Scroll Top
Previous publications

Carmen Fernandez-Gago, Davide Ferraris, Rodrigo Roman, Javier Lopez

Trust interoperability in the Internet of Things Journal Article Forthcoming

In: Internet of Things, vol. 26, Forthcoming.

Abstract | BibTeX | Links:

Cristina Alcaraz, Iman Hasnaouia Meskini, Javier Lopez

Digital twin communities: an approach for secure DT data sharing Journal Article Forthcoming

In: International Journal of Information Security, vol. 24, no. 17, Forthcoming, ISSN: 1615-5270.

Abstract | BibTeX | Links:

Daniel Morales, Isaac Agudo, Javier Lopez

Toward a Framework for Cost-Effective and Publicly Verifiable Confidential Computations in Blockchain Journal Article Forthcoming

In: IEEE Communications Magazine, Forthcoming, ISSN: 1558-1896.

Abstract | BibTeX | Links:

Andrew D. Syrmakesis, Cristina Alcaraz, Nikos D. Hatziargyriou

DAR-LFC: A data-driven attack recovery mechanism for Load Frequency Control Journal Article

In: International Journal of Critical Infrastructure Protection, vol. 45, iss. 100678, pp. 100678, 2024, ISSN: 1874-5482.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

Protecting Digital Twin Networks for 6G-enabled Industry 5.0 Ecosystems Journal Article

In: IEEE Network Magazine, vol. 37, no. 2, pp. 302-308, 2023, ISSN: 0890-8044.

Abstract | BibTeX | Links:

Davide Ferraris, Carmen Fernandez-Gago, Rodrigo Roman, Javier Lopez

A Survey on IoT Trust Model Frameworks Journal Article

In: The Journal of Supercomputing, 2023.

Abstract | BibTeX | Links:

Cristina Alcaraz, Jesus Cumplido, Alicia Triviño

OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0 Journal Article

In: International Journal of Information Security, 2023, ISSN: 1615-5262.

Abstract | BibTeX | Links:

Daniel Morales, Isaac Agudo, Javier Lopez

Private set intersection: A systematic literature review Journal Article

In: Computer Science Review, vol. 49, no. 100567, 2023, ISSN: 1574-0137.

Abstract | BibTeX | Links:

Rodrigo Roman, Cristina Alcaraz, Javier Lopez, Kouichi Sakurai

Current Perspectives on Securing Critical Infrastructures’ Supply Chains Journal Article

In: IEEE Security & Privacy, vol. 21, no. 4, pp. 29-38, 2023, ISSN: 1540-7993.

BibTeX | Links:

Antonio Muñoz, Ruben Rios, Rodrigo Roman, Javier Lopez

A survey on the (in)security of Trusted Execution Environments Journal Article

In: Computers & Security, pp. 103-180, 2023, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Antonio Muñoz, Carmen Fernandez-Gago, Roberto Lopez-Villa

A Test Environment for Wireless Hacking in Domestic IoT Scenarios Journal Article

In: Mobile Networks and Applications, 2022, ISSN: 1383-469X.

BibTeX | Links:

George Suciu, Aristeidis Farao, Giorgio Bernardinetti, Ivan Palamá, Mari-Anais Sachian, Alexandru Vulpe, Marius-Constantin Vochin, Pavel Muresan, Michail Bampatsikos, Antonio Muñoz, Christos Xenakis

SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform Journal Article

In: SENSORS, vol. 22, iss. 6527, no. 17, 2022, ISSN: 1424-8220.

Abstract | BibTeX | Links:

Andrew D. Syrmakesis, Cristina Alcaraz, Nikos D. Hatziargyriou

Classifying resilience approaches for protecting smart grids against cyber threats Journal Article

In: International Journal of Information Security, vol. 21, pp. 1189–1210, 2022, ISSN: 1615-5262.

Abstract | BibTeX | Links:

Xueou Wang, Xiaolu Hou, Ruben Rios, Nils Ole Tippenhauer, Martin Ochoa

Constrained Proximity Attacks on Mobile Targets Journal Article

In: ACM Transactions on Privacy and Security (TOPS), vol. 25, no. 10, pp. 1 – 29, 2022, ISSN: 2471-2566.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

Digital Twin: A Comprehensive Survey of Security Threats Journal Article

In: IEEE Communications Surveys & Tutorials, vol. 24, no. thirdquarter 2022, pp. 1475 – 1503, 2022, ISSN: 1553-877X.

Abstract | BibTeX | Links:

Ishak Meraouche, Sabyasachi Dutta, Sraban Kumar Mohanty, Isaac Agudo, Kouichi Sakurai

Learning multi-party adversarial encryption and its application to secret sharing Journal Article

In: IEEE Access, 2022, ISSN: 2169-3536.

Abstract | BibTeX | Links:

Ruben Rios, Jose A. Onieva, Rodrigo Roman, Javier Lopez

Personal IoT Privacy Control at the Edge Journal Article

In: IEEE Security & Privacy, vol. 20, pp. 23 – 32, 2022, ISSN: 1540-7993.

Abstract | BibTeX | Links:

Francesco Flammini, Cristina Alcaraz, Emanuele Bellini, Stefano Marrone, Javier Lopez, Andrea Bondavalli

Towards Trustworthy Autonomous Systems: Taxonomies and Future Perspectives Journal Article

In: IEEE Transactions on Emerging Topics in Computing, 2022, ISSN: 2168-6750.

Abstract | BibTeX | Links:

Simone Fischer-Hübner, Cristina Alcaraz, Afonso Ferreira, Carmen Fernandez-Gago, Javier Lopez, Evangelos Markatos, Lejla Islami, Mahdi Akil

Stakeholder Perspectives and Requirements on Cybersecurity in Europe Journal Article

In: Journal of Information Security and Applications, vol. 61, no. 102916, 2021, ISSN: 2214-2126.

BibTeX | Links:

Antonio Muñoz, Aristeidis Farao, Ryan Casas, Christos Xenakis

P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements Journal Article

In: Information, vol. 12, no. 357, 2021, ISSN: 2078-2489,.

BibTeX | Links:

Isaac Agudo, Manuel Montenegro-Gómez, Javier Lopez

A Blockchain Approach for Decentralized V2X (D-V2X) Journal Article

In: IEEE Transactions on Vehicular Technology, vol. 70, no. 5, pp. 4001 – 4010, 2021, ISSN: 0018-9545.

Abstract | BibTeX | Links:

Javier Lopez, Juan E. Rubio, Cristina Alcaraz

Digital Twins for Intelligent Authorization in the B5G-enabled Smart Grid Journal Article

In: IEEE Wireless Communications, vol. 28, pp. 48-55, 2021, ISSN: 1536-1284.

Abstract | BibTeX | Links:

Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez

A model-driven approach to ensure trust in the IoT Journal Article

In: Human-centric Computing and Information Sciences, vol. 10, no. 50, 2020, ISSN: 2192-1962.

Abstract | BibTeX | Links:

Juan E. Rubio, Rodrigo Roman, Javier Lopez

Integration of a Threat Traceability Solution in the Industrial Internet of Things Journal Article

In: IEEE Transactions on Industrial Informatics, vol. 16, no. 6575-6583, 2020, ISSN: 1551-3203.

Abstract | BibTeX | Links:

Ana Nieto

Becoming JUDAS: Correlating Users and Devices during a Digital Investigation Journal Article

In: IEEE Transactions on Information Forensics & Security, vol. 15, pp. 3325-3334, 2020, ISSN: 1556-6013.

Abstract | BibTeX | Links:

Cristina Alcaraz, Juan E. Rubio, Javier Lopez

Blockchain-Assisted Access for Federated Smart Grid Domains: Coupling and Features Journal Article

In: Journal of Parallel and Distributed Computing, vol. 144, pp. 124-135, 2020, ISSN: 0743-7315.

BibTeX | Links:

Davide Ferraris, Daniel Bastos, Carmen Fernandez-Gago, Fadi El-Moussa

A Trust Model for Popular Smart Home Devices Journal Article

In: International Journal of Information Security, 2020, ISSN: 1615-5262.

Abstract | BibTeX | Links:

Cristina Alcaraz, Giuseppe Bernieri, Federica Pascucci, Javier Lopez, Roberto Setola

Covert Channels-based Stealth Attacks in Industry 4.0 Journal Article

In: IEEE Systems Journal., vol. 13, pp. 3980-3988, 2019, ISSN: 1932-8184.

Abstract | BibTeX | Links:

Juan E. Rubio, Cristina Alcaraz, Rodrigo Roman, Javier Lopez

Current Cyber-Defense Trends in Industrial Control Systems Journal Article

In: Computers & Security Journal, vol. 87, 2019, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Jose A. Onieva, Ruben Rios, Rodrigo Roman, Javier Lopez

Edge-Assisted Vehicular Networks Security Journal Article

In: IEEE Internet of Things Journal, vol. 6, pp. 8038-8045, 2019, ISSN: 2327-4662.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

Escrowed decryption protocols for lawful interception of encrypted data Journal Article

In: IET Information Security, vol. 13, pp. 498 – 507, 2019, ISSN: 1751-8709.

Abstract | BibTeX | Links:

Juan E. Rubio, Rodrigo Roman, Cristina Alcaraz, Yan Zhang

Tracking APTs in Industrial Ecosystems: A Proof of Concept Journal Article

In: Journal of Computer Security, vol. 27, pp. 521-546, 2019, ISSN: 0167-4048.

BibTeX | Links:

Rodrigo Roman, Ruben Rios, Jose A. Onieva, Javier Lopez

Immune System for the Internet of Things using Edge Technologies Journal Article

In: IEEE Internet of Things Journal, vol. 6, pp. 4774-4781, 2019, ISSN: 2327-4662.

Abstract | BibTeX | Links:

Martin Kolar, Carmen Fernandez-Gago, Javier Lopez

A Model Specification for the Design of Trust Negotiations Journal Article

In: Computers & Security, vol. 84, pp. 288-300, 2019, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Sarita Agrawal, Manik Lal Das, Javier Lopez

Detection of Node Capture Attack in Wireless Sensor Networks Journal Article

In: IEEE Systems Journal, vol. 13, pp. 238 – 247, 2019, ISSN: 1932-8184.

BibTeX

Ana Nieto, Ruben Rios

Cybersecurity Profiles based on Human-Centric IoT Devices Journal Article

In: Human-centric Computing and Information Sciences, vol. 9, no. 1, pp. 1-23, 2019, ISSN: 2192-1962.

BibTeX | Links:

Davide Ferraris, Carmen Fernandez-Gago

TrUStAPIS: A Trust Requirements Elicitation Method for IoT Journal Article

In: International Journal of Information Security, pp. 111-127, 2019, ISSN: 1615-5262.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

A Cyber-Physical Systems-Based Checkpoint Model for Structural Controllability Journal Article

In: IEEE Systems Journal, vol. 12, pp. 3543-3554, 2018, ISSN: 1932-8184.

Abstract | BibTeX | Links:

Ana Nieto, Antonio Acien, Gerardo Fernandez

Crowdsourcing analysis in 5G IoT: Cybersecurity Threats and Mitigation Journal Article

In: Mobile Networks and Applications (MONET), pp. 881-889, 2018, ISSN: 1383-469X.

Abstract | BibTeX | Links:

Hiroshi Tsunoda, Rodrigo Roman, Javier Lopez, Glenn Mansfield Keeni

Feasibility of Societal Model for Securing Internet of Things Journal Article

In: KSII Transactions on Internet and Information Systems, vol. 12, no. 8, pp. 3567-3588, 2018, ISSN: 1976-7277.

Abstract | BibTeX | Links:

Javier Lopez, Juan E. Rubio, Cristina Alcaraz

A Resilient Architecture for the Smart Grid Journal Article

In: IEEE Transactions on Industrial Informatics, vol. 14, pp. 3745-3753, 2018, ISSN: 1551-3203.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Stefanos Gritzalis

Evolution and Trends in the Security of the Internet of Things Journal Article

In: IEEE Computer, vol. 51, pp. 16-25, 2018, ISSN: 0018-9162.

BibTeX | Links:

Ioannis Stellios, Panayiotis Kotzanikolaou, Mihalis Psarakis, Cristina Alcaraz, Javier Lopez

Survey of IoT-enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services Journal Article

In: IEEE Communications Surveys and Tutorials, vol. 20, pp. 3453-3495, 2018, ISSN: 1553-877X.

Abstract | BibTeX | Links:

Lorena Cazorla, Cristina Alcaraz, Javier Lopez

Cyber Stealth Attacks in Critical Information Infrastructures Journal Article

In: IEEE Systems Journal, vol. 12, pp. 1778-1792, 2018, ISSN: 1932-8184.

Abstract | BibTeX | Links:

Cristina Alcaraz

Cloud-Assisted Dynamic Resilience for Cyber-Physical Control Systems Journal Article

In: IEEE Wireless Communications, vol. 25, no. 1, pp. 76-82, 2018, ISSN: 1536-1284.

BibTeX | Links:

Ana Nieto, Ruben Rios, Javier Lopez

IoT-Forensics meets Privacy: Towards Cooperative Digital Investigations Journal Article

In: Sensors, vol. 18, no. 492, 2018, ISSN: 1424-8220.

Abstract | BibTeX | Links:

Javier Lopez, Juan E. Rubio

Access control for cyber-physical systems interconnected to the cloud Journal Article

In: Computer Networks, vol. 134, pp. 46 – 54, 2018, ISSN: 1389-1286.

BibTeX | Links:

Rodrigo Roman, Javier Lopez, Masahiro Mambo

Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges Journal Article

In: Future Generation Computer Systems, vol. 78, pp. 680-698, 2018, ISSN: 0167-739X.

Abstract | BibTeX | Links:

Ruben Rios, Carmen Fernandez-Gago, Javier Lopez

Modelling Privacy-Aware Trust Negotiations Journal Article

In: Computers & Security, vol. 77, pp. 773-789, 2018, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Ana Nieto, Nikolaos Nomikos, Javier Lopez, Charalambos Skianis

Dynamic Knowledge-based Analysis in non-Secure 5G Green Environments using Contextual Data Journal Article

In: IEEE Systems Journal, vol. 11, no. 99, pp. 2479-2489, 2017, ISSN: 1932-8184.

Abstract | BibTeX | Links:

Cristina Alcaraz

Resilient Industrial Control Systems based on Multiple Redundancy Journal Article

In: International Journal of Critical Infrastructures (IJCIS), vol. 13, no. 2/3, pp. 278 – 295, 2017, ISSN: 1741-8038.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez, Kim-Kwang Raymond Choo

Resilient Interconnection in Cyber-Physical Control Systems Journal Article

In: Computers & Security, vol. 71, pp. 2-14, 2017, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Javier Lopez, Ruben Rios, Feng Bao, Guilin Wang

Evolving privacy: From sensors to the Internet of Things Journal Article

In: Future Generation Computer Systems, vol. 75, pp. 46–57, 2017, ISSN: 0167-739X.

Abstract | BibTeX | Links:

Juan E. Rubio, Cristina Alcaraz, Javier Lopez

Recommender System for Privacy-Preserving Solutions in Smart Metering Journal Article

In: Pervasive and Mobile Computing, vol. 41, pp. 205-218, 2017, ISSN: 1574-1192.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

Proxy Re-Encryption: Analysis of Constructions and its Application to Secure Access Delegation Journal Article

In: Journal of Network and Computer Applications, vol. 87, pp. 193-209, 2017, ISSN: 1084-8045.

Abstract | BibTeX | Links:

Javier Lopez, Cristina Alcaraz, Jesús Rodriguez, Rodrigo Roman, Juan E. Rubio

Protecting Industry 4.0 against Advanced Persistent Threats Journal Article

In: European CIIP Newsletter, vol. 11, no. 1, pp. 27-29, 2017.

BibTeX | Links:

Cristina Alcaraz, Javier Lopez, Stephen Wolthusen

OCPP Protocol: Security Threats and Challenges Journal Article

In: IEEE Transactions on Smart Grid, vol. 8, pp. 2452 – 2459, 2017, ISSN: 1949-3053.

Abstract | BibTeX | Links:

Carmen Fernandez-Gago, Francisco Moyano, Javier Lopez

Modelling Trust Dynamics in the Internet of Things Journal Article

In: Information Sciences, vol. 396, pp. 72-82, 2017, ISSN: 0020-0255.

Abstract | BibTeX | Links:

Ana Nieto, Rodrigo Roman, Javier Lopez

Testificación Digital Journal Article

In: Revista SIC, vol. 122, pp. 94-98, 2016, ISSN: 1136-0623.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

On the Application of Generic CCA-Secure Transformations to Proxy Re-Encryption Journal Article

In: Security and Communication Networks, vol. 9, pp. 1769-1785, 2016, ISSN: 1939-0114.

Abstract | BibTeX | Links:

David Nuñez, Carmen Fernandez-Gago, Jesús Luna

Eliciting Metrics for Accountability of Cloud Systems Journal Article

In: Computers & Security, vol. 62, pp. 149-164, 2016, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Ana Nieto, Rodrigo Roman, Javier Lopez

Digital Witness: Digital Evidence Management Framework for the Internet of Things Journal Article

In: ERCIM News, no. 106, pp. 9-9, 2016, ISSN: 0926-4981.

BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez

A Model-driven Approach for Engineering Trust and Reputation into Software Services Journal Article

In: Journal of Network and Computer Applications, vol. 69, pp. 134-151, 2016, ISSN: 1084-8045.

BibTeX | Links:

Ana Nieto, Rodrigo Roman, Javier Lopez

Digital Witness: Safeguarding Digital Evidence by using Secure Architectures in Personal Devices Journal Article

In: IEEE Network, pp. 12-19, 2016, ISSN: 0890-8044.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez, Stephen Wolthusen

Policy Enforcement System for Secure Interoperable Control in Distributed Smart Grid Systems Journal Article

In: Journal of Network and Computer Applications, vol. 59, pp. 301–314, 2016, ISSN: 1084-8045.

Abstract | BibTeX | Links:

Ana Nieto, Javier Lopez

Contextualising Heterogeneous Information in Unified Communications with Security Restrictions Journal Article

In: Computer Communications, vol. 68, pp. 33-46, 2015, ISSN: 0140-3664.

Abstract | BibTeX | Links:

Ruben Rios, Jorge Cuellar, Javier Lopez

Probabilistic receiver-location privacy protection in wireless sensor networks Journal Article

In: Information Sciences, vol. 321, pp. 205 – 223, 2015, ISSN: 0020-0255.

Abstract | BibTeX | Links:

Nikolaos Nomikos, Ana Nieto, Prodromos Makris, Dimitrios N. Skoutas, Demosthenes Vouyioukas, Panagiotis Rizomiliotis, Javier Lopez, Charalambos Skianis

Relay Selection for Secure 5G Green Communications Journal Article

In: Telecommunication Systems, vol. 59, pp. 169-187, 2015, ISSN: 1018-4864.

Abstract | BibTeX | Links:

Lorena Cazorla, Cristina Alcaraz, Javier Lopez

Awareness and Reaction Strategies for Critical Infrastructure Protection Journal Article

In: Computers and Electrical Engineering, vol. 47, pp. 299-317, 2015, ISSN: 0045-7906.

