Javier López

Orcid: 0000-0001-8066-9991

Affiliations:
  • University of Málaga, Spain


According to our database1, Javier López authored at least 277 papers between 1998 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Digital twin communities: an approach for secure DT data sharing.
Int. J. Inf. Sec., February, 2025

2024
A survey on IoT trust model frameworks.
J. Supercomput., April, 2024

Towards Trustworthy Autonomous Systems: Taxonomies and Future Perspectives.
IEEE Trans. Emerg. Top. Comput., 2024

Trust interoperability in the Internet of Things.
Internet Things, 2024

Digital Twin-assisted anomaly detection for industrial scenarios.
Int. J. Crit. Infrastructure Prot., 2024

Malware similarity and a new fuzzy hash: Compound Code Block Hash (CCBHash).
Comput. Secur., 2024

2023
Private set intersection: A systematic literature review.
Comput. Sci. Rev., August, 2023

A survey on the (in)security of trusted execution environments.
Comput. Secur., June, 2023

Protecting Digital Twin Networks for 6G-enabled Industry 5.0 Ecosystems.
IEEE Netw., 2023

Current Perspectives on Securing Critical Infrastructures' Supply Chains.
IEEE Secur. Priv., 2023

Integration of MPC into Besu through an extended private transaction model.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

2022
Personal IoT Privacy Control at the Edge.
IEEE Secur. Priv., 2022

Digital Twin: A Comprehensive Survey of Security Threats.
IEEE Commun. Surv. Tutorials, 2022

Real-time Crowd Counting based on Wearable Ephemeral IDs.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Novel Approaches for the Development of Trusted IoT Entities.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Collaborative Anomaly Detection System for Charging Stations.
Proceedings of the Computer Security - ESORICS 2022, 2022

Verification and Validation Methods for a Trust-by-Design Framework for the IoT.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

2021

Digital Twins for Intelligent Authorization in the B5G-Enabled Smart Grid.
IEEE Wirel. Commun., 2021

A Blockchain Approach for Decentralized V2X (D-V2X).
IEEE Trans. Veh. Technol., 2021

Stakeholder perspectives and requirements on cybersecurity in Europe.
J. Inf. Secur. Appl., 2021

2020
Integration of a Threat Traceability Solution in the Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020

Blockchain-assisted access for federated Smart Grid domains: Coupling and features.
J. Parallel Distributed Comput., 2020

A model-driven approach to ensure trust in the IoT.
Hum. centric Comput. Inf. Sci., 2020

A Model Specification Implementation for Trust Negotiation.
Proceedings of the Network and System Security - 14th International Conference, 2020

Distributed Detection of APTs: Consensus vs. Clustering.
Proceedings of the Computer Security - ESORICS 2020, 2020

Game Theory-Based Approach for Defense Against APTs.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Covert Channels-Based Stealth Attacks in Industry 4.0.
IEEE Syst. J., 2019

Detection of Node Capture Attack in Wireless Sensor Networks.
IEEE Syst. J., 2019

Editorial: Security and Privacy in Internet of Things.
Mob. Networks Appl., 2019

Immune System for the Internet of Things Using Edge Technologies.
IEEE Internet Things J., 2019

Edge-Assisted Vehicular Networks Security.
IEEE Internet Things J., 2019

Escrowed decryption protocols for lawful interception of encrypted data.
IET Inf. Secur., 2019

Current cyber-defense trends in industrial control systems.
Comput. Secur., 2019

A model specification for the design of trust negotiations.
Comput. Secur., 2019

Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics.
Proceedings of the Computer Security - ESORICS 2019, 2019

SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications.
Proceedings of the Critical Information Infrastructures Security, 2019

A Segregated Architecture for a Trust-based Network of Internet of Things.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

Privacy-aware digital forensics.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

2018
Wireless Big Data: Technologies and Applications.
IEEE Wirel. Commun., 2018

A Resilient Architecture for the Smart Grid.
IEEE Trans. Ind. Informatics, 2018

Cyber Stealth Attacks in Critical Information Infrastructures.
IEEE Syst. J., 2018

A Cyber-Physical Systems-Based Checkpoint Model for Structural Controllability.
IEEE Syst. J., 2018

IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations.
Sensors, 2018

Feasibility of Societal Model for Securing Internet of Things.
KSII Trans. Internet Inf. Syst., 2018

Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges.
Future Gener. Comput. Syst., 2018

Security, privacy and trust of user-centric solutions.
Future Gener. Comput. Syst., 2018

A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services.
IEEE Commun. Surv. Tutorials, 2018

Evolution and Trends in IoT Security.
Computer, 2018

Modelling privacy-aware trust negotiations.
Comput. Secur., 2018

Access control for cyber-physical systems interconnected to the cloud.
Comput. Networks, 2018

A Comprehensive Methodology for Deploying IoT Honeypots.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Addressing Security in OCPP: Protection Against Man-in-the-Middle Attacks.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

A Trust-by-Design Framework for the Internet of Things.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Policy Languages and Their Suitability for Trust Negotiation.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity Theory.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Analyzing Cross-Platform Attacks: Towards a Three-Actor Approach.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
OCPP Protocol: Security Threats and Challenges.
IEEE Trans. Smart Grid, 2017

Dynamic Knowledge-Based Analysis in Nonsecure 5G Green Environments Using Contextual Data.
IEEE Syst. J., 2017

Recommender system for privacy-preserving solutions in smart metering.
Pervasive Mob. Comput., 2017

Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation.
J. Netw. Comput. Appl., 2017

Modelling trust dynamics in the Internet of Things.
Inf. Sci., 2017

Evolving privacy: From sensors to the Internet of Things.
Future Gener. Comput. Syst., 2017

Editorial: Special issue on security data science and cyber threat management.
Comput. Secur., 2017

Resilient interconnection in cyber-physical control systems.
Comput. Secur., 2017

Digital Witness and Privacy in IoT: Anonymous Witnessing Approach.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Methodology for Privacy-Aware IoT-Forensics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Modeling Malware-driven Honeypots.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

Analysis of Intrusion Detection Systems in Industrial Ecosystems.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Query Privacy in Sensing-as-a-Service Platforms.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Network Anomaly Detection in Critical Infrastructure Based on Mininet Network Simulator.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

From SMOG to Fog: A security perspective.
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017

Preventing Advanced Persistent Threats in Complex Control Networks.
Proceedings of the Computer Security - ESORICS 2017, 2017

The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Analysis of Cybersecurity Threats in Industry 4.0: The Case of Intrusion Detection.
Proceedings of the Critical Information Infrastructures Security, 2017

Cybersecurity of Wearable Devices: An Experimental Analysis and a Vulnerability Assessment Method.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
On the application of generic CCA-secure transformations to proxy re-encryption.
Secur. Commun. Networks, 2016

Digital Witness: Safeguarding Digital Evidence by Using Secure Architectures in Personal Devices.
IEEE Netw., 2016

A model-driven approach for engineering trust and reputation into software services.
J. Netw. Comput. Appl., 2016

Policy enforcement system for secure interoperable control in distributed Smart Grid systems.
J. Netw. Comput. Appl., 2016

Attacks to a proxy-mediated key agreement protocol based on symmetric encryption.
IACR Cryptol. ePrint Arch., 2016

A Parametric Family of Attack Models for Proxy Re-Encryption.
IACR Cryptol. ePrint Arch., 2016

Digital Witness: Digital Evidence Management Framework for the Internet of Things.
ERCIM News, 2016

Privacy-Aware Trust Negotiation.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control Systems.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Safeguarding Structural Controllability in Cyber-Physical Control Systems.
Proceedings of the Computer Security - ESORICS 2016, 2016

Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems.
Proceedings of the Critical Information Infrastructures Security, 2016

Location Privacy in Wireless Sensor Networks.
CRC Press / Taylor & Francis, ISBN: 9781498776332, 2016

2015
Relay selection for secure 5G green communications.
Telecommun. Syst., 2015

Probabilistic receiver-location privacy protection in wireless sensor networks.
Inf. Sci., 2015

A three-stage analysis of IDS for critical infrastructures.
Comput. Secur., 2015

Contextualising heterogeneous information in unified communications with security restrictions.
Comput. Commun., 2015

