links:

Ana Nieto, Rodrigo Roman, Javier Lopez

Digital Witness: Safeguarding Digital Evidence by using Secure Architectures in Personal Devices

In: IEEE Network, pp. 12-19, 2016, ISSN: 0890-8044.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez, Stephen Wolthusen

Policy Enforcement System for Secure Interoperable Control in Distributed Smart Grid Systems

In: Journal of Network and Computer Applications, vol. 59, pp. 301–314, 2016, ISSN: 1084-8045.

Abstract | BibTeX | Links:

Ana Nieto, Javier Lopez

Contextualising Heterogeneous Information in Unified Communications with Security Restrictions

In: Computer Communications, vol. 68, pp. 33-46, 2015, ISSN: 0140-3664.

Abstract | BibTeX | Links:

Ruben Rios, Jorge Cuellar, Javier Lopez

Probabilistic receiver-location privacy protection in wireless sensor networks

In: Information Sciences, vol. 321, pp. 205 – 223, 2015, ISSN: 0020-0255.

Abstract | BibTeX | Links:

Relay Selection for Secure 5G Green Communications

Nikolaos Nomikos, Ana Nieto, Prodromos Makris, Dimitrios N. Skoutas, Demosthenes Vouyioukas, Panagiotis Rizomiliotis, Javier Lopez, Charalambos Skianis

Relay Selection for Secure 5G Green Communications

In: Telecommunication Systems, vol. 59, pp. 169-187, 2015, ISSN: 1018-4864.

Abstract | BibTeX | Links:

Lorena Cazorla, Cristina Alcaraz, Javier Lopez

Awareness and Reaction Strategies for Critical Infrastructure Protection

In: Computers and Electrical Engineering, vol. 47, pp. 299-317, 2015, ISSN: 0045-7906.

Abstract | BibTeX | Links:

Cristina Alcaraz, Sherali Zeadally

Critical Infrastructure Protection: Requirements and Challenges for the 21st Century

In: International Journal of Critical Infrastructure Protection (IJCIP), vol. 8, pp. 53–66, 2015, ISSN: 1874-5482.

Abstract | BibTeX | Links:

Lorena Cazorla, Cristina Alcaraz, Javier Lopez

A Three-Stage Analysis of IDS for Critical Infrastructures

In: Computers & Security, vol. 55, no. November, pp. 235-250, 2015, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Jose A. Montenegro, Javier Lopez

A practical solution for sealed bid and multi-currency auctions

In: Computers & Security, vol. 45, pp. 186-198, 2014, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Ana Nieto, Javier Lopez

A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms

In: Mobile Networks and Applications (MONET) Journal, vol. 19, pp. 64-78, 2014, ISSN: 1383-469X.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo

BlindIdM: A Privacy-Preserving Approach for Identity Management as a Service

In: International Journal of Information Security, vol. 13, pp. 199-215, 2014, ISSN: 1615-5262.

Abstract | BibTeX | Links:

Carmen Fernandez-Gago, Isaac Agudo, Javier Lopez

Building Trust from Context Similarity Measures

In: Computer Standards & Interfaces, Special Issue on Security in Information Systems, vol. 36, pp. 792-800, 2014, ISSN: 0920-5489.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

Diagnosis Mechanism for Accurate Monitoring in Critical Infrastructure Protection

In: Computer Standards & Interfaces, vol. 36, pp. 501-512, 2014, ISSN: 0920-5489.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

WASAM: A Dynamic Wide-Area Situational Awareness Model for Critical Domains in Smart Grids

In: Future Generation Computer Systems, vol. 30, pp. 146-154, 2014, ISSN: 0167-739X.

Abstract | BibTeX | Links:

Ruben Rios, Jose A. Onieva, Javier Lopez

Covert Communications through Network Configuration Messages

In: Computers & Security, vol. 39, Part A, pp. 34 – 46, 2013, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez

A Framework for Enabling Trust Requirements in Social Cloud Applications

In: Requirements Engineering, vol. 18, pp. 321-341, 2013, ISSN: 0947-3602.

Abstract | BibTeX | Links:

Isaac Agudo, Ruben Rios, Javier Lopez

A Privacy-Aware Continuous Authentication Scheme for Proximity-Based Access Control

In: Computers & Security, vol. 39 (B), pp. 117-126, 2013, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Javier Lopez, Cristina Alcaraz, Rodrigo Roman

Smart Control of Operational Threats in Control Substations

In: Computers & Security, vol. 38, pp. 14-27, 2013, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Pablo Najera, Rodrigo Roman, Javier Lopez

User-centric secure integration of personal RFID tags and sensor networks

In: Security and Communication Networks, vol. 6, pp. 1177–1197, 2013, ISSN: 1939-0114.

Abstract | BibTeX | Links:

Rodrigo Roman, Jianying Zhou, Javier Lopez

On the features and challenges of security and privacy in distributed internet of things

In: Computer Networks, vol. 57, pp. 2266–2279, 2013, ISSN: 1389-1286.

Abstract | BibTeX | Links:

Jose A. Montenegro, Michael J. Fischer, Javier Lopez, Rene Peralta

Secure sealed-bid online auctions using discreet cryptographic proofs

In: Mathematical and Computer Modelling, vol. 57, pp. 2583–2595, 2013, ISSN: 0895-7177.

Abstract | BibTeX | Links:

Ruben Rios, Javier Lopez

(Un)Suitability of Anonymous Communication Systems to WSN

In: IEEE Systems Journal, vol. 7, no. 2, pp. 298 – 310, 2013, ISSN: 1932-8184.

Abstract | BibTeX | Links:

Ana Nieto, Javier Lopez

Analysis and Taxonomy of Security/QoS tradeoff solutions for the Future Internet

In: Security and Communication Networks (SCN) Journal, vol. 7, pp. 2778-2803, 2013, ISSN: 1939-0114.

Abstract | BibTeX | Links:

Cristina Alcaraz, Sherali Zeadally

Critical Control System Protection in the 21st Century: Threats and Solutions

In: IEEE Computer, vol. 46, no. 10, pp. 74 – 83, 2013, ISSN: 0018-9162.

Abstract | BibTeX | Links:

Cristina Alcaraz, Rodrigo Roman, Pablo Najera, Javier Lopez

Security of Industrial Sensor Network-based Remote Substations in the context of the Internet of Things

In: Ad Hoc Networks, vol. 11, pp. 1091–1104, 2013, ISSN: 1570-8705.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

Wide-Area Situational Awareness for Critical Infrastructure Protection

In: IEEE Computer, vol. 46, no. 4, pp. 30-37, 2013, ISSN: 0018-9162.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez, Rodrigo Roman, Hsiao-Hwa Chen

Selecting key management schemes for WSN applications

In: Computers & Security, vol. 31, no. 38, pp. 956–966, 2012, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Sherali Zeadally, Al-Sakib Khan Pathan, Cristina Alcaraz, Mohamad Badra

Towards Privacy Protection in Smart Grid

In: Wireless Personal Communications, vol. 73, pp. 23-50, 2012, ISSN: 0929-6212.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Olivier Dugeon, Marc Lacoste, Pierre Plaza Tron, Marta Bel

Advanced Secure Multimedia Services for Digital Homes

In: Information Systems Frontiers, vol. 14, pp. 527-540, 2012, ISSN: 1387-3326.

Abstract | BibTeX | Links:

David Galindo, Rodrigo Roman, Javier Lopez

On the Energy Cost of Authenticated Key Agreement in Wireless Sensor Networks

In: Wireless Communications and Mobile Computing, vol. 12, pp. 133-143, 2012, ISSN: 1530-8669.

Abstract | BibTeX | Links:

Antonio Muñoz

A performance-oriented monitoring system for security properties in cloud computing applications

In: The Computer Journal, 2012, ISSN: 1460-2067.

BibTeX | Links:

Cristina Alcaraz, Javier Lopez

Analysis of Requirements for Critical Control Systems

In: International Journal of Critical Infrastructure Protection (IJCIP), vol. 5, pp. 137–145, 2012, ISSN: 1874-5482.

Abstract | BibTeX | Links:

Ruben Rios, Javier Lopez

Analysis of Location Privacy Solutions in Wireless Sensor Networks

In: IET Communications, vol. 5, pp. 2518 – 2532, 2011, ISSN: 1751-8628.

Abstract | BibTeX | Links:

Cristina Alcaraz, Carmen Fernandez-Gago, Javier Lopez

An Early Warning System based on Reputation for Energy Control Systems

In: IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 827-834, 2011, ISSN: 1949-3053.

Abstract | BibTeX | Links:

Ruben Rios, Javier Lopez

Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks

In: The Computer Journal, vol. 54, pp. 1603-1615, 2011, ISSN: 0010-4620.

Abstract | BibTeX | Links:

Rodrigo Roman, Pablo Najera, Javier Lopez

Securing the Internet of Things

In: IEEE Computer, vol. 44, no. 9, pp. 51 -58, 2011, ISSN: 0018-9162.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez, Jianying Zhou, Rodrigo Roman

Secure SCADA Framework for the Protection of Energy Control Systems

In: Concurrency and Computation Practice & Experience, vol. 23, no. 12, pp. 1414-1430, 2011, ISSN: 1532-0626.

Abstract | BibTeX | Links:

Rodrigo Roman, Cristina Alcaraz, Javier Lopez, Nicolas Sklavos

Key management systems for sensor networks in the context of the Internet of Things

In: Computers & Electrical Engineering, vol. 37, pp. 147-159, 2011, ISSN: 0045-7906.

Abstract | BibTeX | Links:

Jose L. Vivas, Isaac Agudo, Javier Lopez

A methodology for security assurance-driven system development

In: Requirements Engineering, vol. 16, no. 1, pp. 55-73, 2011, ISSN: 0947-3602.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez, Mario Piattini

Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid systems

In: IEICE Trans. on Information and Systems, vol. E94-D, pp. 243-254, 2011, ISSN: 0916-8532.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Pablo Najera

A Cross-layer Approach for Integrating Security Mechanisms in Sensor Networks Architectures

In: Wireless Communications and Mobile Computing, vol. 11, pp. 267-276, 2011, ISSN: 1530-8669.

Abstract | BibTeX | Links:

Pablo Najera, Javier Lopez

Real-time Location and Inpatient Care Systems Based on Passive RFID

In: Journal of Network and Computer Applications, vol. 34, pp. pp. 980-989, 2011, ISSN: 1084-8045.

Abstract | BibTeX | Links:

Security Services Architecture for Secure Mobile Grid Systems

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

Security Services Architecture for Secure Mobile Grid Systems

In: Journal of Systems Architecture, vol. 57, pp. 240-258, 2011, ISSN: 1383-7621.

Abstract | BibTeX

Systematic Design of Secure Mobile Grid Systems

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez, Mario Piattini

Systematic Design of Secure Mobile Grid Systems

In: Journal of Network and Computer Applications, vol. 34, pp. 1168-1183, 2011, ISSN: 1084-8045.

Abstract | BibTeX

Jose L. Vivas, Carmen Fernandez-Gago, Andres Benjumea, Javier Lopez

A security framework for a workflow-based grid development platform.

In: Computer Standards and Interfaces, vol. 32, no. 5-6, pp. 230-245, 2010, ISSN: 0920-5489.

Abstract | BibTeX | Links:

Developing a Secure Mobile Grid System through a UML Extension

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez, Mario Piattini

Developing a Secure Mobile Grid System through a UML Extension

In: Journal of Universal Computer Science, vol. 16, no. 17, pp. 2333-2352, 2010, ISSN: 0948-695x.

Abstract | BibTeX | Links:

Isaac Agudo, Carmen Fernandez-Gago, Javier Lopez

A Scale Based Trust Model for Multi-Context Environments

In: Computers and Mathematics with Applications, vol. 60, pp. 209-216, 2010, ISSN: 0898-1221.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems

In: IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 40, no. 4, pp. 419-428, 2010, ISSN: 1094-6977.

Abstract | BibTeX | Links:

Analysis of Secure Mobile Grid Systems: A Systematic Approach

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez, Mario Piattini

Analysis of Secure Mobile Grid Systems: A Systematic Approach

In: Information and Software Technology, vol. 52, pp. 517-536, 2010, ISSN: 0950-5849.

Abstract | BibTeX | Links:

Javier Lopez, Rodrigo Roman, Pablo Najera

Los Desafíos de Seguridad en la Internet de los Objetos

In: Revista SIC, vol. 88, pp. 66-73, 2010, ISSN: 1136-0623.

Abstract | BibTeX | Links:

Ying Qiu, Jianying Zhou, Joonsang Baek, Javier Lopez

Authentication and Key Establishment in Dynamic Wireless Sensor Networks

In: Sensors, vol. 10, pp. 3718-3731, 2010, ISSN: 1424-8220.

BibTeX | Links:

Josep L. Ferrer-Gomila, Jose A. Onieva, Magdalena Payeras, Javier Lopez

Certified electronic mail: Properties revisited

In: Computers & Security, vol. 29, no. 2, pp. 167 – 179, 2010, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Isaac Agudo

Digital Identity and Identity Management Technologies

In: UPGRADE – The European Journal of the Informatics Professional, vol. 2010, pp. 6 – 12, 2010, ISSN: 1684-5285.

Abstract | BibTeX | Links:

Jordi Forne, M. Francisca Hinarejos, Andres Marin, Florina Almenarez, Javier Lopez, Jose A. Montenegro, Marc Lacoste, Daniel Diaz

Pervasive Authentication and Authorization Infrastructures for Mobile Users

In: Computer and Security, vol. 29, pp. 501-514, 2010, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Javier Lopez, Rodrigo Roman, Isaac Agudo, Carmen Fernandez-Gago

Trust Management Systems for Wireless Sensor Networks: Best practices

In: Computer Communications, vol. 33, no. 9, pp. 0140-3664, 2010, ISSN: 0140-3664.

Abstract | BibTeX | Links:

Isaac Agudo, Carmen Fernandez-Gago, Javier Lopez

Concurrent access control for multi-user and multi-processor systems based on trust relationships

In: Concurrency and Computation: Practice and Experience, vol. 21, pp. 1389-1403, 2009, ISSN: 1532-0626.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez

Integrating Wireless Sensor Networks and the Internet: A Security Analysis

In: Internet Research, vol. 19, no. 2, pp. 246-259, 2009, ISSN: 1066-2243.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

Obtaining Security Requirements for a Mobile Grid System

In: International Journal of Grid and High Performance Computing, vol. 1, pp. 1-17, 2009, ISSN: 1938-0259.

Abstract | BibTeX | Links:

Mildrey Carbonell, Jose Maria Sierra, Javier Lopez

Secure multiparty payment with an intermediary entity

In: Computers and Security, vol. 28, no. 5, pp. 289-300, 2009, ISSN: 0167-4048.

BibTeX | Links:

Pablo Najera, Francisco Moyano, Javier Lopez

Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents

In: Journal of Universal Computer Science, vol. 15, pp. 970-991, 2009, ISSN: 0948-695X.

Abstract | BibTeX | Links:

Cristina Alcaraz, Gerardo Fernandez, Rodrigo Roman, Angel Balastegui, Javier Lopez

Gestión segura de redes SCADA

In: Nuevas tendencias en gestión de redes, Novática, no. 196, pp. 20-25, 2008, ISSN: 0211-2124.

Abstract | BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Javier Lopez

Multi-Party Nonrepudiation: A survey

In: ACM Comput. Surveys, vol. 41, no. 1, pp. 5, 2008, ISSN: 0360-0300.

Abstract | BibTeX | Links:

Cristina Alcaraz, Gerardo Fernandez, Rodrigo Roman, Angel Balastegui, Javier Lopez

Secure Management of SCADA Networks

In: Novatica, New Trends in Network Management, vol. 9, no. 6, pp. 22-28, 2008, ISSN: 1684-5285.

Abstract | BibTeX | Links:

Isaac Agudo, Javier Lopez, Jose A. Montenegro

Enabling Attribute Delegation in Ubiquitous Environments

In: Mobile Networks and Applications, vol. 13, no. 3-4, pp. 398-410, 2008, ISSN: 1383-469X.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Stefanos Gritzalis

Situation Awareness Mechanisms for Wireless Sensor Networks

In: IEEE Communications Magazine, vol. 46, no. 4, pp. 102-107, 2008, ISSN: 0163-6804.

Abstract | BibTeX | Links:

Vicente Benjumea, Javier Lopez, Jose M. Troya

Anonymity Analysis in Credentials-based Systems: A Formal Framework

In: Computer Standards & Interfaces, vol. 30, no. 4, pp. 253-261, 2008, ISSN: 0920-5489.