Abstract | BibTeX | Links:

Cristina Alcaraz, Sherali Zeadally

Critical Infrastructure Protection: Requirements and Challenges for the 21st Century Journal Article

In: International Journal of Critical Infrastructure Protection (IJCIP), vol. 8, pp. 53–66, 2015, ISSN: 1874-5482.

Abstract | BibTeX | Links:

Lorena Cazorla, Cristina Alcaraz, Javier Lopez

A Three-Stage Analysis of IDS for Critical Infrastructures Journal Article

In: Computers & Security, vol. 55, no. November, pp. 235-250, 2015, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Jose A. Montenegro, Javier Lopez

A practical solution for sealed bid and multi-currency auctions Journal Article

In: Computers & Security, vol. 45, pp. 186-198, 2014, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Ana Nieto, Javier Lopez

A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms Journal Article

In: Mobile Networks and Applications (MONET) Journal, vol. 19, pp. 64-78, 2014, ISSN: 1383-469X.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo

BlindIdM: A Privacy-Preserving Approach for Identity Management as a Service Journal Article

In: International Journal of Information Security, vol. 13, pp. 199-215, 2014, ISSN: 1615-5262.

Abstract | BibTeX | Links:

Carmen Fernandez-Gago, Isaac Agudo, Javier Lopez

Building Trust from Context Similarity Measures Journal Article

In: Computer Standards & Interfaces, Special Issue on Security in Information Systems, vol. 36, pp. 792-800, 2014, ISSN: 0920-5489.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

Diagnosis Mechanism for Accurate Monitoring in Critical Infrastructure Protection Journal Article

In: Computer Standards & Interfaces, vol. 36, pp. 501-512, 2014, ISSN: 0920-5489.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

WASAM: A Dynamic Wide-Area Situational Awareness Model for Critical Domains in Smart Grids Journal Article

In: Future Generation Computer Systems, vol. 30, pp. 146-154, 2014, ISSN: 0167-739X.

Abstract | BibTeX | Links:

Ruben Rios, Jose A. Onieva, Javier Lopez

Covert Communications through Network Configuration Messages Journal Article

In: Computers & Security, vol. 39, Part A, pp. 34 – 46, 2013, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

FACIES: online identification of Failure and Attack on interdependent Critical InfrastructurES Journal Article

In: European CIIP Newsletter, vol. 7, pp. 11-13, 2013.

Abstract | BibTeX

Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez

A Framework for Enabling Trust Requirements in Social Cloud Applications Journal Article

In: Requirements Engineering, vol. 18, pp. 321-341, 2013, ISSN: 0947-3602.

Abstract | BibTeX | Links:

Isaac Agudo, Ruben Rios, Javier Lopez

A Privacy-Aware Continuous Authentication Scheme for Proximity-Based Access Control Journal Article

In: Computers & Security, vol. 39 (B), pp. 117-126, 2013, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Javier Lopez, Cristina Alcaraz, Rodrigo Roman

Smart Control of Operational Threats in Control Substations Journal Article

In: Computers & Security, vol. 38, pp. 14-27, 2013, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Pablo Najera, Rodrigo Roman, Javier Lopez

User-centric secure integration of personal RFID tags and sensor networks Journal Article

In: Security and Communication Networks, vol. 6, pp. 1177–1197, 2013, ISSN: 1939-0114.

Abstract | BibTeX | Links:

Rodrigo Roman, Jianying Zhou, Javier Lopez

On the features and challenges of security and privacy in distributed internet of things Journal Article

In: Computer Networks, vol. 57, pp. 2266–2279, 2013, ISSN: 1389-1286.

Abstract | BibTeX | Links:

Jose A. Montenegro, Michael J. Fischer, Javier Lopez, Rene Peralta

Secure sealed-bid online auctions using discreet cryptographic proofs Journal Article

In: Mathematical and Computer Modelling, vol. 57, pp. 2583–2595, 2013, ISSN: 0895-7177.

Abstract | BibTeX | Links:

Ruben Rios, Javier Lopez

(Un)Suitability of Anonymous Communication Systems to WSN Journal Article

In: IEEE Systems Journal, vol. 7, no. 2, pp. 298 – 310, 2013, ISSN: 1932-8184.

Abstract | BibTeX | Links:

Ana Nieto, Javier Lopez

Analysis and Taxonomy of Security/QoS tradeoff solutions for the Future Internet Journal Article

In: Security and Communication Networks (SCN) Journal, vol. 7, pp. 2778-2803, 2013, ISSN: 1939-0114.

Abstract | BibTeX | Links:

Cristina Alcaraz, Sherali Zeadally

Critical Control System Protection in the 21st Century: Threats and Solutions Journal Article

In: IEEE Computer, vol. 46, no. 10, pp. 74 – 83, 2013, ISSN: 0018-9162.

Abstract | BibTeX | Links:

Cristina Alcaraz, Rodrigo Roman, Pablo Najera, Javier Lopez

Security of Industrial Sensor Network-based Remote Substations in the context of the Internet of Things Journal Article

In: Ad Hoc Networks, vol. 11, pp. 1091–1104, 2013, ISSN: 1570-8705.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

Wide-Area Situational Awareness for Critical Infrastructure Protection Journal Article

In: IEEE Computer, vol. 46, no. 4, pp. 30-37, 2013, ISSN: 0018-9162.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez, Rodrigo Roman, Hsiao-Hwa Chen

Selecting key management schemes for WSN applications Journal Article

In: Computers & Security, vol. 31, no. 38, pp. 956–966, 2012, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Sherali Zeadally, Al-Sakib Khan Pathan, Cristina Alcaraz, Mohamad Badra

Towards Privacy Protection in Smart Grid Journal Article

In: Wireless Personal Communications, vol. 73, pp. 23-50, 2012, ISSN: 0929-6212.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Olivier Dugeon, Marc Lacoste, Pierre Plaza Tron, Marta Bel

Advanced Secure Multimedia Services for Digital Homes Journal Article

In: Information Systems Frontiers, vol. 14, pp. 527-540, 2012, ISSN: 1387-3326.

Abstract | BibTeX | Links:

David Galindo, Rodrigo Roman, Javier Lopez

On the Energy Cost of Authenticated Key Agreement in Wireless Sensor Networks Journal Article

In: Wireless Communications and Mobile Computing, vol. 12, pp. 133-143, 2012, ISSN: 1530-8669.

Abstract | BibTeX | Links:

Antonio Muñoz

A performance-oriented monitoring system for security properties in cloud computing applications Journal Article

In: The Computer Journal, 2012, ISSN: 1460-2067.

BibTeX | Links:

Cristina Alcaraz, Javier Lopez

Analysis of Requirements for Critical Control Systems Journal Article

In: International Journal of Critical Infrastructure Protection (IJCIP), vol. 5, pp. 137–145, 2012, ISSN: 1874-5482.

Abstract | BibTeX | Links:

Ruben Rios, Javier Lopez

Analysis of Location Privacy Solutions in Wireless Sensor Networks Journal Article

In: IET Communications, vol. 5, pp. 2518 – 2532, 2011, ISSN: 1751-8628.

Abstract | BibTeX | Links:

Cristina Alcaraz, Carmen Fernandez-Gago, Javier Lopez

An Early Warning System based on Reputation for Energy Control Systems Journal Article

In: IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 827-834, 2011, ISSN: 1949-3053.

Abstract | BibTeX | Links:

Ruben Rios, Javier Lopez

Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks Journal Article

In: The Computer Journal, vol. 54, pp. 1603-1615, 2011, ISSN: 0010-4620.

Abstract | BibTeX | Links:

Rodrigo Roman, Pablo Najera, Javier Lopez

Securing the Internet of Things Journal Article

In: IEEE Computer, vol. 44, no. 9, pp. 51 -58, 2011, ISSN: 0018-9162.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez, Jianying Zhou, Rodrigo Roman

Secure SCADA Framework for the Protection of Energy Control Systems Journal Article

In: Concurrency and Computation Practice & Experience, vol. 23, no. 12, pp. 1414-1430, 2011, ISSN: 1532-0626.

Abstract | BibTeX | Links:

Rodrigo Roman, Cristina Alcaraz, Javier Lopez, Nicolas Sklavos

Key management systems for sensor networks in the context of the Internet of Things Journal Article

In: Computers & Electrical Engineering, vol. 37, pp. 147-159, 2011, ISSN: 0045-7906.

Abstract | BibTeX | Links:

Jose L. Vivas, Isaac Agudo, Javier Lopez

A methodology for security assurance-driven system development Journal Article

In: Requirements Engineering, vol. 16, no. 1, pp. 55-73, 2011, ISSN: 0947-3602.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez, Mario Piattini

Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid systems Journal Article

In: IEICE Trans. on Information and Systems, vol. E94-D, pp. 243-254, 2011, ISSN: 0916-8532.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Pablo Najera

A Cross-layer Approach for Integrating Security Mechanisms in Sensor Networks Architectures Journal Article

In: Wireless Communications and Mobile Computing, vol. 11, pp. 267-276, 2011, ISSN: 1530-8669.

Abstract | BibTeX | Links:

Pablo Najera, Javier Lopez

Real-time Location and Inpatient Care Systems Based on Passive RFID Journal Article

In: Journal of Network and Computer Applications, vol. 34, pp. pp. 980-989, 2011, ISSN: 1084-8045.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

Security Services Architecture for Secure Mobile Grid Systems Journal Article

In: Journal of Systems Architecture, vol. 57, pp. 240-258, 2011, ISSN: 1383-7621.

Abstract | BibTeX

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez, Mario Piattini

Systematic Design of Secure Mobile Grid Systems Journal Article

In: Journal of Network and Computer Applications, vol. 34, pp. 1168-1183, 2011, ISSN: 1084-8045.

Abstract | BibTeX

Jose L. Vivas, Carmen Fernandez-Gago, Andres Benjumea, Javier Lopez

A security framework for a workflow-based grid development platform. Journal Article

In: Computer Standards and Interfaces, vol. 32, no. 5-6, pp. 230-245, 2010, ISSN: 0920-5489.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez, Mario Piattini

Developing a Secure Mobile Grid System through a UML Extension Journal Article

In: Journal of Universal Computer Science, vol. 16, no. 17, pp. 2333-2352, 2010, ISSN: 0948-695x.

Abstract | BibTeX | Links:

Isaac Agudo, Carmen Fernandez-Gago, Javier Lopez

A Scale Based Trust Model for Multi-Context Environments Journal Article

In: Computers and Mathematics with Applications, vol. 60, pp. 209-216, 2010, ISSN: 0898-1221.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems Journal Article

In: IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 40, no. 4, pp. 419-428, 2010, ISSN: 1094-6977.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez, Mario Piattini

Analysis of Secure Mobile Grid Systems: A Systematic Approach Journal Article

In: Information and Software Technology, vol. 52, pp. 517-536, 2010, ISSN: 0950-5849.

Abstract | BibTeX | Links:

Javier Lopez, Rodrigo Roman, Pablo Najera

Los Desafíos de Seguridad en la Internet de los Objetos Journal Article

In: Revista SIC, vol. 88, pp. 66-73, 2010, ISSN: 1136-0623.

Abstract | BibTeX | Links:

Ying Qiu, Jianying Zhou, Joonsang Baek, Javier Lopez

Authentication and Key Establishment in Dynamic Wireless Sensor Networks Journal Article

In: Sensors, vol. 10, pp. 3718-3731, 2010, ISSN: 1424-8220.

BibTeX | Links:

Josep L. Ferrer-Gomila, Jose A. Onieva, Magdalena Payeras, Javier Lopez

Certified electronic mail: Properties revisited Journal Article

In: Computers & Security, vol. 29, no. 2, pp. 167 – 179, 2010, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Isaac Agudo

Digital Identity and Identity Management Technologies Journal Article

In: UPGRADE – The European Journal of the Informatics Professional, vol. 2010, pp. 6 – 12, 2010, ISSN: 1684-5285.

Abstract | BibTeX | Links:

Jordi Forne, M. Francisca Hinarejos, Andres Marin, Florina Almenarez, Javier Lopez, Jose A. Montenegro, Marc Lacoste, Daniel Diaz

Pervasive Authentication and Authorization Infrastructures for Mobile Users Journal Article

In: Computer and Security, vol. 29, pp. 501-514, 2010, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Javier Lopez, Rodrigo Roman, Isaac Agudo, Carmen Fernandez-Gago

Trust Management Systems for Wireless Sensor Networks: Best practices Journal Article

In: Computer Communications, vol. 33, no. 9, pp. 0140-3664, 2010, ISSN: 0140-3664.

Abstract | BibTeX | Links:

Isaac Agudo, Carmen Fernandez-Gago, Javier Lopez

Concurrent access control for multi-user and multi-processor systems based on trust relationships Journal Article

In: Concurrency and Computation: Practice and Experience, vol. 21, pp. 1389-1403, 2009, ISSN: 1532-0626.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez

Integrating Wireless Sensor Networks and the Internet: A Security Analysis Journal Article

In: Internet Research, vol. 19, no. 2, pp. 246-259, 2009, ISSN: 1066-2243.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

Obtaining Security Requirements for a Mobile Grid System Journal Article

In: International Journal of Grid and High Performance Computing, vol. 1, pp. 1-17, 2009, ISSN: 1938-0259.

Abstract | BibTeX | Links:

Mildrey Carbonell, Jose Maria Sierra, Javier Lopez

Secure multiparty payment with an intermediary entity Journal Article

In: Computers and Security, vol. 28, no. 5, pp. 289-300, 2009, ISSN: 0167-4048.

BibTeX | Links:

Pablo Najera, Francisco Moyano, Javier Lopez

Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents Journal Article

In: Journal of Universal Computer Science, vol. 15, pp. 970-991, 2009, ISSN: 0948-695X.

Abstract | BibTeX | Links:

Cristina Alcaraz, Gerardo Fernandez, Rodrigo Roman, Angel Balastegui, Javier Lopez

Gestión segura de redes SCADA Journal Article

In: Nuevas tendencias en gestión de redes, Novática, no. 196, pp. 20-25, 2008, ISSN: 0211-2124.

Abstract | BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Javier Lopez

Multi-Party Nonrepudiation: A survey Journal Article

In: ACM Comput. Surveys, vol. 41, no. 1, pp. 5, 2008, ISSN: 0360-0300.

Abstract | BibTeX | Links:

Cristina Alcaraz, Gerardo Fernandez, Rodrigo Roman, Angel Balastegui, Javier Lopez

Secure Management of SCADA Networks Journal Article

In: Novatica, New Trends in Network Management, vol. 9, no. 6, pp. 22-28, 2008, ISSN: 1684-5285.

Abstract | BibTeX | Links:

Isaac Agudo, Javier Lopez, Jose A. Montenegro

Enabling Attribute Delegation in Ubiquitous Environments Journal Article

In: Mobile Networks and Applications, vol. 13, no. 3-4, pp. 398-410, 2008, ISSN: 1383-469X.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Stefanos Gritzalis

Situation Awareness Mechanisms for Wireless Sensor Networks Journal Article

In: IEEE Communications Magazine, vol. 46, no. 4, pp. 102-107, 2008, ISSN: 0163-6804.

Abstract | BibTeX | Links:

Vicente Benjumea, Javier Lopez, Jose M. Troya

Anonymity Analysis in Credentials-based Systems: A Formal Framework Journal Article

In: Computer Standards & Interfaces, vol. 30, no. 4, pp. 253-261, 2008, ISSN: 0920-5489.

Abstract | BibTeX | Links:

Jose A. Onieva, Javier Lopez, Rodrigo Roman, Jianying Zhou, Stefanos Gritzalis

Integration of non-repudiation services in mobile DRM scenarios Journal Article

In: Telecommunications Systems, vol. 35, pp. 161-176, 2007, ISSN: 1572-9451.

Abstract | BibTeX | Links:

Rodrigo Roman, Cristina Alcaraz, Javier Lopez

A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes Journal Article

In: Mobile Networks and Applications, vol. 12, no. 4, pp. 231-244, 2007, ISSN: 1383-469X.

Abstract | BibTeX | Links:

Javier Lopez, Isaac Agudo, Jose A. Montenegro

On the deployment of a real scalable delegation service Journal Article

In: Information Security Technical Report, vol. 12, no. 3, pp. 139-147, 2007, ISSN: 1363-4127.

Abstract | BibTeX | Links:

Jianying Zhou, Wee-Yung Chin, Rodrigo Roman, Javier Lopez

An Effective Multi-layered Defense Framework Against Spam Journal Article

In: Information Security Technical Report, vol. 12, no. 3, pp. 179-185, 2007, ISSN: 1363-4127.

Abstract | BibTeX | Links:

Rodrigo Roman, Cristina Alcaraz, Javier Lopez

The Role of Wireless Sensor Networks in the Area of Critical Information Infrastructure Journal Article

In: Information Security Technical Report, vol. 12, no. 1, pp. 24-31, 2007, ISSN: 1363-4127.

Abstract | BibTeX | Links:

Clare Dixon, Carmen Fernandez-Gago, Michael Fisher, Wiebe Hoek

Temporal Logics of Knowledge and their Applications in Security Journal Article

In: First Workshop in Information and Computer Security (ICS’06), vol. 186, pp. 27-42, 2007, ISSN: 1571-0661.

Abstract | BibTeX | Links:

Vicente Benjumea, Javier Lopez, Jose M. Troya

Anonymous Attribute Certificates based on Traceable Signatures Journal Article

In: Internet Research, vol. 16, no. 2, pp. 120-139, 2006, ISSN: 1066-2243.

Abstract | BibTeX | Links:

Rodrigo Roman, Jianying Zhou, Javier Lopez

An Anti-spam Scheme Using Pre-challenges Journal Article

In: Computer Communications, vol. 29, no. 15, pp. 2739-2749, 2006, ISSN: 0140-3664.

Abstract | BibTeX | Links:

Vicente Benjumea, Javier Lopez, Jose M. Troya

Specification of a Framework for the Anonymous Use of Privileges Journal Article

In: Telematics and Informatics, vol. 23, no. 3, pp. 179-195, 2006, ISSN: 0736-5853.

Abstract | BibTeX | Links:

Javier Lopez

Unleashing Public-Key Cryptography in Wireless Sensor Networks Journal Article

In: Journal of Computer Security, vol. 14, no. 5, pp. 469-482, 2006, ISSN: 0926-227X.

BibTeX

Isaac Agudo, Javier Lopez, Jose A. Montenegro

A Graphical Delegation Solution for X.509 Attribute Certificates Journal Article

In: ERCIM News, no. 63, pp. 33-34, 2005, ISSN: 0926-4981.

BibTeX | Links:

Javier Lopez, Jose A. Montenegro, Jose L. Vivas, Eiji Okamoto, Ed Dawson

Specification and Design of Advanced Authentication and Authorization Services Journal Article

In: Computer Standards & Interfaces, vol. 27, no. 5, pp. 467-478, 2005, ISSN: 0920-5489.

