Florina Almenárez

Orcid: 0000-0002-5232-2031

Affiliations:
  • Charles III University of Madrid, Spain


According to our database1, Florina Almenárez authored at least 90 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Inferring mobile applications usage from DNS traffic.
Ad Hoc Networks, August, 2024

Machine Learning Predictors for Min-Entropy Estimation.
CoRR, 2024

Evaluating integration methods of a quantum random number generator in OpenSSL for TLS.
Comput. Networks, 2024

Integrating Post-Quantum Cryptography into CoAP and MQTT-SN Protocols.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

2023
Kriper: A blockchain network with permissioned storage.
Future Gener. Comput. Syst., 2023

Integrating an optimised PUF-based authentication scheme in OSCORE.
Ad Hoc Networks, 2023

Enhancing Intrusion Detection in IoT Communications Through ML Model Generalization With a New Dataset (IDSAI).
IEEE Access, 2023

2022
Implementing DNSSEC soft delegation for microservices.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

A Hybrid Approach to Ephemeral PKI Credentials Validation and Auditing.
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence, 2022

Enhancing the Anonymity and Auditability of Whistleblowers Protection.
Proceedings of the Blockchain and Applications, 4th International Congress, 2022

2021
Performance evaluation of CoAP and MQTT with security support for IoT environments.
Comput. Networks, 2021

A PUF-based Authentication Mechanism for OSCORE.
Proceedings of the PE-WASUN '21: Proceedings of the 18th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, Alicante, Spain, November 22, 2021

2020
INRISCO: INcident monitoRing in Smart COmmunities.
IEEE Access, 2020

Performance Evaluation of the CoAP Protocol with Security Support for IoT Environments.
Proceedings of the PE-WASUN '20, 2020

A Framework for Microservice Migration and Performance Assesment.
Proceedings of the Intelligent Environments 2020, 2020

On the Automation of Auditing in Power Grid Companies.
Proceedings of the Intelligent Environments 2020, 2020

2019
DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT.
Sensors, 2019

TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications.
IEEE Commun. Surv. Tutorials, 2019

A Framework for Efficient and Scalable Service Offloading in the Mist.
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019

"I don't see why I would ever want to use it": Analyzing the Usability of Popular Smartphone Password Managers.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
RiskLaine: A Probabilistic Approach for Assessing Risk in Certificate-Based Security.
IEEE Trans. Inf. Forensics Secur., 2018

A Study of Learning-by-Doing in MOOCs through the Integration of Third-Party External Tools: Comparison of Synchronous and Asynchronous Running Modes.
J. Univers. Comput. Sci., 2018

DNS-Based Dynamic Authentication for Microservices in IoT.
Proceedings of the 12th International Conference on Ubiquitous Computing and Ambient Intelligence, 2018

Assessment of Fitness Tracker Security: A Case of Study.
Proceedings of the 12th International Conference on Ubiquitous Computing and Ambient Intelligence, 2018

FRiCS: A Framework for Risk-driven Cloud Selection.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

2017
Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management.
IEEE J. Biomed. Health Informatics, 2017

Seamless human-device interaction in the internet of things.
IEEE Trans. Consumer Electron., 2017

2016
A distributed transcoding and content protection system - Enabling pay per quality using the cloud.
Telecommun. Syst., 2016

Secure store and forward proxy for dynamic IoT applications over M2M networks.
IEEE Trans. Consumer Electron., 2016

Comparing Password Management Software: Toward Usable and Secure Enterprise Authentication.
IT Prof., 2016

PECEVA: An adaptable and energy-saving credential validation solution for pervasive networks.
Inf. Sci., 2016

Analysis of Secure TCP/IP Profile in 61850 Based Substation Automation System for Smart Grids.
Int. J. Distributed Sens. Networks, 2016

Wi-Fi Direct: Lessons learned.
Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop, 2016

Distributed access control and privacy for the internet of me.
Proceedings of the IEEE International Conference on Consumer Electronics, 2016

Proxy re-encryption schemes for IoT and crowd sensing.
Proceedings of the IEEE International Conference on Consumer Electronics, 2016

2015
Blended Identity: Pervasive IdM for Continuous Authentication.
IEEE Secur. Priv., 2015

Enabling actor model for crowd sensing and IoT.
Proceedings of the International Symposium on Consumer Electronics, 2015

Towards a seamless human interaction in IoT.
Proceedings of the International Symposium on Consumer Electronics, 2015

P2P-based data layer for mobile Media Cloud.
Proceedings of the IEEE International Conference on Consumer Electronics, 2015

2014
To Federate or Not To Federate: A Reputation-Based Mechanism to Dynamize Cooperation in Identity Management.
Wirel. Pers. Commun., 2014

Media Gateway: bringing privacy to private multimedia cloud connections.
Telecommun. Syst., 2014

Elastic participatory sensing systems enabling cooperative meta sensors with consumer devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2014

2013
Overhead of using secure wireless communications in mobile computing.
IEEE Trans. Consumer Electron., 2013

Flexible Computing for personal electronic devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2013

How costly are secure transactions on handheld devices?
Proceedings of the IEEE International Conference on Consumer Electronics, 2013