Abstract | BibTeX | Links:

Jose A. Onieva, Javier Lopez, Rodrigo Roman, Jianying Zhou, Stefanos Gritzalis

Integration of non-repudiation services in mobile DRM scenarios

In: Telecommunications Systems, vol. 35, pp. 161-176, 2007, ISSN: 1572-9451.

Abstract | BibTeX | Links:

Rodrigo Roman, Cristina Alcaraz, Javier Lopez

A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes

In: Mobile Networks and Applications, vol. 12, no. 4, pp. 231-244, 2007, ISSN: 1383-469X.

Abstract | BibTeX | Links:

Javier Lopez, Isaac Agudo, Jose A. Montenegro

On the deployment of a real scalable delegation service

In: Information Security Technical Report, vol. 12, no. 3, pp. 139-147, 2007, ISSN: 1363-4127.

Abstract | BibTeX | Links:

Jianying Zhou, Wee-Yung Chin, Rodrigo Roman, Javier Lopez

An Effective Multi-layered Defense Framework Against Spam

In: Information Security Technical Report, vol. 12, no. 3, pp. 179-185, 2007, ISSN: 1363-4127.

Abstract | BibTeX | Links:

Rodrigo Roman, Cristina Alcaraz, Javier Lopez

The Role of Wireless Sensor Networks in the Area of Critical Information Infrastructure

In: Information Security Technical Report, vol. 12, no. 1, pp. 24-31, 2007, ISSN: 1363-4127.

Abstract | BibTeX | Links:

Clare Dixon, Carmen Fernandez-Gago, Michael Fisher, Wiebe Hoek

Temporal Logics of Knowledge and their Applications in Security

In: First Workshop in Information and Computer Security (ICS’06), vol. 186, pp. 27-42, 2007, ISSN: 1571-0661.

Abstract | BibTeX | Links:

Vicente Benjumea, Javier Lopez, Jose M. Troya

Anonymous Attribute Certificates based on Traceable Signatures

In: Internet Research, vol. 16, no. 2, pp. 120-139, 2006, ISSN: 1066-2243.

Abstract | BibTeX | Links:

Rodrigo Roman, Jianying Zhou, Javier Lopez

An Anti-spam Scheme Using Pre-challenges

In: Computer Communications, vol. 29, no. 15, pp. 2739-2749, 2006, ISSN: 0140-3664.

Abstract | BibTeX | Links:

Vicente Benjumea, Javier Lopez, Jose M. Troya

Specification of a Framework for the Anonymous Use of Privileges

In: Telematics and Informatics, vol. 23, no. 3, pp. 179-195, 2006, ISSN: 0736-5853.

Abstract | BibTeX | Links:

Unleashing Public-Key Cryptography in Wireless Sensor Networks

Javier Lopez

Unleashing Public-Key Cryptography in Wireless Sensor Networks

In: Journal of Computer Security, vol. 14, no. 5, pp. 469-482, 2006, ISSN: 0926-227X.

BibTeX

Isaac Agudo, Javier Lopez, Jose A. Montenegro

A Graphical Delegation Solution for X.509 Attribute Certificates

In: ERCIM News, no. 63, pp. 33-34, 2005, ISSN: 0926-4981.

BibTeX | Links:

Javier Lopez, Jose A. Montenegro, Jose L. Vivas, Eiji Okamoto, Ed Dawson

Specification and Design of Advanced Authentication and Authorization Services

In: Computer Standards & Interfaces, vol. 27, no. 5, pp. 467-478, 2005, ISSN: 0920-5489.

Abstract | BibTeX | Links:

Rodrigo Roman, Jianying Zhou, Javier Lopez

Casual Virtual Private Network

In: International Journal of Computer Systems Science & Engineering, vol. 3, pp. 185-192, 2005, ISSN: 0267-6192.

Abstract | BibTeX | Links:

Carmen Fernandez-Gago, Ullrich Hustadt, Clare Dixon, Michael Fisher, Boris Konev

First-Order Temporal Verification in Practice

In: Journal of Automated Reasoning, vol. 34, pp. 295-321, 2005, ISSN: 0168-7433.

Abstract | BibTeX | Links:

Alan Winfield, Jin Sa, Carmen Fernandez-Gago, Clare Dixon, Michael Fisher

On the Formal Specification of Emergent Behaviours of Swarm Robotics Systems

In: International Journal of Advanced Robotics Systems, vol. 2, pp. 363-371, 2005, ISSN: 1729-8806.

Abstract | BibTeX | Links:

Mariemma I. Yague, Antonio Mana, Javier Lopez

A Metadata-based Access Control Model for Web Services

In: Internet Research Journal, vol. 15, no. 1, pp. 99-116, 2005.

BibTeX | Links:

Jianying Zhou, Jose A. Onieva, Javier Lopez

Optimised Multi-Party Certified Email Protocols

In: Information Management & Computer Security Journal, vol. 13, no. 5, pp. 350-366, 2005, ISSN: 0968- 5227.

Abstract | BibTeX | Links:

Javier Lopez, Juan J. Ortega, Jose M. Troya

Security Protocols Analysis: A SDL-based Approach

In: Computer Standards & Interfaces, vol. 27, no. 3, pp. 489-499, 2005, ISSN: 0920-5489.

Abstract | BibTeX | Links:

Sokratis K. Katsikas, Javier Lopez, Guenther Pernul

Trust, Privacy and Security in Digital Business

In: International Journal of Computer Systems, Science & Engineering, vol. 20, no. 6, 2005, ISSN: 0267-6192.

Abstract | BibTeX | Links:

Javier Lopez, Rolf Oppliger, Guenther Pernul

Why Public Key Infrastructures have failed so far?

In: Internet Research, vol. 15, no. 5, pp. 544-556, 2005, ISSN: 1066-2243.

Abstract | BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Javier Lopez, Mildrey Carbonell

Agent-mediated non-repudiation protocols

In: Electronic Commerce Research and Applications, vol. 3, no. 2, pp. 152-162, 2004, ISSN: 1567-4223.

Abstract | BibTeX | Links:

Javier Lopez, Rolf Oppliger, Guenther Pernul

Authentication and Authorization Infrastructures (AAIs): A Comparative Survey

In: Computers & Security, vol. 23, no. 7, pp. 578-590, 2004, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Antonio Mana, Javier Lopez, Juan J. Ortega, Ernesto Pimentel, Jose M. Troya

A Framework for Secure Execution of Software

In: International Journal of Information Security (IJIS), vol. 3, no. 2, pp. 99-112, 2004, ISSN: 1615-5262.

Abstract | BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Javier Lopez

Non-repudiation Protocols for Multiple Entities

In: Computer Communications, vol. 27, no. 16, pp. 1608-1616, 2004, ISSN: 0140-3664.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Jose A. Montenegro, Juan J. Ortega

PKI Design Based on the Use of On-line Certification Authorities

In: International Journal of Information Security (IJIS), vol. 2, no. 2, pp. 91-102, 2004, ISSN: 1615-5262.

Abstract | BibTeX | Links:

Sigrid Gurgens, Javier Lopez, Rene Peralta

Analysis of E-commerce Protocols: Adapting a Traditional Technique

In: International Journal of Information Security, vol. 2, no. 1, pp. 21-36, 2003, ISSN: 1615-5262.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Juan J. Ortega, Jose M. Troya, Mariemma I. Yague

Integrating PMI Services in CORBA Applications

In: Computer Standards & Interfaces, vol. 25, no. 4, pp. 391-409, 2003, ISSN: 0920-5489.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Ernesto Pimentel, Jose M. Troya, Mariemma I. Yague

A Secure Solution for Commercial Digital Libraries

In: Online Information Review Journal, vol. 27, no. 3, pp. 147-159, 2003, ISSN: 1468-4527.

BibTeX | Links:

Selwyn Russell, Ed Dawson, Eiji Okamoto, Javier Lopez

Virtual Certificates and Synthetic Certificates: New Paradigms for Improving Public Key Validation

In: Computer Communications, vol. 26, no. 16, pp. 1826-1838, 2003, ISSN: 0140-3664.

Abstract | BibTeX | Links:

Proyecto CASENET: Integración del Diseño y Análisis de Protocolos Segurospara el Comerio-e

Javier Lopez

Proyecto CASENET: Integración del Diseño y Análisis de Protocolos Segurospara el Comerio-e

In: Revista SIC: Seguridad en Informática y Comunicaciones, vol. 49, pp. 1-2, 2002, ISSN: 1136-06.

BibTeX

Javier Lopez, Antonio Mana, Pedro Merino, Jose M. Troya

The Role of Smartcards in Practial Information Security

In: ERCIM News, vol. 49, pp. 38-40, 2002, ISSN: 0926-4981.

Abstract | BibTeX | Links:

Servicios de Notarización Electrónica

Javier Lopez

Servicios de Notarización Electrónica

In: Revista SIC: Seguridad en Informática y Comunicaciones, vol. 38, pp. 1-5, 2001, ISSN: 1136-0623.

BibTeX

Sistemas Electrónicos de Micropago

Jorge Davila, Javier Lopez

Sistemas Electrónicos de Micropago

In: Revista de Contratación Electrónica, vol. 22, pp. 3-22, 2001, ISSN: 1576-2033.

BibTeX

Diseño de Protocolos de No-Repudio

Jorge Davila, Javier Lopez, Felipe Rosello

Diseño de Protocolos de No-Repudio

In: Revista SIC: Seguridad en Informática y Comunicaciones, vol. 38, pp. 1-5, 2000, ISSN: 1136-0623.

BibTeX

Javier Areitio, Javier Lopez, Jose M. Troya

Horizontes y Tendencias de Seguridad en Internet

In: Novática, vol. 145, pp. 65-71, 2000, ISSN: 0211-2124.

Abstract | BibTeX | Links:

Contribuciones de la Tecnología de Detección y Respuesta a Intrusiones y Ataques a la Construcción de la Confianza

Javier Areitio, Javier Lopez

Contribuciones de la Tecnología de Detección y Respuesta a Intrusiones y Ataques a la Construcción de la Confianza

In: Novática, vol. 141, pp. 24-27, 1999.

BibTeX

Gonzalo Ramos, Javier Lopez, Rafael Morales

Comparisons of Parikh’s conditions to other conditions for context-free languages

In: Theoretical Computer Science, vol. 202, no. 1-2, pp. 231-244, 1998, ISSN: 0304-3975.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Juan J. Ortega, Lucia Pino

Una Solución Integral para la Autenticación de Usuarios y la Administración de Claves en Internet

In: Novática, vol. 134, pp. 20-26, 1998, ISSN: 0211-2124.

Abstract | BibTeX | Links:

Davide Ferraris, Konstantinos Kotis, Christos Kalloniatis

Enhancing TrUStAPIS Methodology in the Web of Things with LLM-generated IoT Trust Semantics Forthcoming

In: 26th International Conference on Information and Communications Security (ICICS 2024), Springer, Mytilene, Lesvos, Greece, Forthcoming.

BibTeX | Links:

Davide Ferraris, Lorenzo Monti

DrATC: Dynamic routing Algorithm based on Trust Characteristics Forthcoming

In: The 20th International Workshop on Security and Trust Management (STM 2024), Springer, Bydgoszcz, Poland, Forthcoming.

BibTeX | Links:

Patxi Juaristi, Isaac Agudo, Ruben Rios, Laura Ricci

Benchmarking post-quantum cryptography in Ethereum-based blockchains Forthcoming

In: 8th International Workshop on Cryptocurrencies and Blockchain Technology (CBT 2024), Springer, Bydgoszcz, Poland, Forthcoming.

Abstract | BibTeX | Links:

Pablo Sánchez-Serrano, Ruben Rios, Isaac Agudo

Privacy-preserving tabular data generation: Systematic Literature Review Forthcoming

In: 19th DPM International Workshop on Data Privacy Management (DPM 2024), Springer, Bydgoszcz, Poland, Forthcoming.

Abstract | BibTeX | Links:

SYNAPSE - An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness Capabilities

Panagiotis Bountakas, Konstantinos Fysarakis, Thomas Kyriakakis, Panagiotis Karafotis, Sotiropoulos Aristeidis, Maria Tasouli, Cristina Alcaraz, George Alexandris, Vassiliki Andronikou, Tzortzia Koutsouri, Romarick Yatagha, George Spanoudakis, Sotiris Ioannidis, Fabio Martinelli, Oleg Illiashenko

SYNAPSE – An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness Capabilities Forthcoming

In: 4th International Workshop on Advances on Privacy Preserving Technologies and Solutions(IWAPS) , Forthcoming.

Abstract | BibTeX | Links:

Alberto Garcia, Cristina Alcaraz, Javier Lopez

MAS para la convergencia de opiniones y detección de anomalías en sistemas ciberfísicos distribuidos

In: VIII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), Vigo, 2023.

BibTeX | Links:

Daniel Morales, Isaac Agudo

Cryptographic approaches for confidential computations in blockchain

In: XVI Jornadas de Ingeniería Telemática, pp. 110-113, Barcelona, 2023, ISBN: 978-84-09-58148-1.

Abstract | BibTeX | Links:

Daniel Morales, Isaac Agudo, Javier Lopez

Integration of MPC into Besu through an extended private transaction model

In: IEEE International Conference on Metaverse Computing, Networking and Applications, pp. 266-273, IEEE Computer Society IEEE, Kyoto, Japan, 2023.

Abstract | BibTeX | Links:

Pablo Pérez Jiménez, Jose A. Onieva, Gerardo Fernandez

CCBHash (Compound Code Block Hash) para Análisis de Malware

In: XVII Reunión Española sobre Criptología y Seguridad de la Información, pp. 168-173, 2022, ISBN: 978-84-19024-14-5.

Abstract | BibTeX | Links:

Manuel Ruiz, Ruben Rios, Rodrigo Roman, Antonio Muñoz, Juan Manuel Martínez, Jorge Wallace

AndroCIES: Automatización de la certificación de seguridad para aplicaciones Android

In: XVII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2022), pp. 192-197, Ediciones Universidad Cantabria Ediciones Universidad Cantabria, Santander, Spain, 2022.

Abstract | BibTeX | Links:

Jesus Cumplido, Cristina Alcaraz, Javier Lopez

Collaborative anomaly detection system for charging stations

In: The 27th European Symposium on Research in Computer Security (ESORICS 2022), pp. 716–736, Springer, Cham Springer, Cham, 2022.

Abstract | BibTeX | Links:

Configuration vulnerability in SNORT for Windows operating systems

Luca Faramondi, Marta Grassi, Simone Guarino, Roberto Setola, Cristina Alcaraz

Configuration vulnerability in SNORT for Windows operating systems

In: 2022 IEEE International Conference on Cyber Security and Resilience (IEEE CSR), pp. 82-89, IEEE IEEE, https://www.ieee-csr.org, 2022, ISBN: 978-1-6654-9952-1.

Abstract | BibTeX | Links:

Daniel Morales, Isaac Agudo, Javier Lopez

Real-time Crowd Counting based on Wearable Ephemeral IDs

In: 19th International Conference on Security and Cryptography (SECRYPT 2022), pp. 249-260, Scitepress Scitepress, Lisbon, 2022, ISSN: 2184-7711.

Abstract | BibTeX | Links:

Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez

Verification and Validation Methods for a Trust-by-Design Framework for the IoT

In: 36th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec’22), pp. 183-194, Springer Springer, Newark, NJ, USA, 2022, ISBN: 978-3-031-10683-5.

BibTeX | Links:

Cristina Alcaraz, Alberto Garcia, Javier Lopez

Implicaciones de seguridad en MAS Desplegados en Infraestructuras de Carga basadas en OCPP

In: VII Jornadas Nacionales en Investigación en Ciberseguridad (JNIC 2022), pp. 172-179, 2022, ISBN: 978-84-88734-13-6.

Abstract | BibTeX | Links:

Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez

Novel Approaches for the Development of Trusted IoT Entities

In: 37th International Conference on ICT Systems Security and Privacy Protection – IFIP SEC 2022, pp. 215-230, Springer Springer, Copenhagen, 2022, ISSN: 1868-4238.

BibTeX | Links:

Manuel Ruiz, Ruben Rios, Rodrigo Roman, Javier Lopez

Privacidad Contextual en entornos Edge

In: VII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2022), pp. 122-129, Bilbao, Spain, 2022, ISBN: 978-84-88734-13-6.

Abstract | BibTeX | Links:

Cristina Alcaraz, Jesus Cumplido, Alicia Triviño

Monitorización Segura en Infraestructuras de Carga de Vehículos Eléctricos Frente a Ciber-Ataques

In: Actas del XII International Greencities Congress, Greencities, Inteligencia y Sostenibilidad Urbana, & S-Moving, Movilidad Inteligente y Sostenible, pp. 17-30, FYCMA – Palacio de Ferias y Congresos de Málaga, 2021, ISBN: 978-84-09-19596-1.