Abstract | BibTeX | Links:

Rodrigo Roman, Jianying Zhou, Javier Lopez

Casual Virtual Private Network Journal Article

In: International Journal of Computer Systems Science & Engineering, vol. 3, pp. 185-192, 2005, ISSN: 0267-6192.

Abstract | BibTeX | Links:

Carmen Fernandez-Gago, Ullrich Hustadt, Clare Dixon, Michael Fisher, Boris Konev

First-Order Temporal Verification in Practice Journal Article

In: Journal of Automated Reasoning, vol. 34, pp. 295-321, 2005, ISSN: 0168-7433.

Abstract | BibTeX | Links:

Alan Winfield, Jin Sa, Carmen Fernandez-Gago, Clare Dixon, Michael Fisher

On the Formal Specification of Emergent Behaviours of Swarm Robotics Systems Journal Article

In: International Journal of Advanced Robotics Systems, vol. 2, pp. 363-371, 2005, ISSN: 1729-8806.

Abstract | BibTeX | Links:

Mariemma I. Yague, Antonio Mana, Javier Lopez

A Metadata-based Access Control Model for Web Services Journal Article

In: Internet Research Journal, vol. 15, no. 1, pp. 99-116, 2005.

BibTeX | Links:

Jianying Zhou, Jose A. Onieva, Javier Lopez

Optimised Multi-Party Certified Email Protocols Journal Article

In: Information Management & Computer Security Journal, vol. 13, no. 5, pp. 350-366, 2005, ISSN: 0968- 5227.

Abstract | BibTeX | Links:

Javier Lopez, Juan J. Ortega, Jose M. Troya

Security Protocols Analysis: A SDL-based Approach Journal Article

In: Computer Standards & Interfaces, vol. 27, no. 3, pp. 489-499, 2005, ISSN: 0920-5489.

Abstract | BibTeX | Links:

Sokratis K. Katsikas, Javier Lopez, Guenther Pernul

Trust, Privacy and Security in Digital Business Journal Article

In: International Journal of Computer Systems, Science & Engineering, vol. 20, no. 6, 2005, ISSN: 0267-6192.

Abstract | BibTeX | Links:

Javier Lopez, Rolf Oppliger, Guenther Pernul

Why Public Key Infrastructures have failed so far? Journal Article

In: Internet Research, vol. 15, no. 5, pp. 544-556, 2005, ISSN: 1066-2243.

Abstract | BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Javier Lopez, Mildrey Carbonell

Agent-mediated non-repudiation protocols Journal Article

In: Electronic Commerce Research and Applications, vol. 3, no. 2, pp. 152-162, 2004, ISSN: 1567-4223.

Abstract | BibTeX | Links:

Javier Lopez, Rolf Oppliger, Guenther Pernul

Authentication and Authorization Infrastructures (AAIs): A Comparative Survey Journal Article

In: Computers & Security, vol. 23, no. 7, pp. 578-590, 2004, ISSN: 0167-4048.

Abstract | BibTeX | Links:

Antonio Mana, Javier Lopez, Juan J. Ortega, Ernesto Pimentel, Jose M. Troya

A Framework for Secure Execution of Software Journal Article

In: International Journal of Information Security (IJIS), vol. 3, no. 2, pp. 99-112, 2004, ISSN: 1615-5262.

Abstract | BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Javier Lopez

Non-repudiation Protocols for Multiple Entities Journal Article

In: Computer Communications, vol. 27, no. 16, pp. 1608-1616, 2004, ISSN: 0140-3664.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Jose A. Montenegro, Juan J. Ortega

PKI Design Based on the Use of On-line Certification Authorities Journal Article

In: International Journal of Information Security (IJIS), vol. 2, no. 2, pp. 91-102, 2004, ISSN: 1615-5262.

Abstract | BibTeX | Links:

Sigrid Gurgens, Javier Lopez, Rene Peralta

Analysis of E-commerce Protocols: Adapting a Traditional Technique Journal Article

In: International Journal of Information Security, vol. 2, no. 1, pp. 21-36, 2003, ISSN: 1615-5262.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Juan J. Ortega, Jose M. Troya, Mariemma I. Yague

Integrating PMI Services in CORBA Applications Journal Article

In: Computer Standards & Interfaces, vol. 25, no. 4, pp. 391-409, 2003, ISSN: 0920-5489.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Ernesto Pimentel, Jose M. Troya, Mariemma I. Yague

A Secure Solution for Commercial Digital Libraries Journal Article

In: Online Information Review Journal, vol. 27, no. 3, pp. 147-159, 2003, ISSN: 1468-4527.

BibTeX | Links:

Selwyn Russell, Ed Dawson, Eiji Okamoto, Javier Lopez

Virtual Certificates and Synthetic Certificates: New Paradigms for Improving Public Key Validation Journal Article

In: Computer Communications, vol. 26, no. 16, pp. 1826-1838, 2003, ISSN: 0140-3664.

Abstract | BibTeX | Links:

Javier Lopez

Proyecto CASENET: Integración del Diseño y Análisis de Protocolos Segurospara el Comerio-e Journal Article

In: Revista SIC: Seguridad en Informática y Comunicaciones, vol. 49, pp. 1-2, 2002, ISSN: 1136-06.

BibTeX

Javier Lopez, Antonio Mana, Pedro Merino, Jose M. Troya

The Role of Smartcards in Practial Information Security Journal Article

In: ERCIM News, vol. 49, pp. 38-40, 2002, ISSN: 0926-4981.

Abstract | BibTeX | Links:

Javier Lopez

Servicios de Notarización Electrónica Journal Article

In: Revista SIC: Seguridad en Informática y Comunicaciones, vol. 38, pp. 1-5, 2001, ISSN: 1136-0623.

BibTeX

Jorge Davila, Javier Lopez

Sistemas Electrónicos de Micropago Journal Article

In: Revista de Contratación Electrónica, vol. 22, pp. 3-22, 2001, ISSN: 1576-2033.

BibTeX

Jorge Davila, Javier Lopez, Felipe Rosello

Diseño de Protocolos de No-Repudio Journal Article

In: Revista SIC: Seguridad en Informática y Comunicaciones, vol. 38, pp. 1-5, 2000, ISSN: 1136-0623.

BibTeX

Javier Areitio, Javier Lopez, Jose M. Troya

Horizontes y Tendencias de Seguridad en Internet Journal Article

In: Novática, vol. 145, pp. 65-71, 2000, ISSN: 0211-2124.

Abstract | BibTeX | Links:

Javier Areitio, Javier Lopez

Contribuciones de la Tecnología de Detección y Respuesta a Intrusiones y Ataques a la Construcción de la Confianza Journal Article

In: Novática, vol. 141, pp. 24-27, 1999.

BibTeX

Gonzalo Ramos, Javier Lopez, Rafael Morales

Comparisons of Parikh’s conditions to other conditions for context-free languages Journal Article

In: Theoretical Computer Science, vol. 202, no. 1-2, pp. 231-244, 1998, ISSN: 0304-3975.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Juan J. Ortega, Lucia Pino

Una Solución Integral para la Autenticación de Usuarios y la Administración de Claves en Internet Journal Article

In: Novática, vol. 134, pp. 20-26, 1998, ISSN: 0211-2124.

Abstract | BibTeX | Links:

Davide Ferraris, Konstantinos Kotis, Christos Kalloniatis

Enhancing TrUStAPIS Methodology in the Web of Things with LLM-generated IoT Trust Semantics Proceedings Article Forthcoming

In: 26th International Conference on Information and Communications Security (ICICS 2024), Springer, Mytilene, Lesvos, Greece, Forthcoming.

BibTeX | Links:

Davide Ferraris, Lorenzo Monti

DrATC: Dynamic routing Algorithm based on Trust Characteristics Proceedings Article Forthcoming

In: The 20th International Workshop on Security and Trust Management (STM 2024), Springer, Bydgoszcz, Poland, Forthcoming.

BibTeX | Links:

Patxi Juaristi, Isaac Agudo, Ruben Rios, Laura Ricci

Benchmarking post-quantum cryptography in Ethereum-based blockchains Proceedings Article Forthcoming

In: 8th International Workshop on Cryptocurrencies and Blockchain Technology (CBT 2024), Springer, Bydgoszcz, Poland, Forthcoming.

Abstract | BibTeX | Links:

Pablo Sánchez-Serrano, Ruben Rios, Isaac Agudo

Privacy-preserving tabular data generation: Systematic Literature Review Proceedings Article Forthcoming

In: 19th DPM International Workshop on Data Privacy Management (DPM 2024), Springer, Bydgoszcz, Poland, Forthcoming.

Abstract | BibTeX | Links:

Alberto Garcia, Cristina Alcaraz, Javier Lopez

MAS para la convergencia de opiniones y detección de anomalías en sistemas ciberfísicos distribuidos Proceedings Article

In: VIII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), Vigo, 2023.

BibTeX | Links:

Daniel Morales, Isaac Agudo

Cryptographic approaches for confidential computations in blockchain Proceedings Article

In: XVI Jornadas de Ingeniería Telemática, pp. 110-113, Barcelona, 2023, ISBN: 978-84-09-58148-1.

Abstract | BibTeX | Links:

Daniel Morales, Isaac Agudo, Javier Lopez

Integration of MPC into Besu through an extended private transaction model Proceedings Article

In: IEEE International Conference on Metaverse Computing, Networking and Applications, pp. 266-273, IEEE Computer Society IEEE, Kyoto, Japan, 2023.

Abstract | BibTeX | Links:

Pablo Pérez Jiménez, Jose A. Onieva, Gerardo Fernandez

CCBHash (Compound Code Block Hash) para Análisis de Malware Proceedings Article

In: XVII Reunión Española sobre Criptología y Seguridad de la Información, pp. 168-173, 2022, ISBN: 978-84-19024-14-5.

Abstract | BibTeX | Links:

Manuel Ruiz, Ruben Rios, Rodrigo Roman, Antonio Muñoz, Juan Manuel Martínez, Jorge Wallace

AndroCIES: Automatización de la certificación de seguridad para aplicaciones Android Proceedings Article

In: XVII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2022), pp. 192-197, Ediciones Universidad Cantabria Ediciones Universidad Cantabria, Santander, Spain, 2022.

Abstract | BibTeX | Links:

Jesus Cumplido, Cristina Alcaraz, Javier Lopez

Collaborative anomaly detection system for charging stations Proceedings Article

In: The 27th European Symposium on Research in Computer Security (ESORICS 2022), pp. 716–736, Springer, Cham Springer, Cham, 2022.

Abstract | BibTeX | Links:

Luca Faramondi, Marta Grassi, Simone Guarino, Roberto Setola, Cristina Alcaraz

Configuration vulnerability in SNORT for Windows operating systems Proceedings Article

In: 2022 IEEE International Conference on Cyber Security and Resilience (IEEE CSR), pp. 82-89, IEEE IEEE, https://www.ieee-csr.org, 2022, ISBN: 978-1-6654-9952-1.

Abstract | BibTeX | Links:

Daniel Morales, Isaac Agudo, Javier Lopez

Real-time Crowd Counting based on Wearable Ephemeral IDs Proceedings Article

In: 19th International Conference on Security and Cryptography (SECRYPT 2022), pp. 249-260, Scitepress Scitepress, Lisbon, 2022, ISSN: 2184-7711.

Abstract | BibTeX | Links:

Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez

Verification and Validation Methods for a Trust-by-Design Framework for the IoT Proceedings Article

In: 36th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec’22), pp. 183-194, Springer Springer, Newark, NJ, USA, 2022, ISBN: 978-3-031-10683-5.

BibTeX | Links:

Cristina Alcaraz, Alberto Garcia, Javier Lopez

Implicaciones de seguridad en MAS Desplegados en Infraestructuras de Carga basadas en OCPP Proceedings Article

In: VII Jornadas Nacionales en Investigación en Ciberseguridad (JNIC 2022), pp. 172-179, 2022, ISBN: 978-84-88734-13-6.

Abstract | BibTeX | Links:

Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez

Novel Approaches for the Development of Trusted IoT Entities Proceedings Article

In: 37th International Conference on ICT Systems Security and Privacy Protection – IFIP SEC 2022, pp. 215-230, Springer Springer, Copenhagen, 2022, ISSN: 1868-4238.

BibTeX | Links:

Manuel Ruiz, Ruben Rios, Rodrigo Roman, Javier Lopez

Privacidad Contextual en entornos Edge Proceedings Article

In: VII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2022), pp. 122-129, Bilbao, Spain, 2022, ISBN: 978-84-88734-13-6.

Abstract | BibTeX | Links:

Martin Kolar, Carmen Fernandez-Gago, Javier Lopez

A Model Specification Implementation for Trust Negotiation Proceedings Article

In: The 14th International Conference on Network and System Security (NSS 2020), pp. 327-341, Springer Springer, Melbourne, Australia, 2020.

Abstract | BibTeX | Links:

Juan E. Rubio, Cristina Alcaraz, Javier Lopez

Game Theory-Based Approach for Defense against APTs Proceedings Article

In: 18th International Conference on Applied Cryptography and Network Security (ACNS’20), pp. 297-320, Springer Springer, 2020, ISBN: 978-3-030-57878-7.

BibTeX | Links:

Juan E. Rubio, Cristina Alcaraz, Ruben Rios, Rodrigo Roman, Javier Lopez

Distributed Detection of APTs: Consensus vs. Clustering Proceedings Article

In: 25th European Symposium on Research in Computer Security (ESORICS 2020), pp. 174-192, 2020, ISBN: 978-3-030-58951-6.

BibTeX | Links:

Antonio Muñoz

ICITPM: Integrity validation of software in iterative Continuous Integration through the use of Trusted Platform Module (TPM) Proceedings Article

In: Aristeidis Farao (Ed.): 1st Workshop on Dependability and Safety Emerging Cloud and Fog Systems (DeSECSyS) – Colocated with ESORICS, Guildford (United Kingdom). September 2020., pp. 147–165, Springer Springer, 2020, ISBN: 978-3-030-66504-3.

Abstract | BibTeX | Links:

Isaac Agudo, Ruben Rios, Ana Nieto

Personalized Computer Security Tasks with Automatic Evaluation and Feedback Proceedings Article

In: International Conference on Information Systems Education and Research (AIS SIGED 2019), 2019, ISBN: 978-1-7343123-0-0.

BibTeX | Links:

Aristeidis Farao, Juan E. Rubio, Cristina Alcaraz, Christoforos Ntantogian, Christos Xenakis, Javier Lopez

SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications Proceedings Article

In: 14th International Conference on Critical Information Infrastructures Security (CRITIS 2019), pp. 169-175, Springer, Cham Springer, Cham, 2019, ISBN: 978-3-030-37669-7.

Abstract | BibTeX | Links:

Isaac Agudo, Manuel Montenegro-Gómez

Desarrollo de un semáforo inteligente basado en comunicaciones seguras Proceedings Article

In: XIV Jornadas de Ingeniería Telemática (JITEL 2019), 2019.

Abstract | BibTeX | Links:

Daniel Morales, Isaac Agudo

Prueba de concepto de Autoridad de Certificación usando Computación Segura Multiparte Proceedings Article

In: XIV Jornadas de Ingeniería Telemática, pp. 50-53, Zaragoza, 2019, ISBN: 978-84-09-21112-8.

Abstract | BibTeX | Links:

Juan E. Rubio, Mark Manulis, Cristina Alcaraz, Javier Lopez

Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics Proceedings Article

In: European Symposium on Research in Computer Security (ESORICS2019), pp. 263-280, 2019.

BibTeX | Links:

Raúl Ocaña, Isaac Agudo

Comunicaciones VoIP cifradas usando Intel SGX Proceedings Article

In: V Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), 2019.

Abstract | BibTeX | Links:

Davide Ferraris, Carmen Fernandez-Gago, Joshua Daniel, Javier Lopez

A Segregated Architecture for a Trust-based Network of Internet of Things Proceedings Article

In: IEEE Consumer Communications & Networking Conference 2019, IEEE IEEE, Las Vegas (USA), 2019.

Abstract | BibTeX | Links:

Davide Ferraris, Daniel Bastos, Carmen Fernandez-Gago, Fadi El-Moussa, Javier Lopez

An Analysis of Trust in Smart Home Devices Proceedings Article

In: The 20th World Conference on Information Security Applications: WISA-Workshop 2019, Springer Springer, Jeju Island, Korea, 2019.

Abstract | BibTeX | Links:

Antonio Acien, Ana Nieto, Gerardo Fernandez, Javier Lopez

Definición de procedimientos para fabricar honeypots IoT basados en criterios de búsqueda Proceedings Article

In: XV Reunión Española sobre Criptología y Seguridad de la Información, Granada (España), 2018, ISBN: 978-84-09-02463-6.

Abstract | BibTeX | Links:

Antonio Acien, Ana Nieto, Gerardo Fernandez, Javier Lopez

A comprehensive methodology for deploying IoT honeypots Proceedings Article

In: 15th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2018), pp. 229–243, Springer Nature Switzerland AG Springer Nature Switzerland AG, Regensburg (Germany), 2018.

Abstract | BibTeX | Links:

Juan E. Rubio, Rodrigo Roman, Javier Lopez

Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Proceedings Article

In: The 12th International Conference on Critical Information Infrastructures Security, pp. 119-130, Springer Springer, 2018.

BibTeX | Links:

Antonio Acien, Ana Nieto, Javier Lopez

Analyzing cross-platform attacks: towards a three-actor approach Proceedings Article

In: The 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2018), pp. 536-543, 2018, ISBN: 978-1-5386-7518-2.

Abstract | BibTeX | Links:

Ana Nieto, Antonio Acien, Javier Lopez

Capture the RAT: Proximity-based Attacks in 5G using the Routine Activity Theory Proceedings Article

In: The 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2018), pp. 520-527, IEEE IEEE, Athens, Greece, 2018, ISBN: 978-1-5386-7518-2.

Abstract | BibTeX | Links:

Juan E. Rubio, Rodrigo Roman, Cristina Alcaraz, Yan Zhang

Tracking Advanced Persistent Threats in Critical Infrastructures through Opinion Dynamics Proceedings Article

In: European Symposium on Research in Computer Security (ESORICS 2018), pp. 555-574, Springer Springer, Barcelona, Spain, 2018.

Abstract | BibTeX | Links:

Ana Nieto

An Overview of Proactive Forensic Solutions and its Applicability to 5G Proceedings Article

In: IEEE 5G World Forum (5GWF), pp. 191-196, IEEE, Santa Clara (USA), 2018, ISBN: 978-1-5386-4982-4.

Abstract | BibTeX | Links:

Martin Kolar, Carmen Fernandez-Gago, Javier Lopez

Policy Languages and Their Suitability for Trust Negotiation Proceedings Article

In: 32nd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy XXXII, 2018, pp. 69-84, Springer, Cham Springer, Cham, Bergamo, Italy, 2018, ISBN: 978-3-319-95728-9.