Awareness and reaction strategies for critical infrastructure protection.
Comput. Electr. Eng., 2015

NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Engineering Trust-Awareness and Self-adaptability in Services and Systems.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Guest editorial to the Special Issue on Component-Based Software Engineering and Software Architecture.
Sci. Comput. Program., 2014

Analysis and taxonomy of security/QoS tradeoff solutions for the future internet.
Secur. Commun. Networks, 2014

A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms.
Mob. Networks Appl., 2014

WASAM: A dynamic wide-area situational awareness model for critical domains in Smart Grids.
Future Gener. Comput. Syst., 2014

Building trust from context similarity measures.
Comput. Stand. Interfaces, 2014

Diagnosis mechanism for accurate monitoring in critical infrastructure protection.
Comput. Stand. Interfaces, 2014

A practical solution for sealed bid and multi-currency auctions.
Comput. Secur., 2014

Security and QoS tradeoff recommendation system (SQT-RS) for dynamic assessing CPRM-based systems.
Proceedings of the Q2SWinet'14, 2014

Preserving Receiver-Location Privacy in Wireless Sensor Networks.
Proceedings of the Information Security Practice and Experience, 2014

A Context-based Parametric Relationship Model (CPRM) to measure the Security and QoS tradeoff in configurable environments.
Proceedings of the IEEE International Conference on Communications, 2014

Delegated Access for Hadoop Clusters in the Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Privacy-Preserving Identity Management as a Service.
Proceedings of the Accountability and Security in the Cloud, 2014

2013
(Un)Suitability of Anonymous Communication Systems to WSN.
IEEE Syst. J., 2013

User-centric secure integration of personal RFID tags and sensor networks.
Secur. Commun. Networks, 2013

A framework for enabling trust requirements in social cloud applications.
Requir. Eng., 2013

Secure sealed-bid online auctions using discreet cryptographic proofs.
Math. Comput. Model., 2013

Wide-Area Situational Awareness for Critical Infrastructure Protection.
Computer, 2013

Covert communications through network configuration messages.
Comput. Secur., 2013

Smart control of operational threats in control substations.
Comput. Secur., 2013

A privacy-aware continuous authentication scheme for proximity-based access control.
Comput. Secur., 2013

On the features and challenges of security and privacy in distributed internet of things.
Comput. Networks, 2013

Preface.
Comput. Math. Appl., 2013

Security of industrial sensor network-based remote substations in the context of the Internet of Things.
Ad Hoc Networks, 2013

Towards Trust-Aware and Self-adaptive Systems.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

Location Privacy in WSNs: Solutions, Challenges, and Future Trends.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

Towards Automatic Critical Infrastructure Protection through Machine Learning.
Proceedings of the Critical Information Infrastructures Security, 2013

Towards Engineering Trust-Aware Future Internet Systems.
Proceedings of the Advanced Information Systems Engineering Workshops, 2013

2012
Overview of Critical Information Infrastructure Protection.
Proceedings of the Critical Infrastructure Protection, 2012

On the energy cost of authenticated key agreement in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2012

Preface.
J. Comput. Secur., 2012

Advanced secure multimedia services for digital homes.
Inf. Syst. Frontiers, 2012

Analysis of requirements for critical control systems.
Int. J. Crit. Infrastructure Prot., 2012

Selecting key management schemes for WSN applications.
Comput. Secur., 2012

A Conceptual Framework for Trust Models.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Building Trust and Reputation In: A Development Framework for Trust Models Implementation.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Trust & security RTD in the internet of things: opportunities for international cooperation.
Proceedings of the First International Conference on Security of Internet of Things, 2012

HIDE_DHCP: Covert Communications through Network Configuration Messages.
Proceedings of the Information Security and Privacy Research, 2012

Addressing Situational Awareness in Critical Domains of a Smart Grid.
Proceedings of the Network and System Security - 6th International Conference, 2012

Security in the Distributed Internet of Things.
Proceedings of the Trusted Systems, 4th International Conference, 2012

A Novel Key Update Protocol in Mobile Sensor Networks.
Proceedings of the Information Systems Security, 8th International Conference, 2012

A Task Ordering Approach for Automatic Trust Establishment.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN.
Proceedings of the Computer Security - ESORICS 2012, 2012