Abstract | BibTeX

Martin Kolar, Carmen Fernandez-Gago, Javier Lopez

A Model Specification Implementation for Trust Negotiation

In: The 14th International Conference on Network and System Security (NSS 2020), pp. 327-341, Springer Springer, Melbourne, Australia, 2020.

Abstract | BibTeX | Links:

Juan E. Rubio, Cristina Alcaraz, Javier Lopez

Game Theory-Based Approach for Defense against APTs

In: 18th International Conference on Applied Cryptography and Network Security (ACNS’20), pp. 297-320, Springer Springer, 2020, ISBN: 978-3-030-57878-7.

BibTeX | Links:

Juan E. Rubio, Cristina Alcaraz, Ruben Rios, Rodrigo Roman, Javier Lopez

Distributed Detection of APTs: Consensus vs. Clustering

In: 25th European Symposium on Research in Computer Security (ESORICS 2020), pp. 174-192, 2020, ISBN: 978-3-030-58951-6.

BibTeX | Links:

Antonio Muñoz

ICITPM: Integrity validation of software in iterative Continuous Integration through the use of Trusted Platform Module (TPM)

In: Aristeidis Farao (Ed.): 1st Workshop on Dependability and Safety Emerging Cloud and Fog Systems (DeSECSyS) – Colocated with ESORICS, Guildford (United Kingdom). September 2020., pp. 147–165, Springer Springer, 2020, ISBN: 978-3-030-66504-3.

Abstract | BibTeX | Links:

Isaac Agudo, Ruben Rios, Ana Nieto

Personalized Computer Security Tasks with Automatic Evaluation and Feedback

In: International Conference on Information Systems Education and Research (AIS SIGED 2019), 2019, ISBN: 978-1-7343123-0-0.

BibTeX | Links:

Aristeidis Farao, Juan E. Rubio, Cristina Alcaraz, Christoforos Ntantogian, Christos Xenakis, Javier Lopez

SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications

In: 14th International Conference on Critical Information Infrastructures Security (CRITIS 2019), pp. 169-175, Springer, Cham Springer, Cham, 2019, ISBN: 978-3-030-37669-7.

Abstract | BibTeX | Links:

Isaac Agudo, Manuel Montenegro-Gómez

Desarrollo de un semáforo inteligente basado en comunicaciones seguras

In: XIV Jornadas de Ingeniería Telemática (JITEL 2019), 2019.

Abstract | BibTeX | Links:

Daniel Morales, Isaac Agudo

Prueba de concepto de Autoridad de Certificación usando Computación Segura Multiparte

In: XIV Jornadas de Ingeniería Telemática, pp. 50-53, Zaragoza, 2019, ISBN: 978-84-09-21112-8.

Abstract | BibTeX | Links:

Juan E. Rubio, Mark Manulis, Cristina Alcaraz, Javier Lopez

Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics

In: European Symposium on Research in Computer Security (ESORICS2019), pp. 263-280, 2019.

BibTeX | Links:

Raúl Ocaña, Isaac Agudo

Comunicaciones VoIP cifradas usando Intel SGX

In: V Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), 2019.

Abstract | BibTeX | Links:

Davide Ferraris, Carmen Fernandez-Gago, Joshua Daniel, Javier Lopez

A Segregated Architecture for a Trust-based Network of Internet of Things

In: IEEE Consumer Communications & Networking Conference 2019, IEEE IEEE, Las Vegas (USA), 2019.

Abstract | BibTeX | Links:

Davide Ferraris, Daniel Bastos, Carmen Fernandez-Gago, Fadi El-Moussa, Javier Lopez

An Analysis of Trust in Smart Home Devices

In: The 20th World Conference on Information Security Applications: WISA-Workshop 2019, Springer Springer, Jeju Island, Korea, 2019.

Abstract | BibTeX | Links:

Antonio Acien, Ana Nieto, Gerardo Fernandez, Javier Lopez

Definición de procedimientos para fabricar honeypots IoT basados en criterios de búsqueda

In: XV Reunión Española sobre Criptología y Seguridad de la Información, Granada (España), 2018, ISBN: 978-84-09-02463-6.

Abstract | BibTeX | Links:

Antonio Acien, Ana Nieto, Gerardo Fernandez, Javier Lopez

A comprehensive methodology for deploying IoT honeypots

In: 15th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2018), pp. 229–243, Springer Nature Switzerland AG Springer Nature Switzerland AG, Regensburg (Germany), 2018.

Abstract | BibTeX | Links:

Juan E. Rubio, Rodrigo Roman, Javier Lopez

Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection

In: The 12th International Conference on Critical Information Infrastructures Security, pp. 119-130, Springer Springer, 2018.

BibTeX | Links:

Antonio Acien, Ana Nieto, Javier Lopez

Analyzing cross-platform attacks: towards a three-actor approach

In: The 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2018), pp. 536-543, 2018, ISBN: 978-1-5386-7518-2.

Abstract | BibTeX | Links:

Ana Nieto, Antonio Acien, Javier Lopez

Capture the RAT: Proximity-based Attacks in 5G using the Routine Activity Theory

In: The 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2018), pp. 520-527, IEEE IEEE, Athens, Greece, 2018, ISBN: 978-1-5386-7518-2.

Abstract | BibTeX | Links:

Juan E. Rubio, Rodrigo Roman, Cristina Alcaraz, Yan Zhang

Tracking Advanced Persistent Threats in Critical Infrastructures through Opinion Dynamics

In: European Symposium on Research in Computer Security (ESORICS 2018), pp. 555-574, Springer Springer, Barcelona, Spain, 2018.

Abstract | BibTeX | Links:

Ana Nieto

An Overview of Proactive Forensic Solutions and its Applicability to 5G

In: IEEE 5G World Forum (5GWF), pp. 191-196, IEEE, Santa Clara (USA), 2018, ISBN: 978-1-5386-4982-4.

Abstract | BibTeX | Links:

Martin Kolar, Carmen Fernandez-Gago, Javier Lopez

Policy Languages and Their Suitability for Trust Negotiation

In: 32nd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy XXXII, 2018, pp. 69-84, Springer, Cham Springer, Cham, Bergamo, Italy, 2018, ISBN: 978-3-319-95728-9.

Abstract | BibTeX | Links:

Antonio Acien, Ana Nieto, Javier Lopez

Modelo para la clasificación y análisis de ataques Cross-Platform

In: IV Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2018), Servicio Editorial de Mondragon Unibertsitatea Servicio Editorial de Mondragon Unibertsitatea, Donostia-San Sebastián (España), 2018, ISBN: 978-84-09-02697-5.

Abstract | BibTeX | Links:

Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez

A Trust-by-Design Framework for the Internet of Things

In: 2018 9th IFIP International Conference on New Technologies Mobility and Security (NTMS), IEEE IEEE, Paris, 2018, ISSN: 2157-4960.

Abstract | BibTeX | Links:

Juan E. Rubio, Cristina Alcaraz, Javier Lopez

Addressing Security in OCPP: Protection Against Man-in-the-Middle Attacks

In: 9th IFIP International Conference on New Technologies, Mobility & Security, 2018.

BibTeX | Links:

Xueou Wang, Xiaolu Hou, Ruben Rios, Per Hallgren, Nils Ole Tippenhauer, Martin Ochoa

Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies

In: 23rd European Symposium on Research in Computer Security (ESORICS 2018), pp. 373-392, Springer Springer, Barcelona, 2018, ISBN: 978-3-319-98988-4.

Abstract | BibTeX | Links:

NuCypher KMS: Decentralized key management system

Michael Egorov, MacLane Wilkison, David Nuñez

NuCypher KMS: Decentralized key management system

In: Blockchain Protocol Analysis and Security Engineering 2018, 2018.

BibTeX

Jamal Toutouh, Antonio Muñoz, Sergio Nesmachnow

Evolution Oriented Monitoring Oriented to Security Properties for Cloud Applications

In: Proceedings of the 13th International Conference on Availability, Reliability and Security, Association for Computing Machinery, Hamburg, Germany, 2018, ISBN: 9781450364485.

Abstract | BibTeX | Links:

Juan E. Rubio, Cristina Alcaraz, Javier Lopez

Preventing Advanced Persistent Threats in Complex Control Networks

In: European Symposium on Research in Computer Security, pp. 402-418, 22nd European Symposium on Research in Computer Security (ESORICS 2017) 22nd European Symposium on Research in Computer Security (ESORICS 2017), 2017.

BibTeX | Links:

Ana Nieto, Ruben Rios, Javier Lopez

Digital Witness and Privacy in IoT: Anonymous Witnessing Approach

In: 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2017), pp. 642-649, IEEE IEEE, Sydney (Australia), 2017, ISSN: 2324-9013.

Abstract | BibTeX | Links:

Ana Nieto, Ruben Rios, Javier Lopez

A Methodology for Privacy-Aware IoT-Forensics

In: 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2017), pp. 626-633, IEEE IEEE, Sydney (Australia), 2017, ISSN: 2324-9013.

Abstract | BibTeX | Links:

Gerardo Fernandez, Ana Nieto, Javier Lopez

Modeling Malware-driven Honeypots

In: 14th International Conference On Trust, Privacy & Security In Digital Business (TrustBus 2017), pp. 130-144, Springer International Publishing Springer International Publishing, Lyon (France), 2017, ISBN: 978-3-319-64482-0.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

The fallout of key compromise in a proxy-mediated key agreement protocol

In: 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec’17), pp. 453-472, Springer Springer, Philadelphia, USA, 2017, ISBN: 978-3-319-61176-1.

Abstract | BibTeX | Links:

Gerardo Fernandez, Ana Nieto

Configuración de honeypots adaptativos para análisis de malware

In: III Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2017), pp. 91-98, Servicio de Publicaciones de la URJC Servicio de Publicaciones de la URJC, Madrid (Spain), 2017, ISBN: 978-84-608-4659-8.

Abstract | BibTeX | Links:

Ruben Rios, Rodrigo Roman, Jose A. Onieva, Javier Lopez

From Smog to Fog: A Security Perspective

In: 2nd IEEE International Conference on Fog and Edge Mobile Computing (FMEC 2017), pp. 56-61, IEEE Computer Society IEEE Computer Society, Valencia, Spain. 8-11 May 2017, 2017, ISBN: 978-1-5386-2859-1.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Michael Egorov, MacLane Wilkison

Sistema de Acceso Delegado a Información Cifrada para Apache Hadoop

In: III Jornadas Nacionales de Investigación en Ciberseguridad, pp. 174-175, URJC URJC, Madrid, 2017, ISBN: 978-84-608-4659-8.

Abstract | BibTeX | Links:

Ruben Rios, David Nuñez, Javier Lopez

Query Privacy in Sensing-as-a-Service Platforms

In: Sabrina De Capitani Vimercati, Fabio Martinelli (Ed.): 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017), pp. 141–154, Springer Springer, Roma, Italy, 2017.

Abstract | BibTeX | Links:

Juan E. Rubio, Cristina Alcaraz, Rodrigo Roman, Javier Lopez

Analysis of Intrusion Detection Systems in Industrial Ecosystems

In: 14th International Conference on Security and Cryptography (SECRYPT 2017), pp. 116-128, SciTePress SciTePress, 2017, ISBN: 978-989-758-259-2.

BibTeX | Links:

Cristina Alcaraz, Jesús Rodriguez, Rodrigo Roman, Juan E. Rubio

Estado y Evolución de la Detección de Intrusiones en los Sistemas Industriales

In: III Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2017), 2017.

Abstract | BibTeX | Links:

Ana Nieto, Ruben Rios, Javier Lopez

PRoFIT: modelo forense-IoT con integración de requisitos de privacidad

In: XIII Jornadas de Ingeniería Telemática (JITEL 2017), pp. 302-309, Editorial Universitat Politècnica de València Editorial Universitat Politècnica de València, Valencia, 2017, ISBN: 978-84-9048-595-8.

BibTeX | Links:

Ana Nieto, Ruben Rios

Requisitos y soluciones de privacidad para la testificación digital

In: III Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2017), pp. 51-58, Servicio de Publicaciones de la URJC Servicio de Publicaciones de la URJC, Madrid (Spain), 2017, ISBN: 978-84-608-4659-8.

BibTeX | Links:

Juan E. Rubio, Cristina Alcaraz, Javier Lopez

Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems

In: The 11th International Conference on Critical Information Infrastructures Security, pp. 176-188, 2017.

Abstract | BibTeX | Links:

Ana Nieto, Rodrigo Roman, Javier Lopez

Arquitectura funcional para la cadena de custodia digital en objetos de la IoT

In: XIV Reunión Española sobre Criptología y Seguridad de la Información, pp. 168-173, 2016, ISBN: 978-84-608-9470-4.

Abstract | BibTeX | Links:

Ruben Rios, Javier Lopez

Evolución y nuevos desafios de privacidad en la Internet de las Cosas

In: XIV Reunión Española sobre Criptología y Seguridad de la Información, pp. 209-213, Mahón, Menorca, Islas Baleares, 2016.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

Nuevas nociones de seguridad y transformaciones genéricas para criptosistemas de recifrado delegado

In: XIV Reunión Española sobre Criptología y Seguridad de la Información, pp. 174-179, Mahón, Menorca, Islas Baleares, 2016, ISBN: 978-84-608-9470-4.

Abstract | BibTeX | Links:

Ruben Rios, Carmen Fernandez-Gago, Javier Lopez

Privacy-Aware Trust Negotiation

In: 12th International Workshop on Security and Trust Management (STM), pp. 98-105, Springer Springer, Heraklion, Crete, Greece, 2016, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Carmen Fernandez-Gago, Siani Pearson, Michela D’Errico, Rehab Alnemr, Tobias Pulls, Anderson Santana Oliveira

A4Cloud Workshop: Accountability in the Cloud

In: IFIP Sumer School 2015 on Privacy and Identity Management. Time for a Revolution?, pp. 61-78, AICT Series, Springer AICT Series, Springer, Edinburgh (United Kingdon), 2016.

BibTeX

Ana Nieto, Rodrigo Roman, Javier Lopez

Testigo digital: delegación vinculante de evidencias electrónicas para escenarios IoT

In: II Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2016), pp. 109-116, 2016, ISBN: 978-84-608-8070-7.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

Safeguarding Structural Controllability in Cyber-Physical Control Systems

In: The 21st European Symposium on Research in Computer Security (ESORICS 2016), pp. 471-489, Springer Springer, Crete, Greece, 2016, ISBN: 978-3-319-45741-3.

Abstract | BibTeX | Links:

Isaac Agudo, Ali El Kaafarani, David Nuñez, Siani Pearson

A Technique for Enhanced Provision of Appropriate Access to Evidence across Service Provision Chains

In: 10th International IFIP Summer School on Privacy and Identity Management, pp. 187-204, 2016, ISBN: 978-3-319-41762-2.

Abstract | BibTeX | Links:

Carlos Pares-Pulido, Isaac Agudo

LockPic: Privacy Preserving Photo Sharing in Social Networks

In: Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio Martinelli, Neeraj Suri (Ed.): Data Privacy Management, and Security Assurance, pp. 281–290, Springer International Publishing, Cham, 2016, ISBN: 978-3-319-29883-2.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez, Kim-Kwang Raymond Choo

Dynamic Restoration in Interconnected RBAC-based Cyber-Physical Control Systems

In: Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (SECRYPT 2016), pp. 19-27, Lisboa, 2016, ISBN: 978-989-758-196-0.

Abstract | BibTeX | Links:

Cristina Alcaraz, Estefania Etcheves Miciolino, Stephen Wolthusen

Multi-Round Attacks on Structural Controllability Properties for Non-Complete Random Graphs

In: The 16th Information Security Conference (ISC), pp. 140–151, Springer Springer, Springer International Publishing Switzerland, 2015.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Kristian Beckers, Maritta Heisel

Engineering Trust- and Reputation-based Security Controls for Future Internet Systems

In: The 30th ACM/SIGAPP Symposium On Applied Computing (SAC 2015), pp. 1344-1349, Salamanca, Spain, 2015, ISBN: 978-1-4503-3196-8.

BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

A Parametric Family of Attack Models for Proxy Re-Encryption

In: 28th IEEE Computer Security Foundations Symposium, pp. 290-301, IEEE Computer Society IEEE Computer Society, Verona, Italy, 2015, ISSN: 1063-6900.