Abstract | BibTeX | Links:

Antonio Acien, Ana Nieto, Javier Lopez

Modelo para la clasificación y análisis de ataques Cross-Platform Proceedings Article

In: IV Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2018), Servicio Editorial de Mondragon Unibertsitatea Servicio Editorial de Mondragon Unibertsitatea, Donostia-San Sebastián (España), 2018, ISBN: 978-84-09-02697-5.

Abstract | BibTeX | Links:

Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez

A Trust-by-Design Framework for the Internet of Things Proceedings Article

In: 2018 9th IFIP International Conference on New Technologies Mobility and Security (NTMS), IEEE IEEE, Paris, 2018, ISSN: 2157-4960.

Abstract | BibTeX | Links:

Juan E. Rubio, Cristina Alcaraz, Javier Lopez

Addressing Security in OCPP: Protection Against Man-in-the-Middle Attacks Proceedings Article

In: 9th IFIP International Conference on New Technologies, Mobility & Security, 2018.

BibTeX | Links:

Xueou Wang, Xiaolu Hou, Ruben Rios, Per Hallgren, Nils Ole Tippenhauer, Martin Ochoa

Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies Proceedings Article

In: 23rd European Symposium on Research in Computer Security (ESORICS 2018), pp. 373-392, Springer Springer, Barcelona, 2018, ISBN: 978-3-319-98988-4.

Abstract | BibTeX | Links:

Michael Egorov, MacLane Wilkison, David Nuñez

NuCypher KMS: Decentralized key management system Proceedings Article

In: Blockchain Protocol Analysis and Security Engineering 2018, 2018.

BibTeX

Jamal Toutouh, Antonio Muñoz, Sergio Nesmachnow

Evolution Oriented Monitoring Oriented to Security Properties for Cloud Applications Proceedings Article

In: Proceedings of the 13th International Conference on Availability, Reliability and Security, Association for Computing Machinery, Hamburg, Germany, 2018, ISBN: 9781450364485.

Abstract | BibTeX | Links:

Juan E. Rubio, Cristina Alcaraz, Javier Lopez

Preventing Advanced Persistent Threats in Complex Control Networks Proceedings Article

In: European Symposium on Research in Computer Security, pp. 402-418, 22nd European Symposium on Research in Computer Security (ESORICS 2017) 22nd European Symposium on Research in Computer Security (ESORICS 2017), 2017.

BibTeX | Links:

Ana Nieto, Ruben Rios, Javier Lopez

Digital Witness and Privacy in IoT: Anonymous Witnessing Approach Proceedings Article

In: 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2017), pp. 642-649, IEEE IEEE, Sydney (Australia), 2017, ISSN: 2324-9013.

Abstract | BibTeX | Links:

Ana Nieto, Ruben Rios, Javier Lopez

A Methodology for Privacy-Aware IoT-Forensics Proceedings Article

In: 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2017), pp. 626-633, IEEE IEEE, Sydney (Australia), 2017, ISSN: 2324-9013.

Abstract | BibTeX | Links:

Gerardo Fernandez, Ana Nieto, Javier Lopez

Modeling Malware-driven Honeypots Proceedings Article

In: 14th International Conference On Trust, Privacy & Security In Digital Business (TrustBus 2017), pp. 130-144, Springer International Publishing Springer International Publishing, Lyon (France), 2017, ISBN: 978-3-319-64482-0.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

The fallout of key compromise in a proxy-mediated key agreement protocol Proceedings Article

In: 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec’17), pp. 453-472, Springer Springer, Philadelphia, USA, 2017, ISBN: 978-3-319-61176-1.

Abstract | BibTeX | Links:

Gerardo Fernandez, Ana Nieto

Configuración de honeypots adaptativos para análisis de malware Proceedings Article

In: III Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2017), pp. 91-98, Servicio de Publicaciones de la URJC Servicio de Publicaciones de la URJC, Madrid (Spain), 2017, ISBN: 978-84-608-4659-8.

Abstract | BibTeX | Links:

Ruben Rios, Rodrigo Roman, Jose A. Onieva, Javier Lopez

From Smog to Fog: A Security Perspective Proceedings Article

In: 2nd IEEE International Conference on Fog and Edge Mobile Computing (FMEC 2017), pp. 56-61, IEEE Computer Society IEEE Computer Society, Valencia, Spain. 8-11 May 2017, 2017, ISBN: 978-1-5386-2859-1.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Michael Egorov, MacLane Wilkison

Sistema de Acceso Delegado a Información Cifrada para Apache Hadoop Proceedings Article

In: III Jornadas Nacionales de Investigación en Ciberseguridad, pp. 174-175, URJC URJC, Madrid, 2017, ISBN: 978-84-608-4659-8.

Abstract | BibTeX | Links:

Ruben Rios, David Nuñez, Javier Lopez

Query Privacy in Sensing-as-a-Service Platforms Proceedings Article

In: Sabrina De Capitani Vimercati, Fabio Martinelli (Ed.): 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017), pp. 141–154, Springer Springer, Roma, Italy, 2017.

Abstract | BibTeX | Links:

Juan E. Rubio, Cristina Alcaraz, Rodrigo Roman, Javier Lopez

Analysis of Intrusion Detection Systems in Industrial Ecosystems Proceedings Article

In: 14th International Conference on Security and Cryptography (SECRYPT 2017), pp. 116-128, SciTePress SciTePress, 2017, ISBN: 978-989-758-259-2.

BibTeX | Links:

Cristina Alcaraz, Jesús Rodriguez, Rodrigo Roman, Juan E. Rubio

Estado y Evolución de la Detección de Intrusiones en los Sistemas Industriales Proceedings Article

In: III Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2017), 2017.

Abstract | BibTeX | Links:

Ana Nieto, Ruben Rios, Javier Lopez

PRoFIT: modelo forense-IoT con integración de requisitos de privacidad Proceedings Article

In: XIII Jornadas de Ingeniería Telemática (JITEL 2017), pp. 302-309, Editorial Universitat Politècnica de València Editorial Universitat Politècnica de València, Valencia, 2017, ISBN: 978-84-9048-595-8.

BibTeX | Links:

Ana Nieto, Ruben Rios

Requisitos y soluciones de privacidad para la testificación digital Proceedings Article

In: III Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2017), pp. 51-58, Servicio de Publicaciones de la URJC Servicio de Publicaciones de la URJC, Madrid (Spain), 2017, ISBN: 978-84-608-4659-8.

BibTeX | Links:

Juan E. Rubio, Cristina Alcaraz, Javier Lopez

Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems Proceedings Article

In: The 11th International Conference on Critical Information Infrastructures Security, pp. 176-188, 2017.

Abstract | BibTeX | Links:

Ana Nieto, Rodrigo Roman, Javier Lopez

Arquitectura funcional para la cadena de custodia digital en objetos de la IoT Proceedings Article

In: XIV Reunión Española sobre Criptología y Seguridad de la Información, pp. 168-173, 2016, ISBN: 978-84-608-9470-4.

Abstract | BibTeX | Links:

Ruben Rios, Javier Lopez

Evolución y nuevos desafios de privacidad en la Internet de las Cosas Proceedings Article

In: XIV Reunión Española sobre Criptología y Seguridad de la Información, pp. 209-213, Mahón, Menorca, Islas Baleares, 2016.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

Nuevas nociones de seguridad y transformaciones genéricas para criptosistemas de recifrado delegado Proceedings Article

In: XIV Reunión Española sobre Criptología y Seguridad de la Información, pp. 174-179, Mahón, Menorca, Islas Baleares, 2016, ISBN: 978-84-608-9470-4.

Abstract | BibTeX | Links:

Ruben Rios, Carmen Fernandez-Gago, Javier Lopez

Privacy-Aware Trust Negotiation Proceedings Article

In: 12th International Workshop on Security and Trust Management (STM), pp. 98-105, Springer Springer, Heraklion, Crete, Greece, 2016, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Carmen Fernandez-Gago, Siani Pearson, Michela D’Errico, Rehab Alnemr, Tobias Pulls, Anderson Santana Oliveira

A4Cloud Workshop: Accountability in the Cloud Proceedings Article

In: IFIP Sumer School 2015 on Privacy and Identity Management. Time for a Revolution?, pp. 61-78, AICT Series, Springer AICT Series, Springer, Edinburgh (United Kingdon), 2016.

BibTeX

Ana Nieto, Rodrigo Roman, Javier Lopez

Testigo digital: delegación vinculante de evidencias electrónicas para escenarios IoT Proceedings Article

In: II Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2016), pp. 109-116, 2016, ISBN: 978-84-608-8070-7.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

Safeguarding Structural Controllability in Cyber-Physical Control Systems Proceedings Article

In: The 21st European Symposium on Research in Computer Security (ESORICS 2016), pp. 471-489, Springer Springer, Crete, Greece, 2016, ISBN: 978-3-319-45741-3.

Abstract | BibTeX | Links:

Isaac Agudo, Ali El Kaafarani, David Nuñez, Siani Pearson

A Technique for Enhanced Provision of Appropriate Access to Evidence across Service Provision Chains Proceedings Article

In: 10th International IFIP Summer School on Privacy and Identity Management, pp. 187-204, 2016, ISBN: 978-3-319-41762-2.

Abstract | BibTeX | Links:

Carlos Pares-Pulido, Isaac Agudo

LockPic: Privacy Preserving Photo Sharing in Social Networks Proceedings Article

In: Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio Martinelli, Neeraj Suri (Ed.): Data Privacy Management, and Security Assurance, pp. 281–290, Springer International Publishing, Cham, 2016, ISBN: 978-3-319-29883-2.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez, Kim-Kwang Raymond Choo

Dynamic Restoration in Interconnected RBAC-based Cyber-Physical Control Systems Proceedings Article

In: Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (SECRYPT 2016), pp. 19-27, Lisboa, 2016, ISBN: 978-989-758-196-0.

Abstract | BibTeX | Links:

Cristina Alcaraz, Estefania Etcheves Miciolino, Stephen Wolthusen

Multi-Round Attacks on Structural Controllability Properties for Non-Complete Random Graphs Proceedings Article

In: The 16th Information Security Conference (ISC), pp. 140–151, Springer Springer, Springer International Publishing Switzerland, 2015.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Kristian Beckers, Maritta Heisel

Engineering Trust- and Reputation-based Security Controls for Future Internet Systems Proceedings Article

In: The 30th ACM/SIGAPP Symposium On Applied Computing (SAC 2015), pp. 1344-1349, Salamanca, Spain, 2015, ISBN: 978-1-4503-3196-8.

BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

A Parametric Family of Attack Models for Proxy Re-Encryption Proceedings Article

In: 28th IEEE Computer Security Foundations Symposium, pp. 290-301, IEEE Computer Society IEEE Computer Society, Verona, Italy, 2015, ISSN: 1063-6900.

Abstract | BibTeX | Links:

Cristina Alcaraz, Lorena Cazorla, Gerardo Fernandez

Context-Awareness using Anomaly-based Detectors for Smart Grid Domains Proceedings Article

In: 9th International Conference on Risks and Security of Internet and Systems, pp. 17-34, Springer International Publishing Springer International Publishing, Trento, 2015, ISBN: 978-3-319-17126-5.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU Proceedings Article

In: 10th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), pp. 179-189, 2015, ISBN: 978-1-4503-3245-3.

Abstract | BibTeX | Links:

Carmen Fernandez-Gago, Vasilis Tountopoulos, Simone Fischer-Hübner, Rehab Alnemr, David Nuñez, Julio Angulo, Tobias Pulls, Theo Koulouris

Tools for Cloud Accountability: A4Cloud Tutorial Proceedings Article

In: 9th IFIP Summer School on Privacy and Identity Management for the Future Internet in the Age of Globalisation, pp. 219-236, Springer IFIP AICT Springer IFIP AICT, Patras (Greece), 2015, ISSN: 978-3-319-18621-4.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

Delegated Access for Hadoop Clusters in the Cloud Proceedings Article

In: IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2014), pp. 374-379, IEEE IEEE, Singapore, 2014, ISBN: 978-1-4799-4093-6.

Abstract | BibTeX | Links:

Jose A. Onieva, Ruben Rios, Bernardo Palenciano

Análisis y Desarrollo de un Canal Encubierto en una Red de Sensores Proceedings Article

In: XIII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2014), pp. 333-338, Universidad de Alicante Universidad de Alicante, Alicante, Spain, 2014, ISBN: 978-84-9717-323-0.

Abstract | BibTeX | Links:

Ana Nieto, Javier Lopez

Herramienta para la Compensación de Parámetros de QoS y Seguridad Proceedings Article

In: XIII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2014), pp. 303-308, Alicante (España)., 2014, ISBN: 978-84-9717-323-0.

Abstract | BibTeX | Links:

Ana Nieto, Javier Lopez

Security and QoS Tradeoff Recommendation System (SQT-RS) for Dynamic Assessing CPRM-based Systems Proceedings Article

In: 10th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet’14), pp. 25-32, ACM ACM, Montréal (Canada), 2014, ISBN: 978-1-4503-3027-5.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Kristian Beckers, Maritta Heisel

Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements Proceedings Article

In: Jorge Cuellar (Ed.): Smart Grid Security – Second International Workshop, pp. 166-180, Springer Springer, Munich, 2014, ISSN: 0302-9743.

BibTeX | Links:

Ana Nieto, Javier Lopez

A Context-based Parametric Relationship Model (CPRM) to Measure the Security and QoS tradeoff in Configurable Environments Proceedings Article

In: IEEE International Conference on Communications (ICC’14), pp. 755-760, IEEE Communications Society IEEE Communications Society, Sydney (Australia), 2014, ISBN: 978-1-4799-2003-7.

Abstract | BibTeX | Links:

Francisco Moyano, Kristian Beckers, Carmen Fernandez-Gago

Trust-Aware Decision-Making Methodology for Cloud Sourcing Proceedings Article

In: Matthias Jarke, John Mylopoulos, Christoph Quix, Colette Rolland, Yannis Manolopoulos, Haralambos Mouratidis, Jennifer Horkoff (Ed.): 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014), pp. 136-149, Springer Springer, Thessaloniki, 2014, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Javier Lopez, Ruben Rios, Jorge Cuellar

Preserving Receiver-Location Privacy in Wireless Sensor Networks Proceedings Article

In: Information Security Practice and Experience (ISPEC 2014), pp. 15-27, Springer Springer, Fuzhou, China, 2014, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Ana Nieto

Evaluation of Dynamic Instantiation in CPRM-based Systems Proceedings Article

In: 9th International Conference on Risk and Security of Internet and Systems (CRiSIS’14), pp. 52-66, Springer Springer, Trento (Italy), 2014, ISBN: 978-3-319-17127-2.

Abstract | BibTeX | Links:

Jorge L. Hernández-Ardieta, David Santos, Pascual Parra, Juan E. Tapiador, Pedro Peris-López, Javier Lopez, Gerardo Fernandez

An Intelligent and Adaptive Live Simulator: A new Concept for Cybersecurity Training Proceedings Article

In: 9th Future Security Conference, Berlin, 2014.

Abstract | BibTeX | Links:

Cristina Alcaraz, Stephen Wolthusen

Recovery of Structural Controllability for Control Systems Proceedings Article

In: Eighth IFIP WG 11.10 International Conference on Critical Infrastructure Protection, SRI International, Arlington, Virginia, USA, pp. 47-63, Springer Springer, Arlington, Virginia, USA, 2014, ISSN: 1868-4238.

Abstract | BibTeX | Links:

David Nuñez, Carmen Fernandez-Gago, Siani Pearson, Massimo Felici

A Metamodel for Measuring Accountability Attributes in the Cloud Proceedings Article

In: 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013), pp. 355-362, IEEE IEEE, Bristol, UK, 2013, ISBN: 978-0-7685-5095-4.

Abstract | BibTeX | Links:

Federica Paci, Carmen Fernandez-Gago, Francisco Moyano

Detecting Insider Threats: a Trust-Aware Framework Proceedings Article

In: 8th International Conference on Availability, Reliability and Security, pp. 121-130, IEEE IEEE, Regensburg, Germany, 2013, ISBN: 978-0-7695-5008-4.

Abstract | BibTeX | Links:

Ruben Rios, Jorge Cuellar, Javier Lopez

Ocultación de la estación base en redes inalámbricas de sensores Proceedings Article

In: Jesús E. Díaz Verdejo, Jorge Navarro Ortiz, Juan J. Ramos Muñoz (Ed.): XI Jornadas de Ingeniería Telemática (JITEL 2013), pp. 481-486, Asociación de Telemática Asociación de Telemática, Granada, 2013, ISBN: 978-84-616-5597-7.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

Leveraging Privacy in Identity Management as a Service through Proxy Re-Encryption Proceedings Article

In: Ph.D Symposium of the European Conference on Service-Oriented and Cloud Computing (ESOCC) 2013, Málaga, Spain, 2013.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez

Towards Engineering Trust-aware Future Internet Systems Proceedings Article

In: Xavier Franch, Pnina Soffer (Ed.): 3rd International Workshop on Information Systems Security Engineering (WISSE 2013), pp. 490-501, Springer-Verlag Springer-Verlag, Valencia, 2013, ISSN: 1865-1348.

Abstract | BibTeX | Links:

Francisco Moyano, Benoit Baudry, Javier Lopez

Towards Trust-Aware and Self-Adaptive Systems Proceedings Article

In: Carmen Fernandez-Gago, Isaac Agudo, Fabio Martinelli, Siani Pearson (Ed.): 7th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2013), pp. 255-262, Springer Springer, Malaga, 2013, ISSN: 1868-4238.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez

Building Trust and Reputation In: A Development Framework for Trust Models Implementation Proceedings Article

In: Audung Jøsang, Pierangela Samarati, Marinella Petrocchi (Ed.): 8th International Workshop on Security and Trust Management (STM 2012), pp. 113-128, Springer Springer, Pisa, 2013, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Cristina Alcaraz, Meltem Sonmez

PDR: A Prevention, Detection and Response Mechanism for Anomalies in Energy Control Systems Proceedings Article

In: 7th International Conference on Critical Information Infrastructures Security (CRITIS 2012), pp. 22–33, Lillehammer, Norway, 2013.

Abstract | BibTeX | Links:

Cristina Alcaraz, Estefania Etcheves Miciolino, Stephen Wolthusen

Structural Controllability of Networks for Non-Interactive Adversarial Vertex Removal Proceedings Article

In: 8th International Conference on Critical Information Infrastructures Security, pp. 120-132, Springer Springer, Amsterdam, The Netherlands, 2013, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Lorena Cazorla, Cristina Alcaraz, Javier Lopez

Towards Automatic Critical Infrastructure Protection through Machine Learning Proceedings Article

In: 8th International Conference on Critical Information Infrastructures Security, pp. 197-203, Springer Springer, Amsterdam, The Netherlands, 2013, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez

A Trust and Reputation Framework Proceedings Article

In: Maritta Heisel, Eda Marchetti (Ed.): Doctoral Symposium of the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013), pp. 7-12, CEUR-WS CEUR-WS, París, 2013, ISSN: 1613-0073.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Javier Lopez

Integrating OpenID with Proxy Re-Encryption to enhance privacy in cloud-based identity services Proceedings Article

In: IEEE CloudCom 2012, pp. 241 – 248, IEEE Computer Society IEEE Computer Society, Taipei, Taiwan, 2012, ISSN: 978-1-4673-4509-5.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

Addressing Situational Awareness in Critical Domains of a Smart Grid Proceedings Article

In: 6th International Conference on Network and System Security (NSS 2012), pp. 58-71, Springer-Verlag Springer-Verlag, Wu Yi Shan, Fujian, China, 2012, ISSN: 978-3-642-34600-2.

