Arturo Ribagorda
According to our database1,
Arturo Ribagorda
authored at least 97 papers
between 1993 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
ACM Comput. Surv., 2019
2018
Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors.
Sensors, 2018
Proceedings of the Computer and Network Security Essentials., 2018
2015
IEEE Trans. Dependable Secur. Comput., 2015
2014
Extended U+F Social Network Protocol: Interoperability, reusability, data protection and indirect relationships in Web Based Social Networks.
J. Syst. Softw., 2014
IEEE Commun. Surv. Tutorials, 2014
SoNeUCON<sub>ABC</sub>, an expressive usage control model for Web-Based Social Networks.
Comput. Secur., 2014
2013
Proceedings of the Security and Privacy Preserving in Social Networks, 2013
Comput. Secur., 2013
2012
Comput. Secur., 2012
The Peer's Dilemma: A general framework to examine cooperation in pure peer-to-peer systems.
Comput. Networks, 2012
U+F Social Network Protocol: Achieving Interoperability and Reusability between Web Based Social Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012
2011
Artificial Immunity-based Correlation System.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
On the Strength of Egglue and Other Logic CAPTCHAs.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
2010
Comput. Secur., 2010
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010
Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol.
Proceedings of the Trust, 2010
Side-channel Attack on the HumanAuth CAPTCHA.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Eighth International Network Conference (INC 2010), 2010
A Simple Mechanism to Maintain Peer's Cooperativeness: The Peer's RPS Dilemma.
Proceedings of the 2010 International Conference on Internet Computing, 2010
Modeling NIDS Evasion with Genetic Programming.
Proceedings of the 2010 International Conference on Security & Management, 2010
Proceedings of the ARES 2010, 2010
2009
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification.
J. Inf. Sci. Eng., 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
On the Need to Divide the Signature Creation Environment.
Proceedings of the SECRYPT 2009, 2009
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009
Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming.
Proceedings of the Applications of Evolutionary Computing, 2009
Proceedings of the Computational Intelligence in Security for Information Systems, 2009
2008
IEEE Trans. Inf. Forensics Secur., 2008
Int. J. Knowl. Based Intell. Eng. Syst., 2008
Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions.
J. Inf. Sci. Eng., 2008
EVAWEB V2: Enhancing a Web-Based Assessment Systems Focused on Nonrepudiation Use and Teaching.
Int. J. Web Based Learn. Teach. Technol., 2008
Comput. Commun., 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
CSteg: Talking in C Code - Steganography of C Source Code in Text.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the Parallel Problem Solving from Nature, 2008
Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol.
Proceedings of the Modelling, 2008
CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies.
Proceedings of the The Third International Conference on Availability, 2008
2007
IEEE Trans. Educ., 2007
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags.
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007
Spatial-Temporal Certification Framework and Extension of X.509 Attribute Certificate Framework and SAML Standard to Support Spatial-Temporal Certificates.
Proceedings of the Public Key Infrastructure, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007
2006
Comput. Secur., 2006
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the Parallel Problem Solving from Nature, 2006
Proceedings of the Parallel Problem Solving from Nature, 2006
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Advances in Data Mining, 2006
Proceedings of the Personal Wireless Communications, 2006
Proceedings of the Genetic and Evolutionary Computation Conference, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information.
Proceedings of the Emerging Trends in Information and Communication Security, 2006
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006
2005
Int. J. Comput. Sci. Appl., 2005
Secure Electronic Payments in Heterogeneous Networking: New Authentication Protocols Approach.
Proceedings of the Computational Science and Its Applications, 2005
Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005
2004
Future Gener. Comput. Syst., 2004
Secure Communications in Multi-Agent Systems Protecting KQML.
Proceedings of the Security In Information Systems, 2004
Proceedings of the Computational Science and Its Applications, 2004
2003
Proceedings of the Computational Science and Its Applications, 2003
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003
Proceedings of the Multi-Agent Systems and Applications III, 2003
Proceedings of the 15th Conference on Advanced Information Systems Engineering (CAiSE '03), 2003
2002
Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, 2002
Proceedings of the Computational Science - ICCS 2002, 2002
A Secure Perspective of Data. Including Authentication in the NewsML DTD.
Proceedings of the IADIS International Conference WWW/Internet 2002, 2002
Proceedings of the 2002 Congress on Evolutionary Computation, 2002
2001
Cryptologia, 2001
Search Engines as a security thread.
Proceedings of WebNet 2001, 2001
Project WebOracle: Developing an advanced web server security assesment tool.
Proceedings of WebNet 2001, 2001
Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers.
Proceedings of the Cryptography and Coding, 2001
1999
Proceedings of the Security and Watermarking of Multimedia Contents, 1999
1993
Comput. Secur., 1993