Abstract | BibTeX | Links:

Cristina Alcaraz, Lorena Cazorla, Gerardo Fernandez

Context-Awareness using Anomaly-based Detectors for Smart Grid Domains

In: 9th International Conference on Risks and Security of Internet and Systems, pp. 17-34, Springer International Publishing Springer International Publishing, Trento, 2015, ISBN: 978-3-319-17126-5.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU

In: 10th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), pp. 179-189, 2015, ISBN: 978-1-4503-3245-3.

Abstract | BibTeX | Links:

Carmen Fernandez-Gago, Vasilis Tountopoulos, Simone Fischer-Hübner, Rehab Alnemr, David Nuñez, Julio Angulo, Tobias Pulls, Theo Koulouris

Tools for Cloud Accountability: A4Cloud Tutorial

In: 9th IFIP Summer School on Privacy and Identity Management for the Future Internet in the Age of Globalisation, pp. 219-236, Springer IFIP AICT Springer IFIP AICT, Patras (Greece), 2015, ISSN: 978-3-319-18621-4.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

Delegated Access for Hadoop Clusters in the Cloud

In: IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2014), pp. 374-379, IEEE IEEE, Singapore, 2014, ISBN: 978-1-4799-4093-6.

Abstract | BibTeX | Links:

Jose A. Onieva, Ruben Rios, Bernardo Palenciano

Análisis y Desarrollo de un Canal Encubierto en una Red de Sensores

In: XIII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2014), pp. 333-338, Universidad de Alicante Universidad de Alicante, Alicante, Spain, 2014, ISBN: 978-84-9717-323-0.

Abstract | BibTeX | Links:

Ana Nieto, Javier Lopez

Herramienta para la Compensación de Parámetros de QoS y Seguridad

In: XIII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2014), pp. 303-308, Alicante (España)., 2014, ISBN: 978-84-9717-323-0.

Abstract | BibTeX | Links:

Ana Nieto, Javier Lopez

Security and QoS Tradeoff Recommendation System (SQT-RS) for Dynamic Assessing CPRM-based Systems

In: 10th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet’14), pp. 25-32, ACM ACM, Montréal (Canada), 2014, ISBN: 978-1-4503-3027-5.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Kristian Beckers, Maritta Heisel

Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements

In: Jorge Cuellar (Ed.): Smart Grid Security – Second International Workshop, pp. 166-180, Springer Springer, Munich, 2014, ISSN: 0302-9743.

BibTeX | Links:

Ana Nieto, Javier Lopez

A Context-based Parametric Relationship Model (CPRM) to Measure the Security and QoS tradeoff in Configurable Environments

In: IEEE International Conference on Communications (ICC’14), pp. 755-760, IEEE Communications Society IEEE Communications Society, Sydney (Australia), 2014, ISBN: 978-1-4799-2003-7.

Abstract | BibTeX | Links:

Francisco Moyano, Kristian Beckers, Carmen Fernandez-Gago

Trust-Aware Decision-Making Methodology for Cloud Sourcing

In: Matthias Jarke, John Mylopoulos, Christoph Quix, Colette Rolland, Yannis Manolopoulos, Haralambos Mouratidis, Jennifer Horkoff (Ed.): 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014), pp. 136-149, Springer Springer, Thessaloniki, 2014, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Javier Lopez, Ruben Rios, Jorge Cuellar

Preserving Receiver-Location Privacy in Wireless Sensor Networks

In: Information Security Practice and Experience (ISPEC 2014), pp. 15-27, Springer Springer, Fuzhou, China, 2014, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Ana Nieto

Evaluation of Dynamic Instantiation in CPRM-based Systems

In: 9th International Conference on Risk and Security of Internet and Systems (CRiSIS’14), pp. 52-66, Springer Springer, Trento (Italy), 2014, ISBN: 978-3-319-17127-2.

Abstract | BibTeX | Links:

Jorge L. Hernández-Ardieta, David Santos, Pascual Parra, Juan E. Tapiador, Pedro Peris-López, Javier Lopez, Gerardo Fernandez

An Intelligent and Adaptive Live Simulator: A new Concept for Cybersecurity Training

In: 9th Future Security Conference, Berlin, 2014.

Abstract | BibTeX | Links:

Cristina Alcaraz, Stephen Wolthusen

Recovery of Structural Controllability for Control Systems

In: Eighth IFIP WG 11.10 International Conference on Critical Infrastructure Protection, SRI International, Arlington, Virginia, USA, pp. 47-63, Springer Springer, Arlington, Virginia, USA, 2014, ISSN: 1868-4238.

Abstract | BibTeX | Links:

David Nuñez, Carmen Fernandez-Gago, Siani Pearson, Massimo Felici

A Metamodel for Measuring Accountability Attributes in the Cloud

In: 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013), pp. 355-362, IEEE IEEE, Bristol, UK, 2013, ISBN: 978-0-7685-5095-4.

Abstract | BibTeX | Links:

Federica Paci, Carmen Fernandez-Gago, Francisco Moyano

Detecting Insider Threats: a Trust-Aware Framework

In: 8th International Conference on Availability, Reliability and Security, pp. 121-130, IEEE IEEE, Regensburg, Germany, 2013, ISBN: 978-0-7695-5008-4.

Abstract | BibTeX | Links:

Ruben Rios, Jorge Cuellar, Javier Lopez

Ocultación de la estación base en redes inalámbricas de sensores

In: Jesús E. Díaz Verdejo, Jorge Navarro Ortiz, Juan J. Ramos Muñoz (Ed.): XI Jornadas de Ingeniería Telemática (JITEL 2013), pp. 481-486, Asociación de Telemática Asociación de Telemática, Granada, 2013, ISBN: 978-84-616-5597-7.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

Leveraging Privacy in Identity Management as a Service through Proxy Re-Encryption

In: Ph.D Symposium of the European Conference on Service-Oriented and Cloud Computing (ESOCC) 2013, Málaga, Spain, 2013.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez

Towards Engineering Trust-aware Future Internet Systems

In: Xavier Franch, Pnina Soffer (Ed.): 3rd International Workshop on Information Systems Security Engineering (WISSE 2013), pp. 490-501, Springer-Verlag Springer-Verlag, Valencia, 2013, ISSN: 1865-1348.

Abstract | BibTeX | Links:

Francisco Moyano, Benoit Baudry, Javier Lopez

Towards Trust-Aware and Self-Adaptive Systems

In: Carmen Fernandez-Gago, Isaac Agudo, Fabio Martinelli, Siani Pearson (Ed.): 7th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2013), pp. 255-262, Springer Springer, Malaga, 2013, ISSN: 1868-4238.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez

Building Trust and Reputation In: A Development Framework for Trust Models Implementation

In: Audung Jøsang, Pierangela Samarati, Marinella Petrocchi (Ed.): 8th International Workshop on Security and Trust Management (STM 2012), pp. 113-128, Springer Springer, Pisa, 2013, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Cristina Alcaraz, Meltem Sonmez

PDR: A Prevention, Detection and Response Mechanism for Anomalies in Energy Control Systems

In: 7th International Conference on Critical Information Infrastructures Security (CRITIS 2012), pp. 22–33, Lillehammer, Norway, 2013.

Abstract | BibTeX | Links:

Cristina Alcaraz, Estefania Etcheves Miciolino, Stephen Wolthusen

Structural Controllability of Networks for Non-Interactive Adversarial Vertex Removal

In: 8th International Conference on Critical Information Infrastructures Security, pp. 120-132, Springer Springer, Amsterdam, The Netherlands, 2013, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Lorena Cazorla, Cristina Alcaraz, Javier Lopez

Towards Automatic Critical Infrastructure Protection through Machine Learning

In: 8th International Conference on Critical Information Infrastructures Security, pp. 197-203, Springer Springer, Amsterdam, The Netherlands, 2013, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez

A Trust and Reputation Framework

In: Maritta Heisel, Eda Marchetti (Ed.): Doctoral Symposium of the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013), pp. 7-12, CEUR-WS CEUR-WS, París, 2013, ISSN: 1613-0073.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

Integrating OpenID with Proxy Re-Encryption to enhance privacy in cloud-based identity services

In: IEEE CloudCom 2012, pp. 241 – 248, IEEE Computer Society IEEE Computer Society, Taipei, Taiwan, 2012, ISSN: 978-1-4673-4509-5.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

Addressing Situational Awareness in Critical Domains of a Smart Grid

In: 6th International Conference on Network and System Security (NSS 2012), pp. 58-71, Springer-Verlag Springer-Verlag, Wu Yi Shan, Fujian, China, 2012, ISSN: 978-3-642-34600-2.

Abstract | BibTeX | Links:

Ruben Rios, Javier Lopez

Adecuación de soluciones de anonimato al problema de la privacidad de localización en WSN

In: Urko Zurutuza, Roberto Uribeetxeberria, Ignacio Arenaza-Nuño (Ed.): XII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2012), pp. 309-314, Donostia-San Sebastián, 2012, ISBN: 978-84-615-9933-2.

Abstract | BibTeX | Links:

Jose A. Onieva, Isaac Agudo, Javier Lopez, Gerard Draper-Gil, M. Francisca Hinarejos

Como proteger la privacidad de los usuarios en Internet. Verificación anónima de la mayoría de edad

In: XII Reunión Española sobre Criptología y Seguridad de la Información – RECSI 2012, pp. 297-302, Mondragon Mondragon, San Sebastian (Spain), 2012, ISBN: 978-84-615-9933-2.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez

A Conceptual Framework for Trust Models

In: Simone Fischer-Hübner, Sokratis K. Katsikas, Gerald Quirchmayr (Ed.): 9th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2012), pp. 93-104, Springer Verlag Springer Verlag, Vienna, 2012, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Ruben Rios, Jorge Cuellar, Javier Lopez

Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN

In: Sara Foresti, Moti Yung, Fabio Martinelli (Ed.): 17th European Symposium on Research in Computer Security (ESORICS 2012), pp. 163-180, Springer Springer, Pisa, Italy, 2012, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Ana Nieto, Gerardo Fernandez

Sistema Colaborativo de Detección y Reacción ante Intrusiones basado en Intel vPro

In: XII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2012), pp. 45-50, San Sebastián, 2012, ISBN: 978-84-615-9933-2.

Abstract | BibTeX | Links:

Gerard Draper-Gil, Josep L. Ferrer-Gomila, M. Francisca Hinarejos, Jose A. Onieva, Javier Lopez

Un protocolo para la firma de contratos en escenarios multi-two-party con atomicidad

In: XII Reunión Española de Criptología y Seguridad de la Información, pp. 357-362, 2012, ISBN: 978-84-615-9933-2.

Abstract | BibTeX | Links:

Farhan Siddiqui, Sherali Zeadally, Cristina Alcaraz, Samara Galvao

Smart Grid Privacy: Issues and Solutions

In: 21st International Conference on Computer Communications and Networks (ICCCN), pp. 1-5, IEEE Computer Society IEEE Computer Society, Munich, Germany, 2012, ISBN: 978-1-4673-1543-2.

Abstract | BibTeX | Links:

Ruben Rios, Jose A. Onieva, Javier Lopez

HIDE_DHCP: Covert Communications Through Network Configuration Messages

In: Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (Ed.): Proceedings of the 27th IFIP TC 11 International Information Security and Privacy Conference (SEC 2012), pp. 162-173, Springer Boston Springer Boston, Heraklion, Crete, Greece, 2012, ISSN: 1868-4238.

Abstract | BibTeX | Links:

Jorge Cuellar, Martin Ochoa, Ruben Rios

Indistinguishable Regions in Geographic Privacy

In: Sascha Ossowski, Paola Lecca (Ed.): Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC 2012), pp. 1463-1469, ACM ACM, Riva del Garda (Trento), Italy, 2012, ISBN: 978-1-4503-0857-1.

Abstract | BibTeX | Links:

Ana Nieto, Javier Lopez

Security and QoS tradeoffs: towards a FI perspective

In: Advanced Information Networking and Applications Workshops (WAINA), 2012 26th International Conference on, pp. 745-750, IEEE IEEE, Fukuoka (Japan), 2012, ISBN: 978-0-7695-4652-0/12.

Abstract | BibTeX | Links:

Ana Nieto, Javier Lopez

Traffic Classifier for Heterogeneous and Cooperative Routing through Wireless Sensor Networks

In: Advanced Information Networking and Applications Workshops (WAINA), 2012 26th International Conference on, pp. 607-612, IEEE IEEE, Fukuoka (Japan), 2012, ISBN: 978-0-7695-4652-0/12.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Isaac Agudo, Javier Lopez

A Task Ordering Approach for Automatic Trust Establishment

In: Gilles Barthe, Ben Livshits, Riccardo Scandariato (Ed.): Proceedings of the 2012 International Symposium on Engineering Secure Software and Systems (ESSoS 2012), pp. 76–89, Springer Springer, Eindhoven, The Netherlands, 2012.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez

Implementing Trust and Reputation Systems: A Framework for Developers’ Usage

In: International Workshop on Quantitative Aspects in Security Assurance, Pisa, 2012.

Abstract | BibTeX | Links:

Pablo Najera, Rodrigo Roman, Javier Lopez

Secure architecure for the integration of RFID and sensors in personal networks

In: 7th International Workshop on Security and Trust Management (STM’11), pp. 207-222, Springer Springer, Copenhagen, Denmark, 2012, ISBN: 978-3-642-29962-9.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez

Service-Oriented Trust and Reputation Architecture

In: Jorge Cuellar, Nora Koch (Ed.): Proceedings of the Doctoral Symposium of the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2012), pp. 41-46, CEUR-WS CEUR-WS, Eindhoven, 2012, ISSN: 1613-0073, (Partner:UMA, Project:NESSoS).

Abstract | BibTeX | Links:

Trust & Security RTD in the Internet of Things: Opportunities for International Cooperation

James Clarke, Rodrigo Roman, Abhishek Sharma, Javier Lopez, Neeraj Suri

Trust & Security RTD in the Internet of Things: Opportunities for International Cooperation

In: Proceedings of the First International Conference on Security of Internet of Things, pp. 172–178, ACM ACM, New York, NY, USA, 2012, ISBN: 978-1-4503-1822-8.

Abstract | BibTeX | Links:

Ana Nieto, Javier Lopez

Security and QoS relationships in Mobile Platforms

In: The 4th FTRA International Conference on Computer Science and its Applications (CSA 2012), pp. 13-21, Springer Netherlands Springer Netherlands, Jeju (Korea), 2012, ISBN: 978-94-007-5699-1.

Abstract | BibTeX | Links:

Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber Identity

Neumann Libor, Tomas Halman, Rotek Pavel, Alexander Boettcher, Julian Stecklina, Michal Sojka, David Nuñez, Isaac Agudo

Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber Identity

In: Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider (Ed.): Information Security Solutions Europe 2012, pp. 195-206, Springer Vieweg Springer Vieweg, Brussels, Belgium, 2012, ISBN: 978-3-658-00332-6.

Abstract | BibTeX | Links:

Pablo Najera, Rodrigo Roman, Javier Lopez

Acceso seguro a nodos RFID en una arquitectura de red personal

In: Klaus Hackbarth, Ramón Agüero, Roberto Sanz (Ed.): X Jornadas de Ingeniería Telemática (JITEL 2011), pp. 104 – 111, Universidad de Cantabria Universidad de Cantabria, Santander, Spain, 2011, ISBN: 978-84-694-5948-5.

Abstract | BibTeX

OSAMI Commons: An open dynamic services platform for ambient intelligence

Naci Dai, Jesus Bermejo, Felix Cuadrado Latasa, Alejandra Ruiz López, Isaac Agudo, Elmar Zeeb, Jan Krueger, Oliver Dohndorf, Wolfgang Thronicke, Christoph Fiehe, Anna Litvina

OSAMI Commons: An open dynamic services platform for ambient intelligence

In: IEEE 16th Conference on Emerging Technologies Factory Automation (ETFA 2011), pp. 1-10, IEEE IEEE, Toulouse, France, 2011, ISSN: 1946-0740.

Abstract | BibTeX | Links:

Isaac Agudo, David Nuñez, Gabriele Giammatteo, Panagiotis Rizomiliotis, Costas Lambrinoudakis

Cryptography Goes to the Cloud

In: Changhoon Lee, Jean-Marc Seigneur, James J. Park, Roland R. Wagner (Ed.): 1st International Workshop on Security and Trust for Applications in Virtualised Environments (STAVE 2011), pp. 190-197, Springer Springer, 2011, ISBN: 978-3-642-22364-8.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Prokopios Drogkaris, Stefanos Gritzalis

Identity Management Challenges for Intercloud Applications

In: 1st International Workshop on Security and Trust for Applications in Virtualised Environments (STAVE 2011), pp. 198-204, Crete (Greece), 2011.