Abstract | BibTeX | Links:

Ruben Rios, Javier Lopez

Adecuación de soluciones de anonimato al problema de la privacidad de localización en WSN Proceedings Article

In: Urko Zurutuza, Roberto Uribeetxeberria, Ignacio Arenaza-Nuño (Ed.): XII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2012), pp. 309-314, Donostia-San Sebastián, 2012, ISBN: 978-84-615-9933-2.

Abstract | BibTeX | Links:

Jose A. Onieva, Isaac Agudo, Javier Lopez, Gerard Draper-Gil, M. Francisca Hinarejos

Como proteger la privacidad de los usuarios en Internet. Verificación anónima de la mayoría de edad Proceedings Article

In: XII Reunión Española sobre Criptología y Seguridad de la Información – RECSI 2012, pp. 297-302, Mondragon Mondragon, San Sebastian (Spain), 2012, ISBN: 978-84-615-9933-2.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez

A Conceptual Framework for Trust Models Proceedings Article

In: Simone Fischer-Hübner, Sokratis K. Katsikas, Gerald Quirchmayr (Ed.): 9th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2012), pp. 93-104, Springer Verlag Springer Verlag, Vienna, 2012, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Ruben Rios, Jorge Cuellar, Javier Lopez

Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN Proceedings Article

In: Sara Foresti, Moti Yung, Fabio Martinelli (Ed.): 17th European Symposium on Research in Computer Security (ESORICS 2012), pp. 163-180, Springer Springer, Pisa, Italy, 2012, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Ana Nieto, Gerardo Fernandez

Sistema Colaborativo de Detección y Reacción ante Intrusiones basado en Intel vPro Proceedings Article

In: XII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2012), pp. 45-50, San Sebastián, 2012, ISBN: 978-84-615-9933-2.

Abstract | BibTeX | Links:

Gerard Draper-Gil, Josep L. Ferrer-Gomila, M. Francisca Hinarejos, Jose A. Onieva, Javier Lopez

Un protocolo para la firma de contratos en escenarios multi-two-party con atomicidad Proceedings Article

In: XII Reunión Española de Criptología y Seguridad de la Información, pp. 357-362, 2012, ISBN: 978-84-615-9933-2.

Abstract | BibTeX | Links:

Farhan Siddiqui, Sherali Zeadally, Cristina Alcaraz, Samara Galvao

Smart Grid Privacy: Issues and Solutions Proceedings Article

In: 21st International Conference on Computer Communications and Networks (ICCCN), pp. 1-5, IEEE Computer Society IEEE Computer Society, Munich, Germany, 2012, ISBN: 978-1-4673-1543-2.

Abstract | BibTeX | Links:

Ruben Rios, Jose A. Onieva, Javier Lopez

HIDE_DHCP: Covert Communications Through Network Configuration Messages Proceedings Article

In: Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (Ed.): Proceedings of the 27th IFIP TC 11 International Information Security and Privacy Conference (SEC 2012), pp. 162-173, Springer Boston Springer Boston, Heraklion, Crete, Greece, 2012, ISSN: 1868-4238.

Abstract | BibTeX | Links:

Jorge Cuellar, Martin Ochoa, Ruben Rios

Indistinguishable Regions in Geographic Privacy Proceedings Article

In: Sascha Ossowski, Paola Lecca (Ed.): Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC 2012), pp. 1463-1469, ACM ACM, Riva del Garda (Trento), Italy, 2012, ISBN: 978-1-4503-0857-1.

Abstract | BibTeX | Links:

Ana Nieto, Javier Lopez

Security and QoS tradeoffs: towards a FI perspective Proceedings Article

In: Advanced Information Networking and Applications Workshops (WAINA), 2012 26th International Conference on, pp. 745-750, IEEE IEEE, Fukuoka (Japan), 2012, ISBN: 978-0-7695-4652-0/12.

Abstract | BibTeX | Links:

Ana Nieto, Javier Lopez

Traffic Classifier for Heterogeneous and Cooperative Routing through Wireless Sensor Networks Proceedings Article

In: Advanced Information Networking and Applications Workshops (WAINA), 2012 26th International Conference on, pp. 607-612, IEEE IEEE, Fukuoka (Japan), 2012, ISBN: 978-0-7695-4652-0/12.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Isaac Agudo, Javier Lopez

A Task Ordering Approach for Automatic Trust Establishment Proceedings Article

In: Gilles Barthe, Ben Livshits, Riccardo Scandariato (Ed.): Proceedings of the 2012 International Symposium on Engineering Secure Software and Systems (ESSoS 2012), pp. 76–89, Springer Springer, Eindhoven, The Netherlands, 2012.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez

Implementing Trust and Reputation Systems: A Framework for Developers’ Usage Proceedings Article

In: International Workshop on Quantitative Aspects in Security Assurance, Pisa, 2012.

Abstract | BibTeX | Links:

Pablo Najera, Rodrigo Roman, Javier Lopez

Secure architecure for the integration of RFID and sensors in personal networks Proceedings Article

In: 7th International Workshop on Security and Trust Management (STM’11), pp. 207-222, Springer Springer, Copenhagen, Denmark, 2012, ISBN: 978-3-642-29962-9.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez

Service-Oriented Trust and Reputation Architecture Proceedings Article

In: Jorge Cuellar, Nora Koch (Ed.): Proceedings of the Doctoral Symposium of the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2012), pp. 41-46, CEUR-WS CEUR-WS, Eindhoven, 2012, ISSN: 1613-0073, (Partner:UMA, Project:NESSoS).

Abstract | BibTeX | Links:

James Clarke, Rodrigo Roman, Abhishek Sharma, Javier Lopez, Neeraj Suri

Trust & Security RTD in the Internet of Things: Opportunities for International Cooperation Proceedings Article

In: Proceedings of the First International Conference on Security of Internet of Things, pp. 172–178, ACM ACM, New York, NY, USA, 2012, ISBN: 978-1-4503-1822-8.

Abstract | BibTeX | Links:

Ana Nieto, Javier Lopez

Security and QoS relationships in Mobile Platforms Proceedings Article

In: The 4th FTRA International Conference on Computer Science and its Applications (CSA 2012), pp. 13-21, Springer Netherlands Springer Netherlands, Jeju (Korea), 2012, ISBN: 978-94-007-5699-1.

Abstract | BibTeX | Links:

Neumann Libor, Tomas Halman, Rotek Pavel, Alexander Boettcher, Julian Stecklina, Michal Sojka, David Nuñez, Isaac Agudo

Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber Identity Proceedings Article

In: Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider (Ed.): Information Security Solutions Europe 2012, pp. 195-206, Springer Vieweg Springer Vieweg, Brussels, Belgium, 2012, ISBN: 978-3-658-00332-6.

Abstract | BibTeX | Links:

Pablo Najera, Rodrigo Roman, Javier Lopez

Acceso seguro a nodos RFID en una arquitectura de red personal Proceedings Article

In: Klaus Hackbarth, Ramón Agüero, Roberto Sanz (Ed.): X Jornadas de Ingeniería Telemática (JITEL 2011), pp. 104 – 111, Universidad de Cantabria Universidad de Cantabria, Santander, Spain, 2011, ISBN: 978-84-694-5948-5.

Abstract | BibTeX

Naci Dai, Jesus Bermejo, Felix Cuadrado Latasa, Alejandra Ruiz López, Isaac Agudo, Elmar Zeeb, Jan Krueger, Oliver Dohndorf, Wolfgang Thronicke, Christoph Fiehe, Anna Litvina

OSAMI Commons: An open dynamic services platform for ambient intelligence Proceedings Article

In: IEEE 16th Conference on Emerging Technologies Factory Automation (ETFA 2011), pp. 1-10, IEEE IEEE, Toulouse, France, 2011, ISSN: 1946-0740.

Abstract | BibTeX | Links:

Isaac Agudo, David Nuñez, Gabriele Giammatteo, Panagiotis Rizomiliotis, Costas Lambrinoudakis

Cryptography Goes to the Cloud Proceedings Article

In: Changhoon Lee, Jean-Marc Seigneur, James J. Park, Roland R. Wagner (Ed.): 1st International Workshop on Security and Trust for Applications in Virtualised Environments (STAVE 2011), pp. 190-197, Springer Springer, 2011, ISBN: 978-3-642-22364-8.

Abstract | BibTeX | Links:

David Nuñez, Isaac Agudo, Prokopios Drogkaris, Stefanos Gritzalis

Identity Management Challenges for Intercloud Applications Proceedings Article

In: 1st International Workshop on Security and Trust for Applications in Virtualised Environments (STAVE 2011), pp. 198-204, Crete (Greece), 2011.

Abstract | BibTeX | Links:

Olga Leon, Rodrigo Roman, Juan Hernandez Serrano

Towards a Cooperative Intrusion Detection System for Cognitive Radio Networks Proceedings Article

In: Workshop on Wireless Cooperative Network Security (WCNS’11), Springer Springer, 2011.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Cristina Alcaraz, Hsiao-Hwa Chen

SenseKey – Simplifying the Selection of Key Management Schemes for Sensor Networks Proceedings Article

In: 5th International Symposium on Security and Multimodality in Pervasive Environments (SMPE’11), IEEE IEEE, Singapore, 2011.

Abstract | BibTeX | Links:

Wouter Joosen, Javier Lopez, Fabio Martinelli, Fabio Massacci

Engineering Secure Future Internet Services Proceedings Article

In: Future Internet Assembly 2011: Achievements and Technological Promises (FIA 2011), pp. 177-191, Springer Berlin Heidelberg Springer Berlin Heidelberg, Budapest, 2011, ISSN: 0302-9743.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Mario Piattini, Javier Lopez

Analysis of Secure Mobile Grid Systems: A systematic approach Proceedings Article

In: XVI Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2011), pp. 487-491, Servizo de publicacións da Universidade da Coruña Servizo de publicacións da Universidade da Coruña, A Coruña, Spain, 2011, ISBN: 978-84-9749-486-1.

Abstract | BibTeX | Links:

Cristina Alcaraz, Isaac Agudo, David Nuñez, Javier Lopez

Managing Incidents in Smart Grids à la Cloud Proceedings Article

In: IEEE CloudCom 2011, pp. 527-531, IEEE Computer Society IEEE Computer Society, Athens, Greece, 2011, ISBN: 978-0-7695-4622-3.

Abstract | BibTeX | Links:

Cristina Alcaraz, Pablo Najera, Javier Lopez, Rodrigo Roman

Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration? Proceedings Article

In: 1st International Workshop on the Security of the Internet of Things (SecIoT’10), pp. xxxx, IEEE IEEE, Tokyo (Japan), 2010.

Abstract | BibTeX | Links:

Cristina Alcaraz, Rodrigo Roman, Pablo Najera, Javier Lopez

Acceso seguro a redes de sensores en SCADA a través de Internet Proceedings Article

In: XI Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2010), pp. 337-342, Tarragona (Spain), 2010, ISBN: 978-84-693-3304-4.

Abstract | BibTeX | Links:

Isaac Agudo, Jose A. Onieva, Daniel Merida

Distribución segura de componentes software basada en OpenID Proceedings Article

In: XI Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2010), Tarragona, Spain, 2010, ISBN: 978-84-693-3304-4.

Abstract | BibTeX | Links:

Cristina Alcaraz, Angel Balastegui, Javier Lopez

Early Warning System for Cascading Effect Control in Energy Control Systems Proceedings Article

In: 5th International conference on Critical Information Infrastructures Security (CRITIS’10), pp. 55-67, Springer Springer, Athens, Greece, 2010, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Ruben Rios, Isaac Agudo, Jose L. Gonzalez

Implementación de un esquema de localización privada y segura para interiores Proceedings Article

In: Yannis Dimitriadis, María Jesús Verdú Pérez (Ed.): IX Jornadas de Ingeniería Telemática (JITEL’10), pp. 237 – 244, Valladolid (Spain), 2010, ISBN: 978-84-693-5398-1.

Abstract | BibTeX | Links:

Ruben Rios, Javier Lopez

Source Location Privacy Considerations in Wireless Sensor Networks Proceedings Article

In: Lidia Fuentes, Nadia Gámez, José Bravo (Ed.): 4th International Symposium of Ubiquitous Computing and Ambient Intelligence (UCAmI’10), pp. 29 – 38, IBERGARCETA PUBLICACIONES, S.L. IBERGARCETA PUBLICACIONES, S.L., Valencia (Spain), 2010, ISBN: 978-84-92812-61-5.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

A Study of Security Approaches for the Development of Mobile Grid Systems Proceedings Article

In: 5th International Conference on Software and Data Technologies (ICSOFT’10), pp. 133-138, Springer Springer, Athens, Greece, 2010, ISBN: 978-989-8425-22-5.

Abstract | BibTeX

Jose A. Montenegro, Javier Lopez, Rene Peralta

Computacion Segura Multiparte Aplicada a Subastas Electrónicas Proceedings Article

In: IX Jornadas de Ingeniería Telemenatica (JITEL 2010), 2010.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Cristina Alcaraz

Do Wireless Sensor Networks Need to be Completely Integrated into the Internet? Proceedings Article

In: 3rd CompanionAble Workshop – Future Internet of People, Things and Services (IoPTS) eco-Systems, pp. xxxx, xxxx xxxx, Brussels (Belgium), 2009.

Abstract | BibTeX | Links:

Cristina Alcaraz, Isaac Agudo, Carmen Fernandez-Gago, Rodrigo Roman, Gerardo Fernandez, Javier Lopez

Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems Proceedings Article

In: 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’09), pp. 86-94, Springer-Verlag Springer-Verlag, Linz, Austria, 2009, ISBN: 978-3-642-03747-4.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros Proceedings Article

In: XIV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2009), pp. 331-342, Antonio Vallecillo and Goiuria Sagardui (Eds.) Antonio Vallecillo and Goiuria Sagardui (Eds.), San Sebastián, España, 2009, ISBN: 978-84-692-4211-7.

Abstract | BibTeX | Links:

Javier Lopez, Rodrigo Roman, Cristina Alcaraz

Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks Proceedings Article

In: Foundations of Security Analysis and Design 2009, pp. 289-338, Springer Berlin/Heidelberg Springer Berlin/Heidelberg, Bertinoro (Italy), 2009, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

Rafael J. Caro, David Garrido, Pierre Plaza, Rodrigo Roman, Nuria Sanz, Jose L. Serrano

SMEPP: A Secure Middleware for Embedded P2P Proceedings Article

In: ICT Mobile and Wireless Communications Summit (ICT-MobileSummit’09), Santander (Spain), 2009, ISBN: 978-1-905824-12-0.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

Applying a UML Extension to build Use Cases diagrams in a secure mobile Grid application Proceedings Article

In: 5th International Workshop on Foundations and Practices of UML, pp. 126-136, Springer Berlin Heidelberg Springer Berlin Heidelberg, Gramado, Brasil, 2009, ISBN: 978-3-642-04946-0.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

Hacia una Arquitectura de Servicios de Seguridad para entornos Grid móviles Proceedings Article

In: V Congreso Iberoamericano de Seguridad Informática (CIBSI’09), pp. 409-423, Universidad de la República, Uruguay Universidad de la República, Uruguay, Montevideo, Uruguay, 2009, ISBN: 978-9974-0-0593-8.

Abstract | BibTeX | Links:

Isaac Agudo, Carmen Fernandez-Gago, Javier Lopez

A Multidimensional Reputation Scheme for Identity Federations Proceedings Article

In: Sixth European Workshop on Public Key Services, Applications and Infrastructures (EuroPKI’09), pp. 225-238, Springer Springer, 2009, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

Reusable Security Use Cases for Mobile Grid environments Proceedings Article

In: Workshop on Software Engineering for Secure Systems, pp. 1-8, IEEE IEEE, Vancouver, Canada, 2009, ISBN: 978-1-4244-3725-2.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros Proceedings Article

In: XII Conferencia Iberoamericana de Ingeniería de Requisitos y Ambientes de Software (IDEAS’09), pp. 388-393, University of Colombia University of Colombia, Medellín, Colombia, 2009, ISBN: 978-958-44-5028-9.

Abstract | BibTeX

Jose L. Vivas, Isaac Agudo, Javier Lopez

Security Assurance During the Software Development Process Proceedings Article

In: International Conference on Computer Systems and Technologies (CompSysTech09), pp. 11.7.1-11.7.6, ACM ACM, Ruse (Bulgary), 2009, ISBN: 978-1-60558-986-2.

Abstract | BibTeX | Links:

David Galindo, Rodrigo Roman, Javier Lopez

A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks Proceedings Article

In: Proceedings of the 7th International Conference on Cryptology and Network Security (CANS’08), pp. 120-132, Springer Springer, Hong Kong (China), 2008, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

Rafael J. Caro, David Garrido, Pierre Plaza, Rodrigo Roman, Nuria Sanz, Jose L. Serrano

Middleware Seguro EP2P: un Desafío para las Redes Sociales Proceedings Article

In: XVIII Jornadas Telecom I+D, Bilbao (Spain), 2008.

Abstract | BibTeX | Links:

Pablo Najera, Francisco Moyano, Javier Lopez

Secure Integration of RFID Technology in Personal Documentation for Seamless Identity Validation Proceedings Article

In: 3rd Symposium of Ubiquitous Computing and Ambient Intelligence 2008, pp. 134-138, Springer Springer, Salamanca (Spain), 2008, ISBN: 978-3-540-85866-9.

Abstract | BibTeX | Links:

Cristina Alcaraz, Rodrigo Roman, Javier Lopez

Análisis de la Aplicabilidad de las Redes de Sensores para la Protección de Infraestructuras de Información Críticas Proceedings Article

In: VI Jornadas de Ingeniería Telemática (JITEL’08), pp. 437, Alcalá de Henares (Spain), 2008, ISBN: 978-84-612-5474-3.

Abstract | BibTeX | Links:

Ruben Rios, Jose A. Onieva

Clasificación de canales encubiertos. Un nuevo canal: Covert_DHCP Proceedings Article

In: Luis Hernández Encinas, Angel Martin Rey (Ed.): X Reunión Española de Criptología y Seguridad de la Información (RECSI’08), pp. 325-336, Salamanca (Spain), 2008, ISBN: 978-84-691-5158-7.

Abstract | BibTeX | Links:

David Galindo, Rodrigo Roman, Javier Lopez

An Evaluation of the Energy Cost of Authenticated Key Agreement in Wireless Sensor Networks Proceedings Article

In: X Reunión Española sobre Criptología y Seguridad de la Información (RECSI’08), pp. 231-236, Salamanca (Spain), 2008.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez

KeyLED – Transmitting Sensitive Data over out-of-band Channels in Wireless Sensor Networks Proceedings Article

In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS’08), pp. 796-801, IEEE IEEE, Atlanta (USA), 2008, ISBN: 978-1-4244-2574-7.