2012
Enhancing privacy and dynamic federation in IdM for consumer cloud computing.
IEEE Trans. Consumer Electron., 2012

SuSSo: Seamless and ubiquitous single sign-on for cloud service continuity across devices.
IEEE Trans. Consumer Electron., 2012

An Event Driven Hybrid Identity Management Approach to Privacy Enhanced e-Health.
Sensors, 2012

A Metric-Based Approach to Assess Risk for "On Cloud" Federated Identity Management.
J. Netw. Syst. Manag., 2012

A distributed transcoding system for mobile video delivery.
Proceedings of the 5th Joint IFIP Wireless and Mobile Networking Conference, 2012

A model for dimensioning a secure event-driven health care system.
Proceedings of the 5th Joint IFIP Wireless and Mobile Networking Conference, 2012

Privacy enhanced cloud services home aggregator.
Proceedings of the IEEE International Conference on Consumer Electronics, 2012

Trust-aware federated IdM in consumer cloud computing.
Proceedings of the IEEE International Conference on Consumer Electronics, 2012

Multi-device Single Sign-on for cloud service continuity.
Proceedings of the IEEE International Conference on Consumer Electronics, 2012

A H.264 SVC distributed content protection system with flexible key stream generation.
Proceedings of the IEEE Second International Conference on Consumer Electronics - Berlin, 2012

Private cloud and media privacy in social networks.
Proceedings of the IEEE Second International Conference on Consumer Electronics - Berlin, 2012

2011
Media cloud: an open cloud computing middleware for content management.
IEEE Trans. Consumer Electron., 2011

Achieving IPTV service portability through delegation.
IEEE Trans. Consumer Electron., 2011

fedTV: personal networks federation for IdM in mobile DTV.
IEEE Trans. Consumer Electron., 2011

FamTV: An architecture for presence-aware personalized television.
IEEE Trans. Consumer Electron., 2011

Trust management for multimedia P2P applications in autonomic networking.
Ad Hoc Networks, 2011

A privacy aware media gateway for connecting private multimedia clouds to limited devices.
Proceedings of the 4th Joint IFIP Wireless and Mobile Networking Conference, 2011

Introducing identity management in WiMAX to enable secure and personalized services.
Proceedings of the 4th Joint IFIP Wireless and Mobile Networking Conference, 2011

2010
Social applications in the home network.
IEEE Trans. Consumer Electron., 2010

Pervasive authentication and authorization infrastructures for mobile users.
Comput. Secur., 2010

An Identity Management Infrastructure for Secure Personalized IPTV Services.
Proceedings of the Testbeds and Research Infrastructures. Development of Networks and Communities, 2010

Introducing a cross federation identity solution for converged network environments.
Proceedings of the Principles, 2010

Introducing Infocards in NGN to Enable User-Centric Identity Management.
Proceedings of the Global Communications Conference, 2010

2009
Sharing conditional access modules through the home network for pay TV access.
IEEE Trans. Consumer Electron., 2009

Interoperability of IP Multimedia Subsystems: The NetLab Approach.
Proceedings of the Wireless and Mobile Networking - Second IFIP WG 6.8 Joint Conference, 2009

A General IMS Registration Protocol for Wireless Networks Interworking.
Proceedings of the Wireless and Mobile Networking - Second IFIP WG 6.8 Joint Conference, 2009

Enabling SAML for Dynamic Identity Federation Management.
Proceedings of the Wireless and Mobile Networking - Second IFIP WG 6.8 Joint Conference, 2009

Towards dynamic trust establishment for identity federation.
Proceedings of the 2009 Euro American conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship, 2009

2008
Decoupling path failure detection from congestion control to improve SCTP failovers.
IEEE Commun. Lett., 2008

Building an Open Toolkit of Digital Certificate Validation for Mobile Web Services.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Trust Negotiation Protocol Support for Secure Mobile Network Service Deployment.
Proceedings of the Wireless and Mobile Networking, IFIP Joint Conference on Mobile and Wireless Communications Networks (MWCN'2008) and Personal Wireless Communications (PWC'2008), Toulouse, France, September 30, 2008

2007
Context awareness in network selection for dynamic environments.
Telecommun. Syst., 2007

Smart card-based agents for fair non-repudiation.
Comput. Networks, 2007

Access Control Agnostic Trust Negotiation Decision Engine.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Middleware for Secure Home Access and Control.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Enhancing access control for mobile devices with an agnostic trust negotiation decision engine.
Proceedings of the Personal Wireless Communications, 2007

2006
Secure Service Discovery based on Trust Management for ad-hoc Networks.
J. Univers. Comput. Sci., 2006

PDP: A lightweight discovery protocol for local-scope interactions in wireless ad hoc networks.
Comput. Networks, 2006

Developing a Model for Trust Management in Pervasive Devices.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

A Smart Card Solution for Access Control and Trust Management for Nomadic Users.
Proceedings of the Smart Card Research and Advanced Applications, 2006

2005
TrustAC: Trust-Based Access Control for Pervasive Devices.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

Design of an Enhanced PKI for Ubiquitous Networks.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

2004
Secure Ad-Hoc mBusiness: EnhancingWindowsCE Security.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

2003
Security, Privacy, and Health.
IEEE Pervasive Comput., 2003


  Loading...