Abstract | BibTeX | Links:

Olga Leon, Rodrigo Roman, Juan Hernandez Serrano

Towards a Cooperative Intrusion Detection System for Cognitive Radio Networks

In: Workshop on Wireless Cooperative Network Security (WCNS’11), Springer Springer, 2011.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Cristina Alcaraz, Hsiao-Hwa Chen

SenseKey – Simplifying the Selection of Key Management Schemes for Sensor Networks

In: 5th International Symposium on Security and Multimodality in Pervasive Environments (SMPE’11), IEEE IEEE, Singapore, 2011.

Abstract | BibTeX | Links:

Wouter Joosen, Javier Lopez, Fabio Martinelli, Fabio Massacci

Engineering Secure Future Internet Services

In: Future Internet Assembly 2011: Achievements and Technological Promises (FIA 2011), pp. 177-191, Springer Berlin Heidelberg Springer Berlin Heidelberg, Budapest, 2011, ISSN: 0302-9743.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Mario Piattini, Javier Lopez

Analysis of Secure Mobile Grid Systems: A systematic approach

In: XVI Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2011), pp. 487-491, Servizo de publicacións da Universidade da Coruña Servizo de publicacións da Universidade da Coruña, A Coruña, Spain, 2011, ISBN: 978-84-9749-486-1.

Abstract | BibTeX | Links:

Cristina Alcaraz, Isaac Agudo, David Nuñez, Javier Lopez

Managing Incidents in Smart Grids à la Cloud

In: IEEE CloudCom 2011, pp. 527-531, IEEE Computer Society IEEE Computer Society, Athens, Greece, 2011, ISBN: 978-0-7695-4622-3.

Abstract | BibTeX | Links:

Cristina Alcaraz, Pablo Najera, Javier Lopez, Rodrigo Roman

Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?

In: 1st International Workshop on the Security of the Internet of Things (SecIoT’10), pp. xxxx, IEEE IEEE, Tokyo (Japan), 2010.

Abstract | BibTeX | Links:

Cristina Alcaraz, Rodrigo Roman, Pablo Najera, Javier Lopez

Acceso seguro a redes de sensores en SCADA a través de Internet

In: XI Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2010), pp. 337-342, Tarragona (Spain), 2010, ISBN: 978-84-693-3304-4.

Abstract | BibTeX | Links:

Isaac Agudo, Jose A. Onieva, Daniel Merida

Distribución segura de componentes software basada en OpenID

In: XI Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2010), Tarragona, Spain, 2010, ISBN: 978-84-693-3304-4.

Abstract | BibTeX | Links:

Cristina Alcaraz, Angel Balastegui, Javier Lopez

Early Warning System for Cascading Effect Control in Energy Control Systems

In: 5th International conference on Critical Information Infrastructures Security (CRITIS’10), pp. 55-67, Springer Springer, Athens, Greece, 2010, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Ruben Rios, Isaac Agudo, Jose L. Gonzalez

Implementación de un esquema de localización privada y segura para interiores

In: Yannis Dimitriadis, María Jesús Verdú Pérez (Ed.): IX Jornadas de Ingeniería Telemática (JITEL’10), pp. 237 – 244, Valladolid (Spain), 2010, ISBN: 978-84-693-5398-1.

Abstract | BibTeX | Links:

Ruben Rios, Javier Lopez

Source Location Privacy Considerations in Wireless Sensor Networks

In: Lidia Fuentes, Nadia Gámez, José Bravo (Ed.): 4th International Symposium of Ubiquitous Computing and Ambient Intelligence (UCAmI’10), pp. 29 – 38, IBERGARCETA PUBLICACIONES, S.L. IBERGARCETA PUBLICACIONES, S.L., Valencia (Spain), 2010, ISBN: 978-84-92812-61-5.

Abstract | BibTeX | Links:

A Study of Security Approaches for the Development of Mobile Grid Systems

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

A Study of Security Approaches for the Development of Mobile Grid Systems

In: 5th International Conference on Software and Data Technologies (ICSOFT’10), pp. 133-138, Springer Springer, Athens, Greece, 2010, ISBN: 978-989-8425-22-5.

Abstract | BibTeX

Jose A. Montenegro, Javier Lopez, Rene Peralta

Computacion Segura Multiparte Aplicada a Subastas Electrónicas

In: IX Jornadas de Ingeniería Telemenatica (JITEL 2010), 2010.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Cristina Alcaraz

Do Wireless Sensor Networks Need to be Completely Integrated into the Internet?

In: 3rd CompanionAble Workshop – Future Internet of People, Things and Services (IoPTS) eco-Systems, pp. xxxx, xxxx xxxx, Brussels (Belgium), 2009.

Abstract | BibTeX | Links:

Cristina Alcaraz, Isaac Agudo, Carmen Fernandez-Gago, Rodrigo Roman, Gerardo Fernandez, Javier Lopez

Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems

In: 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’09), pp. 86-94, Springer-Verlag Springer-Verlag, Linz, Austria, 2009, ISBN: 978-3-642-03747-4.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros

In: XIV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2009), pp. 331-342, Antonio Vallecillo and Goiuria Sagardui (Eds.) Antonio Vallecillo and Goiuria Sagardui (Eds.), San Sebastián, España, 2009, ISBN: 978-84-692-4211-7.

Abstract | BibTeX | Links:

Javier Lopez, Rodrigo Roman, Cristina Alcaraz

Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks

In: Foundations of Security Analysis and Design 2009, pp. 289-338, Springer Berlin/Heidelberg Springer Berlin/Heidelberg, Bertinoro (Italy), 2009, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

Rafael J. Caro, David Garrido, Pierre Plaza, Rodrigo Roman, Nuria Sanz, Jose L. Serrano

SMEPP: A Secure Middleware for Embedded P2P

In: ICT Mobile and Wireless Communications Summit (ICT-MobileSummit’09), Santander (Spain), 2009, ISBN: 978-1-905824-12-0.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

Applying a UML Extension to build Use Cases diagrams in a secure mobile Grid application

In: 5th International Workshop on Foundations and Practices of UML, pp. 126-136, Springer Berlin Heidelberg Springer Berlin Heidelberg, Gramado, Brasil, 2009, ISBN: 978-3-642-04946-0.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

Hacia una Arquitectura de Servicios de Seguridad para entornos Grid móviles

In: V Congreso Iberoamericano de Seguridad Informática (CIBSI’09), pp. 409-423, Universidad de la República, Uruguay Universidad de la República, Uruguay, Montevideo, Uruguay, 2009, ISBN: 978-9974-0-0593-8.

Abstract | BibTeX | Links:

Isaac Agudo, Carmen Fernandez-Gago, Javier Lopez

A Multidimensional Reputation Scheme for Identity Federations

In: Sixth European Workshop on Public Key Services, Applications and Infrastructures (EuroPKI’09), pp. 225-238, Springer Springer, 2009, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

Reusable Security Use Cases for Mobile Grid environments

In: Workshop on Software Engineering for Secure Systems, pp. 1-8, IEEE IEEE, Vancouver, Canada, 2009, ISBN: 978-1-4244-3725-2.

Abstract | BibTeX | Links:

Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros

In: XII Conferencia Iberoamericana de Ingeniería de Requisitos y Ambientes de Software (IDEAS’09), pp. 388-393, University of Colombia University of Colombia, Medellín, Colombia, 2009, ISBN: 978-958-44-5028-9.

Abstract | BibTeX

Jose L. Vivas, Isaac Agudo, Javier Lopez

Security Assurance During the Software Development Process

In: International Conference on Computer Systems and Technologies (CompSysTech09), pp. 11.7.1-11.7.6, ACM ACM, Ruse (Bulgary), 2009, ISBN: 978-1-60558-986-2.

Abstract | BibTeX | Links:

David Galindo, Rodrigo Roman, Javier Lopez

A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks

In: Proceedings of the 7th International Conference on Cryptology and Network Security (CANS’08), pp. 120-132, Springer Springer, Hong Kong (China), 2008, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

Rafael J. Caro, David Garrido, Pierre Plaza, Rodrigo Roman, Nuria Sanz, Jose L. Serrano

Middleware Seguro EP2P: un Desafío para las Redes Sociales

In: XVIII Jornadas Telecom I+D, Bilbao (Spain), 2008.

Abstract | BibTeX | Links:

Pablo Najera, Francisco Moyano, Javier Lopez

Secure Integration of RFID Technology in Personal Documentation for Seamless Identity Validation

In: 3rd Symposium of Ubiquitous Computing and Ambient Intelligence 2008, pp. 134-138, Springer Springer, Salamanca (Spain), 2008, ISBN: 978-3-540-85866-9.

Abstract | BibTeX | Links:

Cristina Alcaraz, Rodrigo Roman, Javier Lopez

Análisis de la Aplicabilidad de las Redes de Sensores para la Protección de Infraestructuras de Información Críticas

In: VI Jornadas de Ingeniería Telemática (JITEL’08), pp. 437, Alcalá de Henares (Spain), 2008, ISBN: 978-84-612-5474-3.

Abstract | BibTeX | Links:

Ruben Rios, Jose A. Onieva

Clasificación de canales encubiertos. Un nuevo canal: Covert_DHCP

In: Luis Hernández Encinas, Angel Martin Rey (Ed.): X Reunión Española de Criptología y Seguridad de la Información (RECSI’08), pp. 325-336, Salamanca (Spain), 2008, ISBN: 978-84-691-5158-7.

Abstract | BibTeX | Links:

David Galindo, Rodrigo Roman, Javier Lopez

An Evaluation of the Energy Cost of Authenticated Key Agreement in Wireless Sensor Networks

In: X Reunión Española sobre Criptología y Seguridad de la Información (RECSI’08), pp. 231-236, Salamanca (Spain), 2008.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez

KeyLED – Transmitting Sensitive Data over out-of-band Channels in Wireless Sensor Networks

In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS’08), pp. 796-801, IEEE IEEE, Atlanta (USA), 2008, ISBN: 978-1-4244-2574-7.

Abstract | BibTeX | Links:

Secure Real-Time Integration of Services in a OSGi Distributed Environment

Jose Manuel Marquez, Javier Jimenez, Isaac Agudo

Secure Real-Time Integration of Services in a OSGi Distributed Environment

In: Fourth International Conference on Networked Computing and Advanced Information Management (NCM’08), pp. 631-635, IEEE IEEE, Gyeongju, South Korea, 2008, ISBN: 978-0-7695-3322-3.

Abstract | BibTeX | Links:

An Asynchronous Node Replication Attack in Wireless Sensor Networks

Jianying Zhou, Tanmoy Kanti Das, Javier Lopez

An Asynchronous Node Replication Attack in Wireless Sensor Networks

In: 23rd International Information Security Conference (SEC 2008), pp. 125-139, 2008, ISBN: 978-0-387-09699-5.

BibTeX

Isaac Agudo, Carmen Fernandez-Gago, Javier Lopez

Delegating Privileges over Finite Resources: A Quota Based Delegation Approach

In: 5th International Workshop on Formal Aspects in Security and Trust (FAST’08), pp. 302-315, Springer Springer, Malaga (Spain), 2008, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez, Mario Piattini

Engineering Process Based On Grid Use Cases For Mobile Grid Systems

In: Third International Conference on Software and Data Technologies (ICSOFT’08), pp. 146-151, Springer Springer, Porto, Portugal, 2008, ISSN: 1865-0929.

Abstract | BibTeX | Links:

Isaac Agudo, Carmen Fernandez-Gago, Javier Lopez

An Evolutionary Trust and Distrust Model

In: 4th Workshop on Security and Trust Management (STM’08), pp. 3-12, Elsevier Elsevier, Trondheim, Norway, 2008, ISSN: 1571-0661.

Abstract | BibTeX | Links:

Vicente Benjumea, Seung G. Choi, Javier Lopez, Moti Yung

Fair Traceable Multi-Group Signatures

In: Financial Cryptography and Data Security (FC’08), pp. 265-281, Springer Springer, Cozumel, Mexico, 2008.

Abstract | BibTeX | Links:

Isaac Agudo, Carmen Fernandez-Gago, Javier Lopez

A Model for Trust Metrics Analysis

In: 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’08), pp. 28-37, Springer Springer, 2008, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez, Mario Piattini

PSecGCM: Process for the development of Secure Grid Computing based Systems with Mobile devices

In: International Conference on Availability, Reliability and Security (ARES’08), pp. 136-143, IEEE Computer Society IEEE Computer Society, A Grid computing system is defined as a platform that supports distributed system applications which require fast access to a large quantity of distributed resources in a coordinated manner. With the development of wireless technology and mobile devices,, 2008, ISSN: 978-0-7695-3102-1.

Abstract | BibTeX | Links:

Vicente Benjumea, Seung G. Choi, Javier Lopez, Moti Yung

Anonymity 2.0: X.509 Extensions Supporting Privacy-friendly Authentication

In: Sixth International Workshop on Cryptology and Network Security (CANS’07), pp. 265-281, Springer Springer, Singapore, 2007.

Abstract | BibTeX | Links:

Rodrigo Roman, Carmen Fernandez-Gago, Javier Lopez

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices

In: 1st International Conference on Autonomic Computing and Communication Systems (Autonomics’07), ICST ICST, Rome (Italy), 2007, ISBN: 978-963-9799-09-7.

Abstract | BibTeX | Links:

Cristina Alcaraz, Rodrigo Roman, Javier Lopez

Análisis de primitivas criptográficas para redes de sensores

In: VI Jornadas de Ingeniería Telemática (JITEL’07), pp. 401-408, Málaga (Spain), 2007, ISBN: 978-84-690-6670-6.

Abstract | BibTeX | Links:

Rodrigo Roman, Cristina Alcaraz

Applicability of Public Key Infrastructures in Wireless Sensor Networks

In: European PKI Workshop: Theory and Practice (EuroPKI’07), pp. 313-320, Springer Springer, Mallorca (Spain), 2007, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

Isaac Agudo, Javier Lopez, Jose A. Montenegro

Attribute delegation in ubiquitous environments

In: 3rd international conference on Mobile multimedia communications (MobiMedia ’07), pp. 43:1–43:6, ICST ICST, Nafpaktos, Greece, 2007, ISBN: 978-963-06-2670-5.

Abstract | BibTeX | Links:

Mildrey Carbonell, Jose Maria Sierra, Jose A. Onieva, Javier Lopez, Jianying Zhou

Estimation of TTP Features in Non-repudiation Service

In: 7th International Conference on Computational Science and Its Applications (ICCSA’07), pp. 549-558, Springer Springer, 2007.

Abstract | BibTeX | Links:

Hacia un Proceso sistemático para el desarrollo de sistemas Grid Seguros con Dispositivos Móviles

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez, Mario Piattini

Hacia un Proceso sistemático para el desarrollo de sistemas Grid Seguros con Dispositivos Móviles

In: IV Congreso Iberoamericano de Seguridad Informática (CIBSI’07), pp. 111-124, Sebastián Cañón, M.A. Sebastián Cañón, M.A., Mar del Plata, Argentina, 2007, ISBN: 978-950-623-043-2.

BibTeX

Isaac Agudo, Javier Lopez, Jose A. Montenegro

Implementation aspects of a delegation system

In: 3rd international conference on Mobile multimedia communications (MobiMedia ’07), pp. 50:1–50:6, ICST ICST, Nafpaktos, Greece, 2007, ISBN: 978-963-06-2670-5.

Abstract | BibTeX | Links:

Magdalena Payeras, Josep L. Ferrer-Gomila, Lloren Huguet Rotger, Jose A. Onieva

Incompatibilidades entre Propiedades de los Protocolos de Intercambio Equitativo de Valores

In: Lidia Fuentes, Javier Lopez, Pedro Merino (Ed.): VI Jornadas de Ingeniería Telemática (JITEL’07), pp. 605-608, Universidad de Malaga Universidad de Malaga, 2007, ISBN: 978-84-690-6670-6.

Abstract | BibTeX

Carmen Fernandez-Gago, Rodrigo Roman, Javier Lopez

A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks

In: 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU’07), pp. 25-30, IEEE Computer Society IEEE Computer Society, Istanbul (Turkey), 2007.

Abstract | BibTeX | Links:

Aplicación de la Tecnología RFID a Entornos Sanitarios

Pablo Najera, Javier Lopez

Aplicación de la Tecnología RFID a Entornos Sanitarios

In: 2nd International Workshop of Ubiquitous Computing & Ambient Intelligence (wUCAmI’06), pp. 83-95, University of Castilla La Mancha University of Castilla La Mancha, Puertollano, Ciudad Real (Spain), 2006, ISBN: 84-6901744-6.