Abstract | BibTeX | Links:

Jose Manuel Marquez, Javier Jimenez, Isaac Agudo

Secure Real-Time Integration of Services in a OSGi Distributed Environment Proceedings Article

In: Fourth International Conference on Networked Computing and Advanced Information Management (NCM’08), pp. 631-635, IEEE IEEE, Gyeongju, South Korea, 2008, ISBN: 978-0-7695-3322-3.

Abstract | BibTeX | Links:

Jianying Zhou, Tanmoy Kanti Das, Javier Lopez

An Asynchronous Node Replication Attack in Wireless Sensor Networks Proceedings Article

In: 23rd International Information Security Conference (SEC 2008), pp. 125-139, 2008, ISBN: 978-0-387-09699-5.

BibTeX

Isaac Agudo, Carmen Fernandez-Gago, Javier Lopez

Delegating Privileges over Finite Resources: A Quota Based Delegation Approach Proceedings Article

In: 5th International Workshop on Formal Aspects in Security and Trust (FAST’08), pp. 302-315, Springer Springer, Malaga (Spain), 2008, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez, Mario Piattini

Engineering Process Based On Grid Use Cases For Mobile Grid Systems Proceedings Article

In: Third International Conference on Software and Data Technologies (ICSOFT’08), pp. 146-151, Springer Springer, Porto, Portugal, 2008, ISSN: 1865-0929.

Abstract | BibTeX | Links:

Isaac Agudo, Carmen Fernandez-Gago, Javier Lopez

An Evolutionary Trust and Distrust Model Proceedings Article

In: 4th Workshop on Security and Trust Management (STM’08), pp. 3-12, Elsevier Elsevier, Trondheim, Norway, 2008, ISSN: 1571-0661.

Abstract | BibTeX | Links:

Vicente Benjumea, Seung G. Choi, Javier Lopez, Moti Yung

Fair Traceable Multi-Group Signatures Proceedings Article

In: Financial Cryptography and Data Security (FC’08), pp. 265-281, Springer Springer, Cozumel, Mexico, 2008.

Abstract | BibTeX | Links:

Isaac Agudo, Carmen Fernandez-Gago, Javier Lopez

A Model for Trust Metrics Analysis Proceedings Article

In: 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’08), pp. 28-37, Springer Springer, 2008, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez, Mario Piattini

PSecGCM: Process for the development of Secure Grid Computing based Systems with Mobile devices Proceedings Article

In: International Conference on Availability, Reliability and Security (ARES’08), pp. 136-143, IEEE Computer Society IEEE Computer Society, A Grid computing system is defined as a platform that supports distributed system applications which require fast access to a large quantity of distributed resources in a coordinated manner. With the development of wireless technology and mobile devices,, 2008, ISSN: 978-0-7695-3102-1.

Abstract | BibTeX | Links:

Vicente Benjumea, Seung G. Choi, Javier Lopez, Moti Yung

Anonymity 2.0: X.509 Extensions Supporting Privacy-friendly Authentication Proceedings Article

In: Sixth International Workshop on Cryptology and Network Security (CANS’07), pp. 265-281, Springer Springer, Singapore, 2007.

Abstract | BibTeX | Links:

Rodrigo Roman, Carmen Fernandez-Gago, Javier Lopez

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices Proceedings Article

In: 1st International Conference on Autonomic Computing and Communication Systems (Autonomics’07), ICST ICST, Rome (Italy), 2007, ISBN: 978-963-9799-09-7.

Abstract | BibTeX | Links:

Cristina Alcaraz, Rodrigo Roman, Javier Lopez

Análisis de primitivas criptográficas para redes de sensores Proceedings Article

In: VI Jornadas de Ingeniería Telemática (JITEL’07), pp. 401-408, Málaga (Spain), 2007, ISBN: 978-84-690-6670-6.

Abstract | BibTeX | Links:

Rodrigo Roman, Cristina Alcaraz

Applicability of Public Key Infrastructures in Wireless Sensor Networks Proceedings Article

In: European PKI Workshop: Theory and Practice (EuroPKI’07), pp. 313-320, Springer Springer, Mallorca (Spain), 2007, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

Isaac Agudo, Javier Lopez, Jose A. Montenegro

Attribute delegation in ubiquitous environments Proceedings Article

In: 3rd international conference on Mobile multimedia communications (MobiMedia ’07), pp. 43:1–43:6, ICST ICST, Nafpaktos, Greece, 2007, ISBN: 978-963-06-2670-5.

Abstract | BibTeX | Links:

Mildrey Carbonell, Jose Maria Sierra, Jose A. Onieva, Javier Lopez, Jianying Zhou

Estimation of TTP Features in Non-repudiation Service Proceedings Article

In: 7th International Conference on Computational Science and Its Applications (ICCSA’07), pp. 549-558, Springer Springer, 2007.

Abstract | BibTeX | Links:

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez, Mario Piattini

Hacia un Proceso sistemático para el desarrollo de sistemas Grid Seguros con Dispositivos Móviles Proceedings Article

In: IV Congreso Iberoamericano de Seguridad Informática (CIBSI’07), pp. 111-124, Sebastián Cañón, M.A. Sebastián Cañón, M.A., Mar del Plata, Argentina, 2007, ISBN: 978-950-623-043-2.

BibTeX

Isaac Agudo, Javier Lopez, Jose A. Montenegro

Implementation aspects of a delegation system Proceedings Article

In: 3rd international conference on Mobile multimedia communications (MobiMedia ’07), pp. 50:1–50:6, ICST ICST, Nafpaktos, Greece, 2007, ISBN: 978-963-06-2670-5.

Abstract | BibTeX | Links:

Magdalena Payeras, Josep L. Ferrer-Gomila, Lloren Huguet Rotger, Jose A. Onieva

Incompatibilidades entre Propiedades de los Protocolos de Intercambio Equitativo de Valores Proceedings Article

In: Lidia Fuentes, Javier Lopez, Pedro Merino (Ed.): VI Jornadas de Ingeniería Telemática (JITEL’07), pp. 605-608, Universidad de Malaga Universidad de Malaga, 2007, ISBN: 978-84-690-6670-6.

Abstract | BibTeX

Carmen Fernandez-Gago, Rodrigo Roman, Javier Lopez

A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks Proceedings Article

In: 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU’07), pp. 25-30, IEEE Computer Society IEEE Computer Society, Istanbul (Turkey), 2007.

Abstract | BibTeX | Links:

Pablo Najera, Javier Lopez

Aplicación de la Tecnología RFID a Entornos Sanitarios Proceedings Article

In: 2nd International Workshop of Ubiquitous Computing & Ambient Intelligence (wUCAmI’06), pp. 83-95, University of Castilla La Mancha University of Castilla La Mancha, Puertollano, Ciudad Real (Spain), 2006, ISBN: 84-6901744-6.

Abstract | BibTeX

Isaac Agudo, Javier Lopez, Jose A. Montenegro

Attributes Delegation Based on Ontologies and Context Information Proceedings Article

In: 10th IFIP TC-6 TC-11 International Conference on Communications and Multimedia on Security (CMS’06), pp. 54-66, Springer Springer, Heraklion, Crete, 2006, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

Mildrey Carbonell, Jose Maria Sierra, Javier Lopez

Modelo de pago con intermediario. Su aplicación a un escenario real Proceedings Article

In: IX Reunión Española sobre Criptología y Seguridad de la información (IX RECSI), pp. 35-46, Barcelona (Spain), 2006, ISBN: ISBN.978-84-9788-502-3.

BibTeX

Francisco Sanchez-Cid, Antonio Muñoz, Daniel Serrano, Carmen Fernandez-Gago

Software Engineering Techniqes Applied to AmI: Security Patterns Proceedings Article

In: First International Conference on Ambient Intelligence Developments (AmID’06), pp. 108-123, Springer Springer, Sophia-Antipolis (France), 2006, ISBN: 978-3-642-01464-2.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Antonio Muñoz

A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios Proceedings Article

In: Third International Conference on Ubiquitous Intelligence and Computing, pp. 977-987, Springer Springer, Wuhan, China, 2006.

Abstract | BibTeX | Links:

Javier Lopez, Jose A. Montenegro, Rodrigo Roman

Service-Oriented Security Architecture for CII based on Sensor Networks Proceedings Article

In: 2nd International Workshop on Security Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU’06), pp. 1-6, IEEE Press IEEE Press, Lyon, France, 2006.

Abstract | BibTeX | Links:

Jianying Zhou, Jose A. Onieva, Javier Lopez

A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps Proceedings Article

In: 21st International Information Security Conference (IFIP SEC’06), pp. 221-232, Springer Springer, 2006.

Abstract | BibTeX | Links:

Rodrigo Roman, Jianying Zhou, Javier Lopez

Applying Intrusion Detection Systems to Wireless Sensor Networks Proceedings Article

In: IEEE Consumer Communications & Networking Conference (CCNC 2006), pp. 640-644, IEEE IEEE, Las Vegas (USA), 2006, ISBN: 1-4244-0085-6.

Abstract | BibTeX | Links:

Cristina Alcaraz, Rodrigo Roman

Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios Proceedings Article

In: 1st International Workshop on Critical Information Infrastructures Security (CRITIS’06), pp. 166-178, Springer Berlin / Heidelberg Springer Berlin / Heidelberg, 2006, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

Jose A. Onieva, Javier Lopez, Rodrigo Roman, Jianying Zhou

Extension de una plataforma DRM basada en OMA con servicios de No Repudio Proceedings Article

In: IX Reunion Española sobre Criptologia y Seguridad de la Informacion (RECSI’06), pp. 129-141, UOC S.L. UOC S.L., 2006.

Abstract | BibTeX | Links:

Isaac Agudo, Javier Lopez, Jose A. Montenegro

Graphical Representation of Authorization Policies for Weighted Credentials Proceedings Article

In: 11th Australasian Conference on Information Security and Privacy (ACISP’06), pp. 383-394, Springer Springer, Melbourne, Australia, 2006, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

Isaac Agudo, Javier Lopez, Jose A. Montenegro

Políticas de delegación para credenciales ponderadas y su representación gráfica Proceedings Article

In: IX Reunión Española sobre Criptología y Seguridad de la información (RECSI’06), pp. 311-322, Barcelona, Spain, 2006, ISBN: 84-9788-502-3.

BibTeX | Links:

Sokratis K. Katsikas, Javier Lopez, Guenther Pernul

Trust, Privacy and Security in E-business: Requirements and Solutions Proceedings Article

In: 10th Panhellenic Conference in Informatics (PCI’05), pp. 548-558, Springer Springer, Volos, Greece, 2005.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Jianying Zhou

Aplicación de Sistemas de Detección de Intrusiones en Redes de Sensores Proceedings Article

In: Simposio sobre Computación Ubicua e Inteligencia Ambiental (UCAmI’05), pp. 113-120, Granada (Spain), 2005.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Jianying Zhou

Protección contra el Spam Utilizando Desafíos a Priori Proceedings Article

In: V Jornadas de Ingeniería Telemática (JITEL’05), pp. 375-382, Vigo (Spain), 2005.

Abstract | BibTeX | Links:

Antonio Muñoz, Jose A. Onieva, Javier Lopez

On Secure Profiling Proceedings Article

In: 1st International Workshop on Secure Ubiquitous Networks (SUN’05), pp. 214-218, IEEE Press IEEE Press, 2005.

Abstract | BibTeX | Links:

Javier Lopez, Rolf Oppliger, Guenther Pernul

Classifying Public Key Certificates Proceedings Article

In: 2nd European PKI Workshop: Research and Applications (EuroPKI’05), pp. 135-143, Springer Springer, Canterbury, U.K., 2005.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez

Especificación de Sistemas Electrónicos de Microdonaciones Proceedings Article

In: III Simposio Español de Comercio Electrónico, pp. 95-104, Palma (Spain), 2005.

Abstract | BibTeX | Links:

Rodrigo Roman, Jianying Zhou, Javier Lopez

Protection Against Spam using Pre-Challenges Proceedings Article

In: Ryôichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura (Ed.): 20th IFIP International Information Security Conference (IFIP-SEC’05), pp. 281-294, Springer Springer, Chiba (Japan), 2005, ISBN: 0-387-25658-X.

Abstract | BibTeX | Links:

Isaac Agudo, Javier Lopez, Jose A. Montenegro

A Representation Model of Trust Relationships with Delegation Extensions Proceedings Article

In: 3th International Conference on Trust Management (iTRUST’05), pp. 9-22, Springer Springer, Versailles, France, 2005, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

Rodrigo Roman, Jianying Zhou, Javier Lopez

On the Security of Wireless Sensor Networks Proceedings Article

In: Computational Science and Its Applications (ICCSA’05), pp. 681-690, Springer Springer, Singapore, 2005, ISSN: 0302-9743 (Print) 1611-3349 (Online).

Abstract | BibTeX | Links:

Isaac Agudo, Javier Lopez, Jose A. Montenegro, Eiji Okamoto, Ed Dawson

Delegation Perspective of Practical Authorization Schemes Proceedings Article

In: Fifth International Network Conference (INC’05), pp. 157-164, Samos Island, Greece, 2005, ISBN: 960-7475-32-1.

BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Javier Lopez, Rodrigo Roman

Extending an OMA-based DRM Framework with Non-Repudiation Services Proceedings Article

In: 5th Symposium on Signal Processing and Information Technology (ISSPIT’05), pp. 472-477, IEEE IEEE, 2005.

Abstract | BibTeX | Links:

Mildrey Carbonell, Jose A. Onieva, Javier Lopez, Jianying Zhou

Modelo de Simulacion para la Estimacion de Parametros en los protocolos de no Repudio Proceedings Article

In: III Simposio Español de Comercio Electronico (SCE’05), pp. 151-164, Universitat de les Illes Balears Universitat de les Illes Balears, 2005, ISBN: 84-7632-929-6.

Abstract | BibTeX | Links:

Kun Peng, Ed Dawson, Juan M. Gonzalez-Nieto, Eiji Okamoto, Javier Lopez

A Novel Method To Maintain Privacy in Mobile Agent Applications Proceedings Article

In: Fourth International Conference on Cryptology and Network Security (CANS’05), pp. 247-260, Springer Springer, 2005, ISBN: 978-3-540-30849-2.

BibTeX | Links:

Antonio Muñoz, Jose A. Onieva, Javier Lopez

Perfiles Seguros para Comercio Movil Proceedings Article

In: III Simposio Español de Comercio Electronico (SCE’05), pp. 235-244, Universitat de les Illes Balears Universitat de les Illes Balears, 2005.

Abstract | BibTeX | Links:

Rodrigo Roman, Javier Lopez, Jianying Zhou

Análisis de Seguridad en Redes Inalámbricas de Sensores Proceedings Article

In: V Jornadas de Ingenería Telemática (JITEL’05), pp. 335-343, Vigo (Spain), 2005.

Abstract | BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Javier Lopez

Attacking an asynchronous multi-party contract signing protocol Proceedings Article

In: Proceedings of 6th International Conference on Cryptology in India, pp. 311–321, Springer Springer, 2005.

Abstract | BibTeX | Links:

Isaac Agudo, Javier Lopez, Juan J. Ortega

Especificación formal y verificación de requisitos de Seguridad Proceedings Article

In: VIII Reunión Española sobre Criptología y Seguridad de la Información (VIII RECSI), pp. 225-235, Madrid (Spain), 2004, ISBN: 84-7978-650-7.

BibTeX

Jianying Zhou, Jose A. Onieva, Javier Lopez

Analysis of a Free Roaming Agent Result-Truncation Defense Scheme Proceedings Article

In: 6th Conference on E-Commerce (CEC’04), pp. 221-226, IEEE Computer Society IEEE Computer Society, 2004.

Abstract | BibTeX | Links:

Javier Lopez, Jose A. Montenegro, Rolf Oppliger, Guenther Pernul

On a Taxonomy of Systems for Authentication and/or Authorization Services Proceedings Article

In: TERENA Networking Conference, Rhodes, Greece, 2004.

Abstract | BibTeX | Links:

Mildrey Carbonell, Jose A. Onieva, Javier Lopez, Deborah Galpert, Jianying Zhou

Timeout Estimation using a Simulation Model for Non-repudiation Protocols Proceedings Article

In: 2nd Workshop on Internet Communications Security (WICS’04), (within Computational Science and its Applications International Conference), pp. 903-914, Springer Springer, 2004.

Abstract | BibTeX | Links:

Vicente Benjumea, Javier Lopez, Jose A. Montenegro, Jose M. Troya

A First Approach to Provide Anonymity in Attribute Certificates Proceedings Article

In: 2004 International Workshop on Practice and Theory in Public Key Cryptography (PKC’04), pp. 402-415, Springer Springer, 2004.

Abstract | BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Javier Lopez

Enhancing Certified Email Service for Timeliness and Multicast Proceedings Article

In: Fourth International Network Conference, pp. 327-335, University of Plymouth University of Plymouth, 2004.

Abstract | BibTeX | Links:

Jose A. Onieva, Javier Lopez, Jianying Zhou

Mejorando Servicios de Correo Electronico Certificado con Prontitud Temporal y Multicasting Proceedings Article

In: VIII Reunión Española sobre Criptología y Seguridad de la información (RECSI’04). Avances en Criptologia y Seguridad de la Informacion, pp. 537-546, Diaz de Santos Diaz de Santos, 2004, ISBN: 84-7978-650-7.

Abstract | BibTeX | Links:

Jianying Zhou, Jose A. Onieva, Javier Lopez

Protecting Free Roaming Agents against Result-Truncation Attack Proceedings Article

In: 60th IEEE Vehicular Technology Conference (VTC’04), pp. 3271-3274, IEEE Vehicular Technology Society Press IEEE Vehicular Technology Society Press, 2004.

Abstract | BibTeX | Links:

Isaac Agudo, Javier Lopez

Specification and formal verification of security requirements Proceedings Article

In: 5th international conference on Computer systems and technologies (CompSysTech ’04), pp. 1-6, ACM ACM, Rousse, Bulgaria, 2004, ISBN: 954-9641-38-4.

Abstract | BibTeX | Links:

Clare Dixon, Carmen Fernandez-Gago, Michael Fisher, Wiebe Hoek

Using Temporal Logics of Knowledge in the Formal Verification of Security Protocols Proceedings Article

In: 11th International Symposium on Temporal Representation and Reasoning (TIME’04), pp. 148-151, IEEE Computer Society IEEE Computer Society, Tatihou, Normandie, France, 2004, ISSN: 1530-1311.

Abstract | BibTeX | Links:

Jose A. Montenegro, Javier Lopez, Fernando Moya

Diseño e Implementación del Marco de Trabajo de Certificado de Atributos X509 para la Delegación de Privilegios Proceedings Article

In: VIII Reunión Española sobre Criptología y Seguridad de la información (VIII RECSI), pp. 571-581, Madrid, Spain, 2004.

Abstract | BibTeX | Links:

Javier Lopez, Juan J. Ortega, Jose M. Troya, Jose L. Vivas

High-level Specification of Security Systems Proceedings Article

In: IEEE Globecom 2003 – Communications Security Track, pp. 1506-1510, IEEE Press IEEE Press, San Francisco, 2003, ISBN: 0-7803-7974-8.

Abstract | BibTeX | Links:

Javier Lopez, Juan J. Ortega, Jose M. Troya, Jose L. Vivas

How to Specify Security Services: A Practical Approach Proceedings Article

In: 7th IFIP Conference on Multimedia and Communications Security (CMS’03), pp. 158-171, Springer-Verlag Springer-Verlag, Torino, Italy, 2003, ISBN: 3-540-20185-8.

Abstract | BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Javier Lopez

Practical Service Charge for P2P Content Distribution Proceedings Article

In: Fifth International Conference on Information and Communications Security, pp. 112 – 123, Springer Springer, 2003.

Abstract | BibTeX | Links:

Jose L. Vivas, Jose A. Montenegro, Javier Lopez

Towards Business Process-Driven Framework for Security Engineering with the UML Proceedings Article

In: 6th International Conference on Information Security (ISC’03), pp. 381-395, Springer-Verlag Springer-Verlag, Bristol, U.K., 2003, ISBN: 1-4020-7449-2.

Abstract | BibTeX | Links:

Javier Lopez, Juan J. Ortega, Jose M. Troya

Applying SDL to Formal Analysis of Security Systems Proceedings Article

In: 11th International SDL Forum (SDL’03), pp. 300-317, Springer-Verlag Springer-Verlag, Stuttgart, Germany, 2003.

Abstract | BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez

Intermediary Non-Repudiation Protocols Proceedings Article

In: 5th Conference on Electronic Commerce, pp. 207-214, IEEE Computer Society IEEE Computer Society, 2003.

Abstract | BibTeX | Links:

Jose A. Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez

A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages Proceedings Article

In: 18th IFIP International Information Security Conference. Security and Privacy in the Age of Uncertainty (IFIP SEC’03), pp. 37-48, IFIP IFIP, 2003.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Jose M. Troya, Mariemma I. Yague

Applying the Semantic Web Layers to Access Control Proceedings Article

In: IEEE International Workshop on Web Semantics (WebS’03), pp. 622-626, IEEE Press IEEE Press, 2003, ISBN: 0-7695-1993-8.

BibTeX | Links:

Ed Dawson, Javier Lopez, Jose A. Montenegro, Eiji Okamoto

BAAI: Biometric Authentication and Authorization Infrastructure Proceedings Article

In: IEEE International Conference on Information Technology (ITRE’03), pp. 274-278, IEEE IEEE, 2003, ISBN: 0780377249.

Abstract | BibTeX | Links:

Eiji Okamoto, Javier Lopez, Ed Dawson, Juan M. Gonzalez-Nieto, Selwyn Russell, Jason Smith

Certificate Retrieval and Validation in Online Systems Proceedings Article

In: Symposium on Cryptography and Information Security (SCIS’03), pp. 25-30, Hamamatsu, Japan, 2003.

Abstract | BibTeX | Links:

Jose A. Montenegro, Javier Lopez

Taxonomía de las Infraestructuras de Autorización y Autentificación Proceedings Article

In: XIII Jornadas TELECOM I+D 2003, 2003.

BibTeX

Javier Lopez, Antonio Mana, Ernesto Pimentel, Jose M. Troya, Mariemma I. Yague

Access Control Infrastructure for Digital Objects Proceedings Article

In: International Conference on Information and Communications Security (ICICS’02), pp. 399-410, Springer-Verlag Springer-Verlag, Singapore, 2002.

Abstract | BibTeX | Links:

Javier Lopez, Jose A. Montenegro, Rodrigo Roman, Jorge Davila

Design of a VPN Software Solution Integrating TCP and UDP Services Proceedings Article

In: International Conference on Infrastructure Security (InfraSec’02), pp. 325-337, Springer-Verlag Springer-Verlag, Bristol, U.K., 2002.

Abstract | BibTeX | Links:

Javier Lopez, Juan J. Ortega, Jose M. Troya

Protocol Engineering Applied to Formal Analysis of Security Systems Proceedings Article

In: International Conference on Infrastructure Security (InfraSec’02), pp. 246-259, Springer-Verlag Springer-Verlag, Bristol, U.K., 2002.

Abstract | BibTeX | Links:

William Caelli, Kevin Chen, Ed Dawson, Matthew Henricksen, Javier Lopez, Eiji Okamoto, Selwyn Russell, Jason Smith

Online Public Key Infrastructure Proceedings Article

In: VII Reunión Española sobre Criptología y Seguridad de la Información (VII RECSI), pp. 123-135, Oviedo (Spain), 2002, ISBN: 84-699-8930-8.

BibTeX

Javier Lopez, Antonio Mana, Jose A. Montenegro, Juan J. Ortega, Jose M. Troya

Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations Proceedings Article

In: First International Conference on Electronic Government (EGOV’02), pp. 211-214, Springer Springer, Aix-en-Provence, France, 2002.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Mariemma I. Yague

XML-Based Distributed Access Control System Proceedings Article

In: Third International Conference on E-Commerce and Web Technologies (ECWeb’02), pp. 203-213, Springer Springer, 2002.

Abstract | BibTeX | Links:

Carmen Fernandez-Gago, Michael Fisher, Clare Dixon

Algorithms for Guiding Clausal Temporal Resolution Proceedings Article

In: 25th Conference on Artificial Intelligence (KI’02), pp. 235-249, Springer Springer, Aachen, Germany, 2002.

Abstract | BibTeX | Links:

Ed Dawson, Javier Lopez, Jose A. Montenegro, Eiji Okamoto

A New Design of Privilege Management Infrastructure (PMIs) for Organizations Using Outsourced PKI Proceedings Article

In: 5th International Conference on Information Security (ISC’02), pp. 136-149, Springer-Verlag Springer-Verlag, 2002, ISBN: 3540442707.

Abstract | BibTeX | Links:

Javier Lopez, Juan J. Ortega, Jose M. Troya

Verification of Authentication Protocols using SDL-method Proceedings Article

In: First International Workshop on Security in Information Systems (SIS’02), pp. 61-71, Ciudad Real, Spain, 2002.

Abstract | BibTeX | Links:

Selwyn Russell, Eiji Okamoto, Ed Dawson, Javier Lopez

Improving Performance in Global PKI using Virtual Certificates and Synthetic Certificates Proceedings Article

In: Symposium on Cryptography and Information Security (SCIS’02), pp. 1149-1154, 2002.

Abstract | BibTeX | Links:

Javier Lopez, Jose A. Montenegro, Jose M. Troya

Perspectiva Composicional para el Diseño y la Implementación de una PKI Proceedings Article

In: I Congreso Internacional Sociedad de la Información, pp. 423-428, Las Palmas, España, 2002.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Jose A. Montenegro, Juan J. Ortega, Jose M. Troya

Designing Software Tools for the Use of Secure Electronic Forms Proceedings Article

In: 3rd ACIS Int. Conf. on Software Engineering, Artificial Intelligence Networking and Parallel/Distributed Computing (SNPD’02), pp. 157-163, Madrid, Spain, 2002.

Abstract | BibTeX | Links:

Javier Lopez, Sonia Matamoros, Juan J. Ortega, Jose M. Troya

Observaciones sobre las técnicas de análisis formal de protocolos de seguridad Proceedings Article

In: VII Reunión Española sobre Criptología y Seguridad de la Información (VII RECSI), pp. 471-483, Oviedo, España, 2002.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Juan J. Ortega, Ernesto Pimentel

Protección de Software basada en Tarjetas Inteligentes Proceedings Article

In: VII Reunión Española sobre Criptología y Seguridad de la Información (VII RECSI), pp. 485-497, Oviedo, España, 2002.

BibTeX

Sigrid Gurgens, Javier Lopez

Suitability of a Classical Analysis Method for E-Commerce Protocols Proceedings Article

In: IV International Information Security Conference (ISC’01), pp. 46-62, Springer-Verlag Springer-Verlag, Malaga, Spain, 2001.

Abstract | BibTeX | Links:

Carmen Fernandez-Gago, Michael Fisher, Clare Dixon

An Algorithm for Guiding Clausal Temporal Resolution Proceedings Article

In: 4th International Workshop on Strategies in Automated Deduction (STRATEGIES’01), Siena, Italy, 2001.

Abstract | BibTeX | Links:

Jorge Davila, Javier Lopez, Rene Peralta, Jose M. Troya

A First Approach to Latin Electronic Notary Public Services Proceedings Article

In: IFIP Conference on Security & Control of IT in Security, pp. 49-60, 2001.

BibTeX

Javier Areitio, Lorenzo Martínez, Javier Lopez, Jose A. Montenegro

Análisis, Diseño e Implementación de un Entorno Escalable de Comercio-e con Seguridad Telemática Adaptable Basada en PKI Proceedings Article

In: I Simposio Español de Comercio Electrónico (SEC’01), pp. 145-160, Málaga, España, 2001.

Abstract | BibTeX

Jorge Davila, Javier Lopez, Rodrigo Roman

Introducción de Aplicaciones UDP en Redes Privadas Virtuales Proceedings Article

In: III Jornadas de Ingeniería Telemática (JITEL’01), pp. 397-404, Barcelona (Spain), 2001.

Abstract | BibTeX | Links:

Antonio Mana, Javier Lopez, Jesus Martinez, Sonia Matamoros

Ticketing Genérico y Seguro Sobre GSM Proceedings Article

In: Simposio en Informática y Telecomunicaciones 2001 (SIT’01), pp. 297-305, La Coruña, España, 2001.

Abstract | BibTeX

Javier Lopez, Antonio Mana, Juan J. Ortega, Jose M. Troya

Distributed Storage and Revocation in Digital Certificate Databases Proceedings Article

In: 11th International Conference on Database and Expert Systems Applications (DEXA’00), pp. 929-938, Springer Springer, London, U.K., 2000.

Abstract | BibTeX | Links:

Jorge Davila, Javier Lopez, Rene Peralta

Una Solución Flexible para Redes Privadas Virtuales Proceedings Article

In: VI Reunión Española de Criptología y Seguridad de la Información (VI RECSI), pp. 329-340, La Laguna, 2000, ISBN: 978-84789743-1-3.

BibTeX

Jorge Davila, Javier Lopez, Antonio Mana, Juan J. Ortega, Jose M. Troya

Development of Secure Internet Applications for Governmental Environments Proceedings Article

In: IEEE International Workshop on Electronic Government (in DEXA’00), pp. 362-365, IEEE Press IEEE Press, 2000, ISBN: 0-7695-0680-1.

BibTeX

Jorge Davila, Lidia Fuentes, Javier Lopez, Jose M. Troya, Antonio Vallecillo

Internet Secure Communications Between Citizens and Public Administrations Proceedings Article

In: IFIP Conference on Advances in Electronic Government, pp. 109-120, 2000.

BibTeX

Javier Lopez, Antonio Mana, Jose A. Montenegro, Juan J. Ortega, Jose M. Troya

Aspectos de Implementación de una Infraestructura de Clave Pública Distribuida Proceedings Article

In: Simposio Español de Informática Distribuida (SEID’00), pp. 313-320, Orense, Espa, 2000.

Abstract | BibTeX | Links:

Javier Areitio, Javier Lopez

Mecanismo de Seguridad de Bajo Costo para Micropagos Proceedings Article

In: VI Reunion Española de Criptología y Seguridad de la Información (VI RECSI), pp. 193-200, La Laguna, Espa, 2000.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Juan J. Ortega

Cert’eM: Certification System Based on Electronic Mail Service Structure Proceedings Article

In: Secure Networking (CQRE’99), pp. 109-118, Springer Springer, 1999.

Abstract | BibTeX | Links:

Javier Lopez, Antonio Mana, Juan J. Ortega

An User Authentication Infrastructure for Extranet Applications Proceedings Article

In: IEEE International Carnahan Conference on Security Technology, pp. 354-362, IEEE Press IEEE Press, Madrid, Spain, 1999.

Abstract | BibTeX | Links:

Lidia Fuentes, Javier Lopez

Arquitectura Composicional de Seguridad para Servicios Telemáticos Proceedings Article

In: II Jornadas de Ingeniería Telemática (JITEL’99), pp. 141-148, 1999, ISBN: 84-89315-14-0.

BibTeX

Sigrid Gurgens, Javier Lopez, Rene Peralta

Efficient Detection of Failure Modes in Electronic Commerce Protocols Proceedings Article

In: IEEE International Workshop on Electronic Commerce and Security, pp. 850-857, IEEE Press IEEE Press, Florence, Italy, 1999.

Abstract | BibTeX

Alfonso Larrosa, Francisco Lopez, Javier Lopez

Competitive Neural Networks Applied to Image Compression Techniques Proceedings Article

In: International Conference on Imaging Science, Systems and Technology (CISST’99), pp. 547-550, 1999.

BibTeX

Javier Lopez, Antonio Mana, Juan J. Ortega

A Public Key Infrastructure for User Identification Proceedings Article

In: IFIP Working Conference on User Identification and Privacy Protection, pp. 209-227, Stockholm, Sweden, 1999.

Abstract | BibTeX | Links:

Javier Lopez, Javier Areitio, Felipe Rosello

Problemática de Seguridad para el Comercio Electrónico en el Sector Turístico Proceedings Article

In: I Congreso Nacional Turismo y Tecnología de la Información y las Comunicaciones (TURITEC’99), pp. 99-110, 1999.

Abstract | BibTeX

Antonio Mana, Francisco Villalba, Javier Lopez

Secure Examinations Through The Internet Proceedings Article

In: IFIP World Computer Congress, pp. 695-708, 1998.

Abstract | BibTeX

Francisco Lopez, Javier Lopez, Juan A. Manceras, Antonio Mana

Automatic Conversion of Scanned Maps to a Vector Based 3D Representation Proceedings Article

In: International Conference on Imaging Science, Systems, and Technology (CISST’98), Las Vegas, USA, 1998.

BibTeX

Francisco Lopez, Javier Lopez, Juan A. Manceras, Antonio Mana

Neural Networks Applied to the Estimation of Object Orientation Proceedings Article

In: International Conference on Imaging Science, Systems, and Technology (CISST’98), pp. 418-424, Las Vegas, USA, 1998.

Abstract | BibTeX | Links:

Lucia Pino, Javier Lopez, Francisco Lopez, Carlos Maraval

Aproximacion de Funciones mediante Redes Neuronales Proceedings Article

In: pp. 209-215, 1997, ISBN: 84-89654-03-4.

BibTeX

Lucia Pino, Antonio Mana, Juan J. Ortega, Javier Lopez

Sistema Jerárquico de Administración de Claves Públicas para el Correo Electrónico Proceedings Article

In: I Jornadas de Ingeniería Telemática (JITEL’97), pp. 295-302, Bilbao (Spain), 1997, ISBN: 84-89654-04-2.

BibTeX

Francisco Lopez, Javier Lopez, Lucia Pino, Carlos Maraval

Neural Networks for Systems Security Proceedings Article

In: 5th European Congress of Intelligent Techniques and Soft Computing (EUFIT’97), pp. 410-413, Germany, 1997.

Abstract | BibTeX

Francisco Lopez, Javier Lopez, Alvaro Vergara, Lucia Pino

Determination of Objects Orientation in Assembly Lines using Neural Networks Proceedings Article

In: 5th Intern. Conf. on Computer Aided Systems Theory and Technology (EUROCAST’97), pp. 183-189, Las Palmas, Spain, 1997.

Abstract | BibTeX

Lucia Pino, Javier Lopez, Francisco Lopez, Carlos Maraval

A Tool for Functions Approximation by Neural Networks Proceedings Article

In: 5th European Congress of Intelligent Techniques and Soft Computing (EUFIT’97), pp. 557-564, Aachen (Germany), 1997.

BibTeX

Antonio Mana, Javier Lopez, Lucia Pino, Juan J. Ortega, Carlos Maraval

Incremento de la Seguridad del Estandar de Cifrado de Datos basado en la Combinación de Datos y Clave Proceedings Article

In: III Jornadas de Informática y Automática, pp. 423-432, El Puerto de Santa María, España, 1997.

Abstract | BibTeX | Links:

Javier Lopez, Gonzalo Ramos, Rafael Morales

Comparación de la Condición de Parikh con algunas Condiciones de los Lenguajes de Contexto Libre Proceedings Article

In: II Jornadas de Informática y Automática, pp. 305-314, Almuñecar, España, 1996.

Abstract | BibTeX | Links:

Javier Lopez, Francisco Ona, Lucia Pino, Carlos Maraval

Generación de Números Primos mediante Tests de Primalidad Probabilístas Proceedings Article

In: IV Reunión Española de Criptología (IV REC), pp. 27-33, Valladolid, España, 1996.

Abstract | BibTeX

Gonzalo Ramos, Javier Lopez

ID3f+A. Algoritmo de Aprendizaje Inductivo Borroso con División Intervalar Automática de los Atributos Proceedings Article

In: VI Congreso Español Sobre Tecnologías y Lógica Fuzzy (ESTYLF’96), pp. 225-230, 1996.

Abstract | BibTeX | Links:

Francisco Lopez, Javier Lopez, Carlos Maraval

Image Compression Based on Competitive Hebbian Learning Neural Networks Proceedings Article

In: Brain Processes, Theories and Models International Conference, pp. 478-482, Las Palmas, Spain, 1995.

BibTeX

Javier Lopez, Francisco Ona, Lucia Pino, Carlos Maraval

Seguridad de Directorios en Criptosistemas de Clave Pública mediante Redes Neuronales en Sistemas de Comunicaciones Proceedings Article

In: X Symposium Nacional de la Unión Científica Internacional de Radio (URSI’95), pp. 147-150, Valladolid, España, 1995.

BibTeX

Javier Lopez, Carlos Maraval

Sistema de Cifrado de Correo Electrónico en Red de Area Local Proceedings Article

In: III Reunión Española de Criptología (III REC), pp. 133-138, Barcelona, España, 1994.

BibTeX

Theo Dimitrakos, Javier Lopez, Fabio Martinelli

Collaborative Approaches for Cyber Security in Cyber-Physical Systems Book

Springer, 2023, ISBN: 9783031160882.

BibTeX | Links:

Cristina Alcaraz

Security and Privacy Trends in the Industrial Internet of Things Book

Springer, 2019, ISBN: 978-3-030-12330-7.

BibTeX | Links:

Ruben Rios, Javier Lopez, Jorge Cuellar

Location Privacy in Wireless Sensor Networks Book

Taylor & Francis, 2016, ISBN: 9781498776332.

BibTeX | Links:

Carmen Fernandez-Gago, Massimo Felici

Accountability and Security in the Cloud Book

2015.

BibTeX

Maritta Heisel, Wouter Joosen, Javier Lopez, Fabio Martinelli

Engineering Secure Future Internet Services and Systems- Current Research Book

Springer, 2014.