Abstract | BibTeX

Isaac Agudo, Javier Lopez, Jose A. Montenegro

Attributes Delegation Based on Ontologies and Context Information

In: 10th IFIP TC-6 TC-11 International Conference on Communications and Multimedia on Security (CMS’06), pp. 54-66, Springer Springer, Heraklion, Crete, 2006, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

Modelo de pago con intermediario. Su aplicación a un escenario real

Mildrey Carbonell, Jose Maria Sierra, Javier Lopez

Modelo de pago con intermediario. Su aplicación a un escenario real

In: IX Reunión Española sobre Criptología y Seguridad de la información (IX RECSI), pp. 35-46, Barcelona (Spain), 2006, ISBN: ISBN.978-84-9788-502-3.

BibTeX

Francisco Sanchez-Cid, Antonio Muñoz, Daniel Serrano, Carmen Fernandez-Gago

Software Engineering Techniqes Applied to AmI: Security Patterns

In: First International Conference on Ambient Intelligence Developments (AmID’06), pp. 108-123, Springer Springer, Sophia-Antipolis (France), 2006, ISBN: 978-3-642-01464-2.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Antonio Muñoz

A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios

In: Third International Conference on Ubiquitous Intelligence and Computing, pp. 977-987, Springer Springer, Wuhan, China, 2006.

Abstract | BibTeX | Links:

Javier Lopez, Jose A. Montenegro, Rodrigo Roman

Service-Oriented Security Architecture for CII based on Sensor Networks

In: 2nd International Workshop on Security Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU’06), pp. 1-6, IEEE Press IEEE Press, Lyon, France, 2006.

Abstract | BibTeX | Links:

Jianying Zhou, Jose A. Onieva, Javier Lopez

A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps

In: 21st International Information Security Conference (IFIP SEC’06), pp. 221-232, Springer Springer, 2006.

Abstract | BibTeX | Links:

Rodrigo Roman, Jianying Zhou, Javier Lopez

Applying Intrusion Detection Systems to Wireless Sensor Networks

In: IEEE Consumer Communications & Networking Conference (CCNC 2006), pp. 640-644, IEEE IEEE, Las Vegas (USA), 2006, ISBN: 1-4244-0085-6.

Abstract | BibTeX | Links:

Cristina Alcaraz, Rodrigo Roman

Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios

In: 1st International Workshop on Critical Information Infrastructures Security (CRITIS’06), pp. 166-178, Springer Berlin / Heidelberg Springer Berlin / Heidelberg, 2006, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

Jose A. Onieva, Javier Lopez, Rodrigo Roman, Jianying Zhou

Extension de una plataforma DRM basada en OMA con servicios de No Repudio

In: IX Reunion Española sobre Criptologia y Seguridad de la Informacion (RECSI’06), pp. 129-141, UOC S.L. UOC S.L., 2006.

Abstract | BibTeX | Links:

Isaac Agudo, Javier Lopez, Jose A. Montenegro

Graphical Representation of Authorization Policies for Weighted Credentials

In: 11th Australasian Conference on Information Security and Privacy (ACISP’06), pp. 383-394, Springer Springer, Melbourne, Australia, 2006, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

Isaac Agudo, Javier Lopez, Jose A. Montenegro

Políticas de delegación para credenciales ponderadas y su representación gráfica

In: IX Reunión Española sobre Criptología y Seguridad de la información (RECSI’06), pp. 311-322, Barcelona, Spain, 2006, ISBN: 84-9788-502-3.

BibTeX | Links:

Sokratis K. Katsikas, Javier Lopez, Guenther Pernul

Trust, Privacy and Security in E-business: Requirements and Solutions

In: 10th Panhellenic Conference in Informatics (PCI’05), pp. 548-558, Springer Springer, Volos, Greece, 2005.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Jianying Zhou

Aplicación de Sistemas de Detección de Intrusiones en Redes de Sensores

In: Simposio sobre Computación Ubicua e Inteligencia Ambiental (UCAmI’05), pp. 113-120, Granada (Spain), 2005.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Jianying Zhou

Protección contra el Spam Utilizando Desafíos a Priori

In: V Jornadas de Ingeniería Telemática (JITEL’05), pp. 375-382, Vigo (Spain), 2005.

Abstract | BibTeX | Links:

Antonio Muñoz, Jose A. Onieva, Javier Lopez

On Secure Profiling

In: 1st International Workshop on Secure Ubiquitous Networks (SUN’05), pp. 214-218, IEEE Press IEEE Press, 2005.

Abstract | BibTeX | Links:

Javier Lopez, Rolf Oppliger, Guenther Pernul

Classifying Public Key Certificates

In: 2nd European PKI Workshop: Research and Applications (EuroPKI’05), pp. 135-143, Springer Springer, Canterbury, U.K., 2005.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez

Especificación de Sistemas Electrónicos de Microdonaciones

In: III Simposio Español de Comercio Electrónico, pp. 95-104, Palma (Spain), 2005.

Abstract | BibTeX | Links:

Rodrigo Roman, Jianying Zhou, Javier Lopez

Protection Against Spam using Pre-Challenges

In: Ryôichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura (Ed.): 20th IFIP International Information Security Conference (IFIP-SEC’05), pp. 281-294, Springer Springer, Chiba (Japan), 2005, ISBN: 0-387-25658-X.

Abstract | BibTeX | Links:

Isaac Agudo, Javier Lopez, Jose A. Montenegro

A Representation Model of Trust Relationships with Delegation Extensions

In: 3th International Conference on Trust Management (iTRUST’05), pp. 9-22, Springer Springer, Versailles, France, 2005, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

Rodrigo Roman, Jianying Zhou, Javier Lopez

On the Security of Wireless Sensor Networks

In: Computational Science and Its Applications (ICCSA’05), pp. 681-690, Springer Springer, Singapore, 2005, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

Isaac Agudo, Javier Lopez, Jose A. Montenegro, Eiji Okamoto, Ed Dawson

Delegation Perspective of Practical Authorization Schemes

In: Fifth International Network Conference (INC’05), pp. 157-164, Samos Island, Greece, 2005, ISBN: 960-7475-32-1.

BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Javier Lopez, Rodrigo Roman

Extending an OMA-based DRM Framework with Non-Repudiation Services

In: 5th Symposium on Signal Processing and Information Technology (ISSPIT’05), pp. 472-477, IEEE IEEE, 2005.

Abstract | BibTeX | Links:

Mildrey Carbonell, Jose A. Onieva, Javier Lopez, Jianying Zhou

Modelo de Simulacion para la Estimacion de Parametros en los protocolos de no Repudio

In: III Simposio Español de Comercio Electronico (SCE’05), pp. 151-164, Universitat de les Illes Balears Universitat de les Illes Balears, 2005, ISBN: 84-7632-929-6.

Abstract | BibTeX | Links:

Kun Peng, Ed Dawson, Juan M. Gonzalez-Nieto, Eiji Okamoto, Javier Lopez

A Novel Method To Maintain Privacy in Mobile Agent Applications

In: Fourth International Conference on Cryptology and Network Security (CANS’05), pp. 247-260, Springer Springer, 2005, ISBN: 978-3-540-30849-2.

BibTeX | Links:

Antonio Muñoz, Jose A. Onieva, Javier Lopez

Perfiles Seguros para Comercio Movil

In: III Simposio Español de Comercio Electronico (SCE’05), pp. 235-244, Universitat de les Illes Balears Universitat de les Illes Balears, 2005.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Jianying Zhou

Análisis de Seguridad en Redes Inalámbricas de Sensores

In: V Jornadas de Ingenería Telemática (JITEL’05), pp. 335-343, Vigo (Spain), 2005.

Abstract | BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Javier Lopez

Attacking an asynchronous multi-party contract signing protocol

In: Proceedings of 6th International Conference on Cryptology in India, pp. 311–321, Springer Springer, 2005.

Abstract | BibTeX | Links:

Isaac Agudo, Javier Lopez, Juan J. Ortega

Especificación formal y verificación de requisitos de Seguridad

In: VIII Reunión Española sobre Criptología y Seguridad de la Información (VIII RECSI), pp. 225-235, Madrid (Spain), 2004, ISBN: 84-7978-650-7.

BibTeX

Jianying Zhou, Jose A. Onieva, Javier Lopez

Analysis of a Free Roaming Agent Result-Truncation Defense Scheme

In: 6th Conference on E-Commerce (CEC’04), pp. 221-226, IEEE Computer Society IEEE Computer Society, 2004.

Abstract | BibTeX | Links:

Javier Lopez, Jose A. Montenegro, Rolf Oppliger, Guenther Pernul

On a Taxonomy of Systems for Authentication and/or Authorization Services

In: TERENA Networking Conference, Rhodes, Greece, 2004.

Abstract | BibTeX | Links:

Mildrey Carbonell, Jose A. Onieva, Javier Lopez, Deborah Galpert, Jianying Zhou

Timeout Estimation using a Simulation Model for Non-repudiation Protocols

In: 2nd Workshop on Internet Communications Security (WICS’04), (within Computational Science and its Applications International Conference), pp. 903-914, Springer Springer, 2004.

Abstract | BibTeX | Links:

Vicente Benjumea, Javier Lopez, Jose A. Montenegro, Jose M. Troya

A First Approach to Provide Anonymity in Attribute Certificates

In: 2004 International Workshop on Practice and Theory in Public Key Cryptography (PKC’04), pp. 402-415, Springer Springer, 2004.

Abstract | BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Javier Lopez

Enhancing Certified Email Service for Timeliness and Multicast

In: Fourth International Network Conference, pp. 327-335, University of Plymouth University of Plymouth, 2004.

Abstract | BibTeX | Links:

Jose A. Onieva, Javier Lopez, Jianying Zhou

Mejorando Servicios de Correo Electronico Certificado con Prontitud Temporal y Multicasting

In: VIII Reunión Española sobre Criptología y Seguridad de la información (RECSI’04). Avances en Criptologia y Seguridad de la Informacion, pp. 537-546, Diaz de Santos Diaz de Santos, 2004, ISBN: 84-7978-650-7.

Abstract | BibTeX | Links:

Jianying Zhou, Jose A. Onieva, Javier Lopez

Protecting Free Roaming Agents against Result-Truncation Attack

In: 60th IEEE Vehicular Technology Conference (VTC’04), pp. 3271-3274, IEEE Vehicular Technology Society Press IEEE Vehicular Technology Society Press, 2004.

Abstract | BibTeX | Links:

Specification and formal verification of security requirements

Isaac Agudo, Javier Lopez

Specification and formal verification of security requirements

In: 5th international conference on Computer systems and technologies (CompSysTech ’04), pp. 1-6, ACM ACM, Rousse, Bulgaria, 2004, ISBN: 954-9641-38-4.

Abstract | BibTeX | Links:

Clare Dixon, Carmen Fernandez-Gago, Michael Fisher, Wiebe Hoek

Using Temporal Logics of Knowledge in the Formal Verification of Security Protocols

In: 11th International Symposium on Temporal Representation and Reasoning (TIME’04), pp. 148-151, IEEE Computer Society IEEE Computer Society, Tatihou, Normandie, France, 2004, ISSN: 1530-1311.

Abstract | BibTeX | Links:

Jose A. Montenegro, Javier Lopez, Fernando Moya

Diseño e Implementación del Marco de Trabajo de Certificado de Atributos X509 para la Delegación de Privilegios

In: VIII Reunión Española sobre Criptología y Seguridad de la información (VIII RECSI), pp. 571-581, Madrid, Spain, 2004.

Abstract | BibTeX | Links:

Javier Lopez, Juan J. Ortega, Jose M. Troya, Jose L. Vivas

High-level Specification of Security Systems

In: IEEE Globecom 2003 – Communications Security Track, pp. 1506-1510, IEEE Press IEEE Press, San Francisco, 2003, ISBN: 0-7803-7974-8.

Abstract | BibTeX | Links:

Javier Lopez, Juan J. Ortega, Jose M. Troya, Jose L. Vivas

How to Specify Security Services: A Practical Approach

In: 7th IFIP Conference on Multimedia and Communications Security (CMS’03), pp. 158-171, Springer-Verlag Springer-Verlag, Torino, Italy, 2003, ISBN: 3-540-20185-8.

Abstract | BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Javier Lopez

Practical Service Charge for P2P Content Distribution

In: Fifth International Conference on Information and Communications Security, pp. 112 – 123, Springer Springer, 2003.

Abstract | BibTeX | Links:

Jose L. Vivas, Jose A. Montenegro, Javier Lopez

Towards Business Process-Driven Framework for Security Engineering with the UML

In: 6th International Conference on Information Security (ISC’03), pp. 381-395, Springer-Verlag Springer-Verlag, Bristol, U.K., 2003, ISBN: 1-4020-7449-2.

Abstract | BibTeX | Links:

Javier Lopez, Juan J. Ortega, Jose M. Troya

Applying SDL to Formal Analysis of Security Systems

In: 11th International SDL Forum (SDL’03), pp. 300-317, Springer-Verlag Springer-Verlag, Stuttgart, Germany, 2003.

Abstract | BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez

Intermediary Non-Repudiation Protocols

In: 5th Conference on Electronic Commerce, pp. 207-214, IEEE Computer Society IEEE Computer Society, 2003.

Abstract | BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez

A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages

In: 18th IFIP International Information Security Conference. Security and Privacy in the Age of Uncertainty (IFIP SEC’03), pp. 37-48, IFIP IFIP, 2003.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Jose M. Troya, Mariemma I. Yague

Applying the Semantic Web Layers to Access Control

In: IEEE International Workshop on Web Semantics (WebS’03), pp. 622-626, IEEE Press IEEE Press, 2003, ISBN: 0-7695-1993-8.

BibTeX | Links:

Ed Dawson, Javier Lopez, Jose A. Montenegro, Eiji Okamoto

BAAI: Biometric Authentication and Authorization Infrastructure

In: IEEE International Conference on Information Technology (ITRE’03), pp. 274-278, IEEE IEEE, 2003, ISBN: 0780377249.

Abstract | BibTeX | Links:

Eiji Okamoto, Javier Lopez, Ed Dawson, Juan M. Gonzalez-Nieto, Selwyn Russell, Jason Smith

Certificate Retrieval and Validation in Online Systems

In: Symposium on Cryptography and Information Security (SCIS’03), pp. 25-30, Hamamatsu, Japan, 2003.

Abstract | BibTeX | Links:

Jose A. Montenegro, Javier Lopez

Taxonomía de las Infraestructuras de Autorización y Autentificación

In: XIII Jornadas TELECOM I+D 2003, 2003.

BibTeX

Javier Lopez, Antonio Mana, Ernesto Pimentel, Jose M. Troya, Mariemma I. Yague

Access Control Infrastructure for Digital Objects

In: International Conference on Information and Communications Security (ICICS’02), pp. 399-410, Springer-Verlag Springer-Verlag, Singapore, 2002.

Abstract | BibTeX | Links:

Javier Lopez, Jose A. Montenegro, Rodrigo Roman, Jorge Davila

Design of a VPN Software Solution Integrating TCP and UDP Services

In: International Conference on Infrastructure Security (InfraSec’02), pp. 325-337, Springer-Verlag Springer-Verlag, Bristol, U.K., 2002.

Abstract | BibTeX | Links:

Javier Lopez, Juan J. Ortega, Jose M. Troya

Protocol Engineering Applied to Formal Analysis of Security Systems

In: International Conference on Infrastructure Security (InfraSec’02), pp. 246-259, Springer-Verlag Springer-Verlag, Bristol, U.K., 2002.

Abstract | BibTeX | Links:

Online Public Key Infrastructure

William Caelli, Kevin Chen, Ed Dawson, Matthew Henricksen, Javier Lopez, Eiji Okamoto, Selwyn Russell, Jason Smith

Online Public Key Infrastructure

In: VII Reunión Española sobre Criptología y Seguridad de la Información (VII RECSI), pp. 123-135, Oviedo (Spain), 2002, ISBN: 84-699-8930-8.

BibTeX

Javier Lopez, Antonio Mana, Jose A. Montenegro, Juan J. Ortega, Jose M. Troya

Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations

In: First International Conference on Electronic Government (EGOV’02), pp. 211-214, Springer Springer, Aix-en-Provence, France, 2002.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Mariemma I. Yague

XML-Based Distributed Access Control System

In: Third International Conference on E-Commerce and Web Technologies (ECWeb’02), pp. 203-213, Springer Springer, 2002.

Abstract | BibTeX | Links:

Carmen Fernandez-Gago, Michael Fisher, Clare Dixon

Algorithms for Guiding Clausal Temporal Resolution

In: 25th Conference on Artificial Intelligence (KI’02), pp. 235-249, Springer Springer, Aachen, Germany, 2002.