Abstract | BibTeX

Javier Lopez, Roberto Setola, Stephen Wolthusen (Ed.)

Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense Book

Springer, 2012, ISSN: 978-3-642-28919-4.

BibTeX

Romain Carbou, Michel Diaz, Ernesto Exposito, Rodrigo Roman

Digital Home Networking Book

Wiley-ISTE, 2011, ISSN: 1848213212.

BibTeX | Links:

Jose A. Onieva, Javier Lopez, Jianying Zhou

Secure Multi-Party Non-Repudiation Protocols and Applications Book

Springer, 2009, ISBN: 978-0-387-75629-5.

BibTeX | Links:

Steven Furnell, Sokratis K. Katsikas, Javier Lopez, Ahmed Patel

Securing Information and Communications Systems: Principles, Technologies and Applications Book

Artech House, 2008, ISSN: 1596932287.

BibTeX

Javier Lopez, Jianying Zhou

Wireless Sensor Networks Security Book

IOS Press, 2008, ISSN: 9781586038137.

BibTeX | Links:

Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez

POM: A Trust-based AHP-like Methodology to Solve Conflict Requirements for the IoT Book Section

In: Collaborative Approaches for Cyber Security in Cyber-Physical Systems, pp. 145-170, Springer, 2023, ISSN: 1613-5113.

BibTeX | Links:

Cristina Alcaraz

Situational Awareness for CPS Book Section

In: Encyclopedia of Cryptography, Security and Privacy, pp. 1–3, Springer Berlin Heidelberg, Berlin, Heidelberg, 2021, ISBN: 978-3-642-27739-9.

BibTeX | Links:

Ioannis Stellios, Panayiotis Kotzanikolaou, Mihalis Psarakis, Cristina Alcaraz

Risk Assessment for IoT-Enabled Cyber-Physical Systems Book Section

In: Advances in Core Computer Science-Based Technologies, pp. 157-173, Springer International Publishing, Cham, 2021, ISBN: 978-3-030-41196-1.

Abstract | BibTeX | Links:

Ana Nieto, Ruben Rios, Javier Lopez

Privacy-Aware Digital Forensics Book Section

In: Security and Privacy for Big Data, Cloud Computing and Applications, The Institution of Engineering and Technology (IET), United Kingdom, 2019, ISBN: 978-1-78561-747-8.

BibTeX | Links:

Cristina Alcaraz

Secure Interconnection of IT-OT Networks in Industry 4.0 Book Section

In: Critical Infrastructure Security and Resilience: Theories, Methods, Tools and Technologies, pp. 201-217, Springer International Publishing, 2019, ISBN: 978-3-030-00024-0.

Abstract | BibTeX | Links:

Cristina Alcaraz, Javier Lopez

Secure Interoperability in Cyber-Physical Systems Book Section

In: Security Solutions and Applied Cryptography in Smart Grid Communications, IGI Global, USA, pp. 137-158, IGI Global, USA, 2017, ISBN: 9781522518297.

Abstract | BibTeX | Links:

Cristina Alcaraz, Lorena Cazorla, Javier Lopez

Cyber-Physical Systems for Wide-Area Situational Awareness Book Section

In: Cyber-Physical Systems: Foundations, Principles and Applications, pp. 305 – 317, Academic Press, Boston, 2017, ISBN: 978-0-12-803801-7.

Abstract | BibTeX | Links:

Carmen Fernandez-Gago, David Nuñez

Metrics for Accountability in the Cloud Book Section

In: Accountability and Security in the Cloud, vol. 8937, pp. 129-153, 2015.

BibTeX

David Nuñez, Isaac Agudo, Javier Lopez

Privacy-Preserving Identity Management as a Service Book Section

In: Massimo Felici, Carmen Fernandez-Gago (Ed.): Accountability and Security in the Cloud, vol. 8937, pp. 114-125, Springer International Publishing, 2015, ISBN: 978-3-319-17198-2.

Abstract | BibTeX | Links:

Francisco Moyano, Carmen Fernandez-Gago, Benoit Baudry, Javier Lopez

Engineering Trust-Awareness and Self-adaptability in Services and Systems Book Section

In: Engineering Secure Future Internet Services and Systems, vol. 8431, pp. 180-209, Springer, 2014, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Ruben Rios, Javier Lopez, Jorge Cuellar

Location Privacy in WSNs: Solutions, Challenges, and Future Trends Book Section

In: Foundations of Security Analysis and Design VII, vol. 8604, pp. 244-282, Springer, 2014, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Cristina Alcaraz, Gerardo Fernandez, Fernando Carvajal

Security Aspects of SCADA and DCS Environments Book Section

In: Javier Lopez, Stephen Wolthusen, Roberto Setola (Ed.): Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense, vol. 7130, pp. 120-149, Springer-Verlag, Heidelberger (Berlin, Alemania), 2012, ISSN: 0302-9743.

Abstract | BibTeX | Links:

Remi Bars, Jorge Gomez, Mohamed Mahdi, Cristina Alcaraz, Rodrigo Roman

Digital Home Networking: Standards Book Section

In: Romain Carbou, Ernesto Exposito, Rodrigo Roman, Michel Diaz (Ed.): Digital Home Networking, vol. 7130, pp. 60-96, John Wiley & Sons Inc., Reino Unido, 2011, ISSN: 978-1-84821-321-0.

BibTeX

Pablo Najera, Ana Nieto

Network Technologies Book Section

In: Romain Carbou, Ernesto Exposito, Rodrigo Roman (Ed.): Digital Home Networking, pp. 17 – 58, Wiley-ISTE, 2011, ISBN: 978-1848213210.

BibTeX

Francisco Moyano, Rodrigo Roman, Anas Abou El Kalam, Marc Lacoste, Mohamed Maachaoui

Security Book Section

In: Romain Carbou, Michel Diaz, Ernesto Exposito, Rodrigo Roman (Ed.): Digital Home Networking, pp. 139-202, 2011, ISSN: 9781848213210.

BibTeX

David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez

Security in the Developments Process of Mobile Grid Systems Book Section

In: Advances in Grid Computing, pp. 173-198, Intech, 2011.

BibTeX | Links:

Rodrigo Roman, Carmen Fernandez-Gago, Javier Lopez, Hsiao-Hwa Chen

Trust and Reputation Systems for Wireless Sensor Networks Book Section

In: Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Ed.): Security and Privacy in Mobile and Wireless Networking, pp. 105-128, Troubador Publishing Ltd, 2009, ISBN: 978-1905886-906.

Abstract | BibTeX | Links:

Rodrigo Roman, Cristina Alcaraz, Nicolas Sklavos

On the Hardware Implementation Efficiency of Cryptographic Primitives Book Section

In: Javier Lopez, Jianying Zhou (Ed.): Wireless Sensor Network Security, IOS Press, 2008, ISBN: 978-1-58603-813-7.

Abstract | BibTeX | Links:

Pablo Najera, Javier Lopez

RFID: Technological Issues and Privacy Concerns Book Section

In: Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani Vimercati (Ed.): Digital Privacy: Theory, Technologies, and Practices, pp. 285-306, Auerbach Publications, 2007, ISBN: 1420052179.

BibTeX | Links:

Jose L. Vivas, Jose A. Montenegro, Javier Lopez

Grid Security Architecture: Requirements, Fundamentals, Standards and Models Book Section

In: Yang Xiao (Ed.): Security in Distributed, Grid, Mobile, and Pervasive Computing, pp. 255-288, Auerbach Publications, 2007, ISBN: 9780849379215.

BibTeX | Links:

Javier Lopez, Cristina Alcaraz, Rodrigo Roman

On the Protection and Technologies of Critical Information Infrastructures. Book Section

In: On Foundations of Security Analysis and Design IV, FOSAD 2006/2007, Springer, vol. 4677, pp. 160-182, 2007, ISSN: 0302-9743, (10.1007/978-3-540-74810-6_6).

Abstract | BibTeX | Links:

Ruben Rios, Joachim Posegga

19th International Workshop on Security and Trust Management (STM 2023) Proceedings

Springer Cham, vol. 14336, 2023, ISBN: 978-3-031-47197-1.

Abstract | BibTeX | Links:

Tim Muller, Carmen Fernandez-Gago, Davide Ceolin, Ehud Gudes, Nurit Gal-Oz (Ed.)

14th IFIP WG11.11 on Trust Management (IFIPTM 2023) Proceedings

2023, ISBN: 978-3-031-76716-6.

Abstract | BibTeX

Rodrigo Roman, Mujeeb Ahmed (Ed.)

9th ACM Cyber-Physical System Security Workshop (CPSS 2023) Proceedings

ACM, Melbourne, Australia, 2023, ISBN: 979-8-4007-0090-3.

BibTeX | Links:

Xingliang Yuan, Guangdong Bai, Cristina Alcaraz, Suryadipta Majumdar (Ed.)

16th International Conference on Network and System Security (NSS 2022) Proceedings

2022, ISBN: 978-3-031-23019-6.

Abstract | BibTeX | Links:

Earlence Fernandes, Cristina Alcaraz

CPSIoTSec ’22: 4th Workshop on CPS & IoT Security and Privacy Proceedings

2022, ISBN: 978-1-4503-9450-5.

Abstract | BibTeX | Links:

Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman Zonouz (Ed.)

4th Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2022) – ACNS: International Conference on Applied Cryptography and Network Security Proceedings

2022, ISBN: 978-3-031-16814-7.

Abstract | BibTeX | Links:

Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati (Ed.)

24th International Conference on Information and Communications Security (ICICS 2022) Proceedings

2022, ISBN: 978-3-031-15776-9.

Abstract | BibTeX | Links:

Rodrigo Roman, Jianying Zhou (Ed.)

17th International Workshop on Security and Trust Management (STM 2021) Proceedings

Springer Cham, vol. 13075, 2021, ISBN: 978-3-030-91859-0.

Abstract | BibTeX | Links:

Michail Maniatakos, Cristina Alcaraz (Ed.)

2nd Workshop on CPS&IoT Security and Privacy, 2021 Proceedings

2021, ISBN: 978-1-4503-8487-2.

Abstract | BibTeX | Links:

Manuel A. Serrano, Eduardo Fernández-Medina Cristina Alcaraz, Noemí de Castro, Guillermo Calvo

VI Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2021) Proceedings

2021, ISBN: 978-84-9044-463-4.

BibTeX | Links:

Sokratis Katsikas, Cristina Alcaraz

Cyber-Physical System Security Workshop (CPSS 2020) Proceedings

2020, ISBN: 978-1-4503-7608-2.

Abstract | BibTeX | Links:

Sokratis K. Katsikas, Cristina Alcaraz

14th International Workshop on Security and Trust Management (STM 2018) Proceedings

Springer International Publishing, Springer Nature Switzerland, vol. 11091, 2018, ISSN: 1611-3349.

BibTeX | Links:

Javier Lopez, Jianying Zhou, Miguel Soriano (Ed.)

23rd European Symposium on Research In Computer (ESORICS 2018) Proceedings

2018, ISBN: 978-3-319-99072-9.

Abstract | BibTeX | Links:

Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti, Giovanni Livraga, Ruben Rios

13th International Workshop on Data Privacy Management (DPM 2018) Proceedings

Springer International Publishing, Barcelona, Spain, vol. 11025, 2018, ISBN: 978-3-030-00305-0.

Abstract | BibTeX | Links:

Mónica Aguilar-Igartua, Carolina Tripp Barba, Cristina Alcaraz

12th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc (PE-WASUM 2015) Proceedings

ACM, Cancun, Mexico, 2015, ISBN: 978-1-4503-3759-5.

BibTeX | Links:

Massimo Felici, Carmen Fernández-Gago

1st Summer School on Accountability and Security in the Cloud (A4CLOUD 2014) Proceedings

2014, ISBN: 978-3-319-17198-2.

Abstract | BibTeX | Links:

Sokratis K. Katsikas, Isaac Agudo (Ed.)

10th European Workshop on Public Key Infrastructures, Services and Applications (EuroPKI 2013) Proceedings

Springer, vol. 8341, 2013, ISBN: 978-3-642-53996-1.

BibTeX | Links:

Steven Furnell, Costas Lambrinoudakis, Javier Lopez (Ed.)

10th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2013) Proceedings

Springer, Prague, Czech Republic, vol. LNCS 8058, 2013, ISBN: 978-3-642-40342-2.

BibTeX

Javier Lopez, Xinyi Huang, Ravi Sandhu (Ed.)

7th International Conference on Network and System Security (NSS 2013) Proceedings

Springer, vol. LNCS, no. 7873, 2013, ISBN: 978-3-642-38631-2.

BibTeX | Links:

Carmen Fernandez-Gago, Fabio Martinelli, Siani Pearson, Isaac Agudo (Ed.)

7th IFIP WG11.11 on Trust Management (IFIPTM 2013) Proceedings

Springer, Malaga (Spain), vol. 401, 2013, ISBN: 978-3-642-38323-6.

BibTeX

Bernhard M. Hämmerli, Nils Kalstad Svendsen, Javier Lopez (Ed.)

7th International Conference on Critical Information Infrastructures Security (CRITIS 2012) Proceedings

Springer, Lillehammer (Norway), vol. LNCS 7722, 2013, ISBN: 978-3-642-41485-5.

BibTeX | Links:

Yang Xiang, Javier Lopez, C.-C. Jay Kuo, Wanlei Zhou (Ed.)

4th International Symposium on Cyberspace Safety and Security (CSS 2012) Proceedings

Springer, Melbourne (Australia), vol. LNCS, 2012, ISSN: 978-3-642-35362-8.

BibTeX

Catherine Meadows, Carmen Fernandez-Gago (Ed.)

7th International Workshop on Security and Trust Management (STM 2011) Proceedings

Springer, Copenhaguen, Denmark, vol. 7170, 2012, ISBN: 978-3-642-29963-6.

BibTeX

Jorge Cuellar, Javier Lopez (Ed.)

3rd International ACMSigsoft Symposium on Architecting Critical Systems (ISARCS 2012) Proceedings

ACM, Bertinoro (Italy), 2012.

BibTeX

Javier Lopez, Gene Tsudik

9th International Conference on Applied Cryptography and Network Security (ACNS 2011) Proceedings

Springer, vol. 6715, 2011.

BibTeX

Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner (Ed.)

6th International Workshop on Security and Trust Management (STM 2010) Proceedings

vol. 6710, 2010, ISSN: 978-3-642-22443-0.

BibTeX

Sokratis K. Katsikas, Javier Lopez, Miguel Soriano (Ed.)

7th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2010) Proceedings

Springer, vol. 6264, 2010, ISBN: 978-3-642-15151-4.

BibTeX | Links:

Yang Xiang, Javier Lopez, Haining Wang, Wanlei Zhou (Ed.)

3rd International Conference on Network and Information Security (NSS 2009) Proceedings

IEEE Computer Sociaty, Gold Coast, Australia, 2009, ISBN: 978-07695-3838-9.

BibTeX | Links:

Dimitris Gritzalis, Javier Lopez (Ed.)

24th International Information Security Conference (IFIP-SEC 2009) Proceedings

Springer, vol. 297, 2009, ISBN: 978-3-642-01243-3.

BibTeX | Links:

Sushil Jajodia, Javier Lopez (Ed.)

13th European Symposium on Research in Computer Security (ESORICS 2008) Proceedings

Springer, vol. 5283, 2008, ISBN: 978-3-540-88312-8.

BibTeX

Jose A. Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Konstantinos Markantonakis (Ed.)

II Workshop in Information Security Theory and Practices (WISTP 2008) Proceedings

Springer Verlag, Seville, Spain, vol. 5019, 2008, ISBN: 978-3-540-79965-8.

BibTeX | Links:

Joachim Biskup, Javier Lopez (Ed.)

12th European Symposium on Research in Computer (ESORICS 2007) Proceedings

Springer, vol. 4734, 2007, ISBN: 978-3-540-74834-2.

BibTeX

Javier Lopez, Bernhard M. Hämmerli (Ed.)

2nd International Workshop on Critical Information Infrastructures Security (CRITIS 2007) Proceedings

Springer, vol. 5141, 2007, ISBN: 978-3-540-89095-9.

BibTeX | Links:

Javier Lopez, Pierangela Samarati, Josep L. Ferrer-Gomila (Ed.)

4th European Workshop on Public Key Infrastructures (EuroPKI 2007) Proceedings

Springer, vol. 4582, 2007, ISBN: 978-3-540-73407-9.

BibTeX

Panagiotis Georgiadis, Javier Lopez, Stefanos Gritzalis, Giannis F. Marias (Ed.)

3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007), 19 July 2007, Istanbul, Turkey Proceedings

IEEE Press, 2007, ISBN: 978-07695-2563-2.

BibTeX | Links:

Javier Lopez (Ed.)

1st International Workshop on Critical Information Infrastructure Security (CRITIS 2006) Proceedings

Springer, vol. 4347, 2006, ISBN: 3-540-69083-2.

BibTeX

Sokratis K. Katsikas, Javier Lopez, Michael Backes, Stefanos Gritzalis, Bart Preneel (Ed.)

9th International Information Security Conference (ISC 2006) Proceedings

Springer, vol. 4176, 2006, ISBN: 3-540-38341-7.

BibTeX

Sihan Qing, Wenbo Mao, Javier Lopez, Guilin Wang (Ed.)

7th International Conference on Information as Communication Security (ICICS 2005) Proceedings

Springer, vol. 3783, 2005, ISBN: 3-540-30934-9.

BibTeX

Jianying Zhou, Javier Lopez, Robert H. Deng, Feng Bao (Ed.)

8th International Information Security Conference (ISC 2005) Proceedings

Springer, vol. 3650, 2005, ISBN: 3-540-29001-X.

BibTeX

Sokratis K. Katsikas, Javier Lopez, Guenther Pernul (Ed.)

2nd International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2005) Proceedings

Springer, vol. 3592, 2005, ISBN: 3-540-28224-6.

BibTeX

Javier Lopez, Sihan Qing, Eiji Okamoto (Ed.)

6th International Conference on Information and Communications Security (ICICS 2004) Proceedings

Springer, vol. 3269, 2004, ISBN: 3-540-23563-9.

BibTeX

Sokratis K. Katsikas, Stefanos Gritzalis, Javier Lopez (Ed.)

1st European PKI Workshop (EuroPKI 2004) Proceedings

Springer, vol. 3093, 2004, ISBN: 3-540-22216-2.

BibTeX

Sokratis K. Katsikas, Javier Lopez, Guenther Pernul (Ed.)

1st International Conference on Trust and Privacy in Digital Business (TrustBus 2004) Proceedings

Springer, vol. 3184, 2004, ISBN: 3-540-22919-1.

BibTeX

Miguel Soriano, Javier Lopez, Forne Jordi (Ed.)

2nd Spanish Symposium on Electronic Commerce (SEC 2003) Proceedings

Fundacion Dintel, vol. 7, 2003, ISBN: 8493290203.

BibTeX

Javier Lopez, J Pastor, Jose M. Troya (Ed.)

5th Spanish Conference on Cryptology and Information Security Proceedings

1998, ISBN: 8484978206.

BibTeX