Abstract | BibTeX | Links:

Ed Dawson, Javier Lopez, Jose A. Montenegro, Eiji Okamoto

A New Design of Privilege Management Infrastructure (PMIs) for Organizations Using Outsourced PKI

In: 5th International Conference on Information Security (ISC’02), pp. 136-149, Springer-Verlag Springer-Verlag, 2002, ISBN: 3540442707.

Abstract | BibTeX | Links:

Javier Lopez, Juan J. Ortega, Jose M. Troya

Verification of Authentication Protocols using SDL-method

In: First International Workshop on Security in Information Systems (SIS’02), pp. 61-71, Ciudad Real, Spain, 2002.

Abstract | BibTeX | Links:

Selwyn Russell, Eiji Okamoto, Ed Dawson, Javier Lopez

Improving Performance in Global PKI using Virtual Certificates and Synthetic Certificates

In: Symposium on Cryptography and Information Security (SCIS’02), pp. 1149-1154, 2002.

Abstract | BibTeX | Links:

Javier Lopez, Jose A. Montenegro, Jose M. Troya

Perspectiva Composicional para el Diseño y la Implementación de una PKI

In: I Congreso Internacional Sociedad de la Información, pp. 423-428, Las Palmas, España, 2002.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Jose A. Montenegro, Juan J. Ortega, Jose M. Troya

Designing Software Tools for the Use of Secure Electronic Forms

In: 3rd ACIS Int. Conf. on Software Engineering, Artificial Intelligence Networking and Parallel/Distributed Computing (SNPD’02), pp. 157-163, Madrid, Spain, 2002.

Abstract | BibTeX | Links:

Javier Lopez, Sonia Matamoros, Juan J. Ortega, Jose M. Troya

Observaciones sobre las técnicas de análisis formal de protocolos de seguridad

In: VII Reunión Española sobre Criptología y Seguridad de la Información (VII RECSI), pp. 471-483, Oviedo, España, 2002.

Abstract | BibTeX | Links:

Protección de Software basada en Tarjetas Inteligentes

Javier Lopez, Antonio Mana, Juan J. Ortega, Ernesto Pimentel

Protección de Software basada en Tarjetas Inteligentes

In: VII Reunión Española sobre Criptología y Seguridad de la Información (VII RECSI), pp. 485-497, Oviedo, España, 2002.

BibTeX

Sigrid Gurgens, Javier Lopez

Suitability of a Classical Analysis Method for E-Commerce Protocols

In: IV International Information Security Conference (ISC’01), pp. 46-62, Springer-Verlag Springer-Verlag, Malaga, Spain, 2001.

Abstract | BibTeX | Links:

Carmen Fernandez-Gago, Michael Fisher, Clare Dixon

An Algorithm for Guiding Clausal Temporal Resolution

In: 4th International Workshop on Strategies in Automated Deduction (STRATEGIES’01), Siena, Italy, 2001.

Abstract | BibTeX | Links:

A First Approach to Latin Electronic Notary Public Services

Jorge Davila, Javier Lopez, Rene Peralta, Jose M. Troya

A First Approach to Latin Electronic Notary Public Services

In: IFIP Conference on Security & Control of IT in Security, pp. 49-60, 2001.

BibTeX

Análisis, Diseño e Implementación de un Entorno Escalable de Comercio-e con Seguridad Telemática Adaptable Basada en PKI

Javier Areitio, Lorenzo Martínez, Javier Lopez, Jose A. Montenegro

Análisis, Diseño e Implementación de un Entorno Escalable de Comercio-e con Seguridad Telemática Adaptable Basada en PKI

In: I Simposio Español de Comercio Electrónico (SEC’01), pp. 145-160, Málaga, España, 2001.

Abstract | BibTeX

Jorge Davila, Javier Lopez, Rodrigo Roman

Introducción de Aplicaciones UDP en Redes Privadas Virtuales

In: III Jornadas de Ingeniería Telemática (JITEL’01), pp. 397-404, Barcelona (Spain), 2001.

Abstract | BibTeX | Links:

Ticketing Genérico y Seguro Sobre GSM

Antonio Mana, Javier Lopez, Jesus Martinez, Sonia Matamoros

Ticketing Genérico y Seguro Sobre GSM

In: Simposio en Informática y Telecomunicaciones 2001 (SIT’01), pp. 297-305, La Coruña, España, 2001.

Abstract | BibTeX

Javier Lopez, Antonio Mana, Juan J. Ortega, Jose M. Troya

Distributed Storage and Revocation in Digital Certificate Databases

In: 11th International Conference on Database and Expert Systems Applications (DEXA’00), pp. 929-938, Springer Springer, London, U.K., 2000.

Abstract | BibTeX | Links:

Una Solución Flexible para Redes Privadas Virtuales

Jorge Davila, Javier Lopez, Rene Peralta

Una Solución Flexible para Redes Privadas Virtuales

In: VI Reunión Española de Criptología y Seguridad de la Información (VI RECSI), pp. 329-340, La Laguna, 2000, ISBN: 978-84789743-1-3.

BibTeX

Development of Secure Internet Applications for Governmental Environments

Jorge Davila, Javier Lopez, Antonio Mana, Juan J. Ortega, Jose M. Troya

Development of Secure Internet Applications for Governmental Environments

In: IEEE International Workshop on Electronic Government (in DEXA’00), pp. 362-365, IEEE Press IEEE Press, 2000, ISBN: 0-7695-0680-1.

BibTeX

Internet Secure Communications Between Citizens and Public Administrations

Jorge Davila, Lidia Fuentes, Javier Lopez, Jose M. Troya, Antonio Vallecillo

Internet Secure Communications Between Citizens and Public Administrations

In: IFIP Conference on Advances in Electronic Government, pp. 109-120, 2000.

BibTeX

Javier Lopez, Antonio Mana, Jose A. Montenegro, Juan J. Ortega, Jose M. Troya

Aspectos de Implementación de una Infraestructura de Clave Pública Distribuida

In: Simposio Español de Informática Distribuida (SEID’00), pp. 313-320, Orense, Espa, 2000.

Abstract | BibTeX | Links:

Javier Areitio, Javier Lopez

Mecanismo de Seguridad de Bajo Costo para Micropagos

In: VI Reunion Española de Criptología y Seguridad de la Información (VI RECSI), pp. 193-200, La Laguna, Espa, 2000.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Juan J. Ortega

Cert’eM: Certification System Based on Electronic Mail Service Structure

In: Secure Networking (CQRE’99), pp. 109-118, Springer Springer, 1999.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Juan J. Ortega

An User Authentication Infrastructure for Extranet Applications

In: IEEE International Carnahan Conference on Security Technology, pp. 354-362, IEEE Press IEEE Press, Madrid, Spain, 1999.

Abstract | BibTeX | Links:

Arquitectura Composicional de Seguridad para Servicios Telemáticos

Lidia Fuentes, Javier Lopez

Arquitectura Composicional de Seguridad para Servicios Telemáticos

In: II Jornadas de Ingeniería Telemática (JITEL’99), pp. 141-148, 1999, ISBN: 84-89315-14-0.

BibTeX

Efficient Detection of Failure Modes in Electronic Commerce Protocols

Sigrid Gurgens, Javier Lopez, Rene Peralta

Efficient Detection of Failure Modes in Electronic Commerce Protocols

In: IEEE International Workshop on Electronic Commerce and Security, pp. 850-857, IEEE Press IEEE Press, Florence, Italy, 1999.

Abstract | BibTeX

Competitive Neural Networks Applied to Image Compression Techniques

Alfonso Larrosa, Francisco Lopez, Javier Lopez

Competitive Neural Networks Applied to Image Compression Techniques

In: International Conference on Imaging Science, Systems and Technology (CISST’99), pp. 547-550, 1999.

BibTeX

Javier Lopez, Antonio Mana, Juan J. Ortega

A Public Key Infrastructure for User Identification

In: IFIP Working Conference on User Identification and Privacy Protection, pp. 209-227, Stockholm, Sweden, 1999.

Abstract | BibTeX | Links:

Problemática de Seguridad para el Comercio Electrónico en el Sector Turístico

Javier Lopez, Javier Areitio, Felipe Rosello

Problemática de Seguridad para el Comercio Electrónico en el Sector Turístico

In: I Congreso Nacional Turismo y Tecnología de la Información y las Comunicaciones (TURITEC’99), pp. 99-110, 1999.

Abstract | BibTeX

Secure Examinations Through The Internet

Antonio Mana, Francisco Villalba, Javier Lopez

Secure Examinations Through The Internet

In: IFIP World Computer Congress, pp. 695-708, 1998.

Abstract | BibTeX

Automatic Conversion of Scanned Maps to a Vector Based 3D Representation

Francisco Lopez, Javier Lopez, Juan A. Manceras, Antonio Mana

Automatic Conversion of Scanned Maps to a Vector Based 3D Representation

In: International Conference on Imaging Science, Systems, and Technology (CISST’98), Las Vegas, USA, 1998.

BibTeX

Francisco Lopez, Javier Lopez, Juan A. Manceras, Antonio Mana

Neural Networks Applied to the Estimation of Object Orientation

In: International Conference on Imaging Science, Systems, and Technology (CISST’98), pp. 418-424, Las Vegas, USA, 1998.

Abstract | BibTeX | Links:

Aproximacion de Funciones mediante Redes Neuronales

Lucia Pino, Javier Lopez, Francisco Lopez, Carlos Maraval

Aproximacion de Funciones mediante Redes Neuronales

In: pp. 209-215, 1997, ISBN: 84-89654-03-4.

BibTeX

Sistema Jerárquico de Administración de Claves Públicas para el Correo Electrónico

Lucia Pino, Antonio Mana, Juan J. Ortega, Javier Lopez

Sistema Jerárquico de Administración de Claves Públicas para el Correo Electrónico

In: I Jornadas de Ingeniería Telemática (JITEL’97), pp. 295-302, Bilbao (Spain), 1997, ISBN: 84-89654-04-2.

BibTeX

Neural Networks for Systems Security

Francisco Lopez, Javier Lopez, Lucia Pino, Carlos Maraval

Neural Networks for Systems Security

In: 5th European Congress of Intelligent Techniques and Soft Computing (EUFIT’97), pp. 410-413, Germany, 1997.

Abstract | BibTeX

Determination of Objects Orientation in Assembly Lines using Neural Networks

Francisco Lopez, Javier Lopez, Alvaro Vergara, Lucia Pino

Determination of Objects Orientation in Assembly Lines using Neural Networks

In: 5th Intern. Conf. on Computer Aided Systems Theory and Technology (EUROCAST’97), pp. 183-189, Las Palmas, Spain, 1997.

Abstract | BibTeX

A Tool for Functions Approximation by Neural Networks

Lucia Pino, Javier Lopez, Francisco Lopez, Carlos Maraval

A Tool for Functions Approximation by Neural Networks

In: 5th European Congress of Intelligent Techniques and Soft Computing (EUFIT’97), pp. 557-564, Aachen (Germany), 1997.

BibTeX

Antonio Mana, Javier Lopez, Lucia Pino, Juan J. Ortega, Carlos Maraval

Incremento de la Seguridad del Estandar de Cifrado de Datos basado en la Combinación de Datos y Clave

In: III Jornadas de Informática y Automática, pp. 423-432, El Puerto de Santa María, España, 1997.

Abstract | BibTeX | Links:

Javier Lopez, Gonzalo Ramos, Rafael Morales

Comparación de la Condición de Parikh con algunas Condiciones de los Lenguajes de Contexto Libre

In: II Jornadas de Informática y Automática, pp. 305-314, Almuñecar, España, 1996.

Abstract | BibTeX | Links:

Generación de Números Primos mediante Tests de Primalidad Probabilístas

Javier Lopez, Francisco Ona, Lucia Pino, Carlos Maraval

Generación de Números Primos mediante Tests de Primalidad Probabilístas

In: IV Reunión Española de Criptología (IV REC), pp. 27-33, Valladolid, España, 1996.

Abstract | BibTeX

Gonzalo Ramos, Javier Lopez

ID3f+A. Algoritmo de Aprendizaje Inductivo Borroso con División Intervalar Automática de los Atributos

In: VI Congreso Español Sobre Tecnologías y Lógica Fuzzy (ESTYLF’96), pp. 225-230, 1996.

Abstract | BibTeX | Links:

Image Compression Based on Competitive Hebbian Learning Neural Networks

Francisco Lopez, Javier Lopez, Carlos Maraval

Image Compression Based on Competitive Hebbian Learning Neural Networks

In: Brain Processes, Theories and Models International Conference, pp. 478-482, Las Palmas, Spain, 1995.

BibTeX

Seguridad de Directorios en Criptosistemas de Clave Pública mediante Redes Neuronales en Sistemas de Comunicaciones

Javier Lopez, Francisco Ona, Lucia Pino, Carlos Maraval

Seguridad de Directorios en Criptosistemas de Clave Pública mediante Redes Neuronales en Sistemas de Comunicaciones

In: X Symposium Nacional de la Unión Científica Internacional de Radio (URSI’95), pp. 147-150, Valladolid, España, 1995.

BibTeX

Sistema de Cifrado de Correo Electrónico en Red de Area Local

Javier Lopez, Carlos Maraval

Sistema de Cifrado de Correo Electrónico en Red de Area Local

In: III Reunión Española de Criptología (III REC), pp. 133-138, Barcelona, España, 1994.

BibTeX

Theo Dimitrakos, Javier Lopez, Fabio Martinelli

Collaborative Approaches for Cyber Security in Cyber-Physical Systems

Springer, 2023, ISBN: 9783031160882.

BibTeX | Links:

Cristina Alcaraz

Security and Privacy Trends in the Industrial Internet of Things

Springer, 2019, ISBN: 978-3-030-12330-7.

BibTeX | Links:

Ruben Rios, Javier Lopez, Jorge Cuellar

Location Privacy in Wireless Sensor Networks

Taylor & Francis, 2016, ISBN: 9781498776332.

BibTeX | Links:

Carmen Fernandez-Gago, Massimo Felici

Accountability and Security in the Cloud

2015.

BibTeX

Maritta Heisel, Wouter Joosen, Javier Lopez, Fabio Martinelli

Engineering Secure Future Internet Services and Systems- Current Research

Springer, 2014.

Abstract | BibTeX

Javier Lopez, Roberto Setola, Stephen Wolthusen (Ed.)

Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense

Springer, 2012, ISSN: 978-3-642-28919-4.

BibTeX

Romain Carbou, Michel Diaz, Ernesto Exposito, Rodrigo Roman

Digital Home Networking

Wiley-ISTE, 2011, ISSN: 1848213212.

BibTeX | Links:

Jose A. Onieva, Javier Lopez, Jianying Zhou

Secure Multi-Party Non-Repudiation Protocols and Applications

Springer, 2009, ISBN: 978-0-387-75629-5.

BibTeX | Links:

Steven Furnell, Sokratis K. Katsikas, Javier Lopez, Ahmed Patel

Securing Information and Communications Systems: Principles, Technologies and Applications

Artech House, 2008, ISSN: 1596932287.

BibTeX

Javier Lopez, Jianying Zhou

Wireless Sensor Networks Security

IOS Press, 2008, ISSN: 9781586038137.

BibTeX | Links:

Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez

POM: A Trust-based AHP-like Methodology to Solve Conflict Requirements for the IoT

In: Collaborative Approaches for Cyber Security in Cyber-Physical Systems, pp. 145-170, Springer, 2023, ISSN: 1613-5113.

BibTeX | Links:

Recipient Anonymity

Ruben Rios

Recipient Anonymity

In: Sushil Jajodia, Pierangela Samarati, Moti Yung (Ed.): 2021.

BibTeX | Links:

Situational Awareness for CPS

Cristina Alcaraz

Situational Awareness for CPS

In: Encyclopedia of Cryptography, Security and Privacy, pp. 1–3, Springer Berlin Heidelberg, Berlin, Heidelberg, 2021, ISBN: 978-3-642-27739-9.

BibTeX | Links:

Risk Assessment for IoT-Enabled Cyber-Physical Systems

Ioannis Stellios, Panayiotis Kotzanikolaou, Mihalis Psarakis, Cristina Alcaraz

Risk Assessment for IoT-Enabled Cyber-Physical Systems

In: Advances in Core Computer Science-Based Technologies, pp. 157-173, Springer International Publishing, Cham, 2021, ISBN: 978-3-030-41196-1.

Abstract | BibTeX | Links:

Ana Nieto, Ruben Rios, Javier Lopez

Privacy-Aware Digital Forensics

In: Security and Privacy for Big Data, Cloud Computing and Applications, The Institution of Engineering and Technology (IET), United Kingdom, 2019, ISBN: 978-1-78561-747-8.

BibTeX | Links:

Cristina Alcaraz

Secure Interconnection of IT-OT Networks in Industry 4.0

In: Critical Infrastructure Security and Resilience: Theories, Methods, Tools and Technologies, pp. 201-217, Springer International Publishing, 2019, ISBN: 978-3-030-00024-0.

Abstract | BibTeX | Links:

A review of dynamic verification of security and dependability properties

Antonio Muñoz, Jamal Toutouh, Francisco Jaime

A review of dynamic verification of security and dependability properties

In: IGI Global (Ed.): pp. 27, 2019, ISBN: 9781522573531.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

Secure Interoperability in Cyber-Physical Systems

In: Security Solutions and Applied Cryptography in Smart Grid Communications, IGI Global, USA, pp. 137-158, IGI Global, USA, 2017, ISBN: 9781522518297.

Abstract | BibTeX | Links:

Cristina Alcaraz, Lorena Cazorla, Javier Lopez

Cyber-Physical Systems for Wide-Area Situational Awareness

In: Cyber-Physical Systems: Foundations, Principles and Applications, pp. 305 – 317, Academic Press, Boston, 2017, ISBN: 978-0-12-803801-7.

Abstract | BibTeX | Links:

Carmen Fernandez-Gago, David Nuñez

Metrics for Accountability in the Cloud

In: Accountability and Security in the Cloud, vol. 8937, pp. 129-153, 2015.

BibTeX

Privacy-Preserving Identity Management as a Service

David Nuñez, Isaac Agudo, Javier Lopez

Privacy-Preserving Identity Management as a Service

In: Massimo Felici, Carmen Fernandez-Gago (Ed.): Accountability and Security in the Cloud, vol. 8937, pp. 114-125, Springer International Publishing, 2015, ISBN: 978-3-319-17198-2.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Benoit Baudry, Javier Lopez

Engineering Trust-Awareness and Self-adaptability in Services and Systems

In: Engineering Secure Future Internet Services and Systems, vol. 8431, pp. 180-209, Springer, 2014, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Ruben Rios, Javier Lopez, Jorge Cuellar

Location Privacy in WSNs: Solutions, Challenges, and Future Trends

In: Foundations of Security Analysis and Design VII, vol. 8604, pp. 244-282, Springer, 2014, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Cristina Alcaraz, Gerardo Fernandez, Fernando Carvajal

Security Aspects of SCADA and DCS Environments

In: Javier Lopez, Stephen Wolthusen, Roberto Setola (Ed.): Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense, vol. 7130, pp. 120-149, Springer-Verlag, Heidelberger (Berlin, Alemania), 2012, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Remi Bars, Jorge Gomez, Mohamed Mahdi, Cristina Alcaraz, Rodrigo Roman

Digital Home Networking: Standards

In: Romain Carbou, Ernesto Exposito, Rodrigo Roman, Michel Diaz (Ed.): Digital Home Networking, vol. 7130, pp. 60-96, John Wiley & Sons Inc., Reino Unido, 2011, ISSN: 978-1-84821-321-0.

BibTeX

Pablo Najera, Ana Nieto

Network Technologies

In: Romain Carbou, Ernesto Exposito, Rodrigo Roman (Ed.): Digital Home Networking, pp. 17 – 58, Wiley-ISTE, 2011, ISBN: 978-1848213210.

BibTeX

Francisco Moyano, Rodrigo Roman, Anas Abou El Kalam, Marc Lacoste, Mohamed Maachaoui

Security

In: Romain Carbou, Michel Diaz, Ernesto Exposito, Rodrigo Roman (Ed.): Digital Home Networking, pp. 139-202, 2011, ISSN: 9781848213210.

BibTeX

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

Security in the Developments Process of Mobile Grid Systems

In: Advances in Grid Computing, pp. 173-198, Intech, 2011.

BibTeX | Links:

Rodrigo Roman, Carmen Fernandez-Gago, Javier Lopez, Hsiao-Hwa Chen

Trust and Reputation Systems for Wireless Sensor Networks

In: Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Ed.): Security and Privacy in Mobile and Wireless Networking, pp. 105-128, Troubador Publishing Ltd, 2009, ISBN: 978-1905886-906.

Abstract | BibTeX | Links:

Rodrigo Roman, Cristina Alcaraz, Nicolas Sklavos

On the Hardware Implementation Efficiency of Cryptographic Primitives

In: Javier Lopez, Jianying Zhou (Ed.): Wireless Sensor Network Security, IOS Press, 2008, ISBN: 978-1-58603-813-7.

Abstract | BibTeX | Links:

Pablo Najera, Javier Lopez

RFID: Technological Issues and Privacy Concerns

In: Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani Vimercati (Ed.): Digital Privacy: Theory, Technologies, and Practices, pp. 285-306, Auerbach Publications, 2007, ISBN: 1420052179.

BibTeX | Links:

Jose L. Vivas, Jose A. Montenegro, Javier Lopez

Grid Security Architecture: Requirements, Fundamentals, Standards and Models

In: Yang Xiao (Ed.): Security in Distributed, Grid, Mobile, and Pervasive Computing, pp. 255-288, Auerbach Publications, 2007, ISBN: 9780849379215.

BibTeX | Links:

Javier Lopez, Cristina Alcaraz, Rodrigo Roman

On the Protection and Technologies of Critical Information Infrastructures.

In: On Foundations of Security Analysis and Design IV, FOSAD 2006/2007, Springer, vol. 4677, pp. 160-182, 2007, ISSN: 0302-9743, (10.1007/978-3-540-74810-6_6).

Abstract | BibTeX | Links:

Wenjuan Li, Liqun Chen, Javier Lopez (Ed.)

Emerging Information Security and Applications

2025, ISBN: 978-3-031-80418-2.

Abstract | BibTeX | Links:

Ruben Rios, Fabio Martinelli

20th International Workshop on Security and Trust Management (STM 2024)

2024, ISBN: 978-3-031-76370-0.

BibTeX | Links:

Ruben Rios, Joachim Posegga

19th International Workshop on Security and Trust Management (STM 2023)

Springer Cham, vol. 14336, 2023, ISBN: 978-3-031-47197-1.

Abstract | BibTeX | Links:

Tim Muller, Carmen Fernandez-Gago, Davide Ceolin, Ehud Gudes, Nurit Gal-Oz (Ed.)

14th IFIP WG11.11 on Trust Management (IFIPTM 2023)

2023, ISBN: 978-3-031-76716-6.

Abstract | BibTeX

Rodrigo Roman, Mujeeb Ahmed (Ed.)

9th ACM Cyber-Physical System Security Workshop (CPSS 2023)

ACM, Melbourne, Australia, 2023, ISBN: 979-8-4007-0090-3.

BibTeX | Links:

Xingliang Yuan, Guangdong Bai, Cristina Alcaraz, Suryadipta Majumdar (Ed.)

16th International Conference on Network and System Security (NSS 2022)

2022, ISBN: 978-3-031-23019-6.

Abstract | BibTeX | Links:

Earlence Fernandes, Cristina Alcaraz

CPSIoTSec ’22: 4th Workshop on CPS & IoT Security and Privacy

2022, ISBN: 978-1-4503-9450-5.

Abstract | BibTeX | Links:

Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman Zonouz (Ed.)

4th Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2022) – ACNS: International Conference on Applied Cryptography and Network Security

2022, ISBN: 978-3-031-16814-7.

Abstract | BibTeX | Links:

Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati (Ed.)

24th International Conference on Information and Communications Security (ICICS 2022)

2022, ISBN: 978-3-031-15776-9.

Abstract | BibTeX | Links:

Rodrigo Roman, Jianying Zhou (Ed.)

17th International Workshop on Security and Trust Management (STM 2021)

Springer Cham, vol. 13075, 2021, ISBN: 978-3-030-91859-0.

Abstract | BibTeX | Links:

2nd Workshop on CPS&IoT Security and Privacy, 2021

Michail Maniatakos, Cristina Alcaraz (Ed.)

2nd Workshop on CPS&IoT Security and Privacy, 2021

2021, ISBN: 978-1-4503-8487-2.

Abstract | BibTeX | Links:

Manuel A. Serrano, Eduardo Fernández-Medina Cristina Alcaraz, Noemí de Castro, Guillermo Calvo

VI Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2021)

2021, ISBN: 978-84-9044-463-4.

BibTeX | Links:

Sokratis Katsikas, Cristina Alcaraz

Cyber-Physical System Security Workshop (CPSS 2020)

2020, ISBN: 978-1-4503-7608-2.

Abstract | BibTeX | Links:

Sokratis K. Katsikas, Cristina Alcaraz

14th International Workshop on Security and Trust Management (STM 2018)

Springer International Publishing, Springer Nature Switzerland, vol. 11091, 2018, ISSN: 1611-3349.

BibTeX | Links:

Javier Lopez, Jianying Zhou, Miguel Soriano (Ed.)

23rd European Symposium on Research In Computer (ESORICS 2018)

2018, ISBN: 978-3-319-99072-9.

Abstract | BibTeX | Links:

Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti, Giovanni Livraga, Ruben Rios

13th International Workshop on Data Privacy Management (DPM 2018)

Springer International Publishing, Barcelona, Spain, vol. 11025, 2018, ISBN: 978-3-030-00305-0.

Abstract | BibTeX | Links:

Mónica Aguilar-Igartua, Carolina Tripp Barba, Cristina Alcaraz

12th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc (PE-WASUM 2015)

ACM, Cancun, Mexico, 2015, ISBN: 978-1-4503-3759-5.

BibTeX | Links:

Massimo Felici, Carmen Fernández-Gago

1st Summer School on Accountability and Security in the Cloud (A4CLOUD 2014)

2014, ISBN: 978-3-319-17198-2.

Abstract | BibTeX | Links:

Sokratis K. Katsikas, Isaac Agudo (Ed.)

10th European Workshop on Public Key Infrastructures, Services and Applications (EuroPKI 2013)

Springer, vol. 8341, 2013, ISBN: 978-3-642-53996-1.

BibTeX | Links:

Steven Furnell, Costas Lambrinoudakis, Javier Lopez (Ed.)

10th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2013)

Springer, Prague, Czech Republic, vol. LNCS 8058, 2013, ISBN: 978-3-642-40342-2.

BibTeX

Javier Lopez, Xinyi Huang, Ravi Sandhu (Ed.)

7th International Conference on Network and System Security (NSS 2013)

Springer, vol. LNCS, no. 7873, 2013, ISBN: 978-3-642-38631-2.

BibTeX | Links:

Carmen Fernandez-Gago, Fabio Martinelli, Siani Pearson, Isaac Agudo (Ed.)

7th IFIP WG11.11 on Trust Management (IFIPTM 2013)

Springer, Malaga (Spain), vol. 401, 2013, ISBN: 978-3-642-38323-6.

BibTeX

Bernhard M. Hämmerli, Nils Kalstad Svendsen, Javier Lopez (Ed.)

7th International Conference on Critical Information Infrastructures Security (CRITIS 2012)

Springer, Lillehammer (Norway), vol. LNCS 7722, 2013, ISBN: 978-3-642-41485-5.

BibTeX | Links:

Yang Xiang, Javier Lopez, C.-C. Jay Kuo, Wanlei Zhou (Ed.)

4th International Symposium on Cyberspace Safety and Security (CSS 2012)

Springer, Melbourne (Australia), vol. LNCS, 2012, ISSN: 978-3-642-35362-8.

BibTeX

Catherine Meadows, Carmen Fernandez-Gago (Ed.)

7th International Workshop on Security and Trust Management (STM 2011)

Springer, Copenhaguen, Denmark, vol. 7170, 2012, ISBN: 978-3-642-29963-6.

BibTeX

Jorge Cuellar, Javier Lopez (Ed.)

3rd International ACMSigsoft Symposium on Architecting Critical Systems (ISARCS 2012)

ACM, Bertinoro (Italy), 2012.

BibTeX

Javier Lopez, Gene Tsudik

9th International Conference on Applied Cryptography and Network Security (ACNS 2011)

Springer, vol. 6715, 2011.

BibTeX

Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner (Ed.)

6th International Workshop on Security and Trust Management (STM 2010)

vol. 6710, 2010, ISSN: 978-3-642-22443-0.

BibTeX

Sokratis K. Katsikas, Javier Lopez, Miguel Soriano (Ed.)

7th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2010)

Springer, vol. 6264, 2010, ISBN: 978-3-642-15151-4.

BibTeX | Links:

Yang Xiang, Javier Lopez, Haining Wang, Wanlei Zhou (Ed.)

3rd International Conference on Network and Information Security (NSS 2009)

IEEE Computer Sociaty, Gold Coast, Australia, 2009, ISBN: 978-07695-3838-9.

BibTeX | Links:

Dimitris Gritzalis, Javier Lopez (Ed.)

24th International Information Security Conference (IFIP-SEC 2009)

Springer, vol. 297, 2009, ISBN: 978-3-642-01243-3.

BibTeX | Links:

Sushil Jajodia, Javier Lopez (Ed.)

13th European Symposium on Research in Computer Security (ESORICS 2008)

Springer, vol. 5283, 2008, ISBN: 978-3-540-88312-8.

BibTeX

Jose A. Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Konstantinos Markantonakis (Ed.)

II Workshop in Information Security Theory and Practices (WISTP 2008)

Springer Verlag, Seville, Spain, vol. 5019, 2008, ISBN: 978-3-540-79965-8.

BibTeX | Links:

Joachim Biskup, Javier Lopez (Ed.)

12th European Symposium on Research in Computer (ESORICS 2007)

Springer, vol. 4734, 2007, ISBN: 978-3-540-74834-2.

BibTeX

Javier Lopez, Bernhard M. Hämmerli (Ed.)

2nd International Workshop on Critical Information Infrastructures Security (CRITIS 2007)

Springer, vol. 5141, 2007, ISBN: 978-3-540-89095-9.

BibTeX | Links:

Javier Lopez, Pierangela Samarati, Josep L. Ferrer-Gomila (Ed.)

4th European Workshop on Public Key Infrastructures (EuroPKI 2007)

Springer, vol. 4582, 2007, ISBN: 978-3-540-73407-9.

BibTeX

Panagiotis Georgiadis, Javier Lopez, Stefanos Gritzalis, Giannis F. Marias (Ed.)

3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007), 19 July 2007, Istanbul, Turkey

IEEE Press, 2007, ISBN: 978-07695-2563-2.

BibTeX | Links:

Javier Lopez (Ed.)

1st International Workshop on Critical Information Infrastructure Security (CRITIS 2006)

Springer, vol. 4347, 2006, ISBN: 3-540-69083-2.

BibTeX

Sokratis K. Katsikas, Javier Lopez, Michael Backes, Stefanos Gritzalis, Bart Preneel (Ed.)

9th International Information Security Conference (ISC 2006)

Springer, vol. 4176, 2006, ISBN: 3-540-38341-7.

BibTeX

Sihan Qing, Wenbo Mao, Javier Lopez, Guilin Wang (Ed.)

7th International Conference on Information as Communication Security (ICICS 2005)

Springer, vol. 3783, 2005, ISBN: 3-540-30934-9.

BibTeX

Jianying Zhou, Javier Lopez, Robert H. Deng, Feng Bao (Ed.)

8th International Information Security Conference (ISC 2005)

Springer, vol. 3650, 2005, ISBN: 3-540-29001-X.

BibTeX

Sokratis K. Katsikas, Javier Lopez, Guenther Pernul (Ed.)

2nd International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2005)

Springer, vol. 3592, 2005, ISBN: 3-540-28224-6.

BibTeX

Javier Lopez, Sihan Qing, Eiji Okamoto (Ed.)

6th International Conference on Information and Communications Security (ICICS 2004)

Springer, vol. 3269, 2004, ISBN: 3-540-23563-9.

BibTeX

Sokratis K. Katsikas, Stefanos Gritzalis, Javier Lopez (Ed.)

1st European PKI Workshop (EuroPKI 2004)

Springer, vol. 3093, 2004, ISBN: 3-540-22216-2.

BibTeX

Sokratis K. Katsikas, Javier Lopez, Guenther Pernul (Ed.)

1st International Conference on Trust and Privacy in Digital Business (TrustBus 2004)

Springer, vol. 3184, 2004, ISBN: 3-540-22919-1.

BibTeX

Miguel Soriano, Javier Lopez, Forne Jordi (Ed.)

2nd Spanish Symposium on Electronic Commerce (SEC 2003)

Fundacion Dintel, vol. 7, 2003, ISBN: 8493290203.

BibTeX

5th Spanish Conference on Cryptology and Information Security

Javier Lopez, J Pastor, Jose M. Troya (Ed.)

5th Spanish Conference on Cryptology and Information Security

1998, ISBN: 8484978206.

BibTeX