Accountability for cloud and other future Internet services.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Security and QoS Tradeoffs: Towards a FI Perspective.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Traffic Classifier for Heterogeneous and Cooperative Routing through Wireless Sensor Networks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
A cross-layer approach for integrating security mechanisms in sensor networks architectures.
Wirel. Commun. Mob. Comput., 2011

An Early Warning System Based on Reputation for Energy Control Systems.
IEEE Trans. Smart Grid, 2011

A methodology for security assurance-driven system development.
Requir. Eng., 2011

Security services architecture for Secure Mobile Grid Systems.
J. Syst. Archit., 2011

Systematic design of secure Mobile Grid systems.
J. Netw. Comput. Appl., 2011

Real-time location and inpatient care systems based on passive RFID.
J. Netw. Comput. Appl., 2011

Analysis of location privacy solutions in wireless sensor networks.
IET Commun., 2011

Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid Systems.
IEICE Trans. Inf. Syst., 2011

Special Issue: Securing Distributed Networks and Systems.
Concurr. Comput. Pract. Exp., 2011

Secure SCADA framework for the protection of energy control systems.
Concurr. Comput. Pract. Exp., 2011

Securing the Internet of Things.
Computer, 2011

Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks.
Comput. J., 2011

Key management systems for sensor networks in the context of the Internet of Things.
Comput. Electr. Eng., 2011

Secure Architecure for the Integration of RFID and Sensors in Personal Networks.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

Engineering Secure Future Internet Services.
Proceedings of the Future Internet, 2011

Managing Incidents in Smart Grids à la Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

SenseKey - Simplifying the Selection of Key Management Schemes for Sensor Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems.
IEEE Trans. Syst. Man Cybern. Part C, 2010

Editorial ESORICS 2007.
ACM Trans. Inf. Syst. Secur., 2010

Authentication and Key Establishment in Dynamic Wireless Sensor Networks.
Sensors, 2010

Developing a Secure Mobile Grid System through a UML Extension.
J. Univers. Comput. Sci., 2010

Editorial.
J. Intell. Manuf., 2010

JCS special issue on EU-funded ICT research on Trust and Security.
J. Comput. Secur., 2010

Analysis of Secure Mobile Grid Systems: A systematic approach.
Inf. Softw. Technol., 2010

A security framework for a workflow-based grid development platform.
Comput. Stand. Interfaces, 2010

Pervasive authentication and authorization infrastructures for mobile users.
Comput. Secur., 2010

Certified electronic mail: Properties revisited.
Comput. Secur., 2010

Trust management systems for wireless sensor networks: Best practices.
Comput. Commun., 2010

A scale based trust model for multi-context environments.
Comput. Math. Appl., 2010

A Study of Security Approaches for the Development of Mobile Grid Systems.
Proceedings of the ICSOFT 2010, 2010

Early Warning System for Cascading Effect Control in Energy Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2010

2009
Secure Multi-Party Non-Repudiation Protocols and Applications
Advances in Information Security 43, Springer, ISBN: 978-0-387-75629-5, 2009

Next generation wireless communications and mobile computing/networking technologies.
Wirel. Commun. Mob. Comput., 2009

Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents.
J. Univers. Comput. Sci., 2009

Integrating wireless sensor networks and the internet: a security analysis.
Internet Res., 2009

Obtaining Security Requirements for a Mobile Grid System.
Int. J. Grid High Perform. Comput., 2009

Concurrent access control for multi-user and multi-processor systems based on trust relationships.
Concurr. Comput. Pract. Exp., 2009

Editorial.
Comput. Secur., 2009

Secure multiparty payment with an intermediary entity.
Comput. Secur., 2009

Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems.
Proceedings of the Trust, 2009

Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros.
Proceedings of the XIV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2009), 2009

Reusable security use cases for mobile grid environments.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks.
Proceedings of the Foundations of Security Analysis and Design V, 2009

A Multidimensional Reputation Scheme for Identity Federations.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application.
Proceedings of the Advances in Conceptual Modeling - Challenging Perspectives, 2009

Security assurance during the software development cycle.
Proceedings of the 2009 International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2009

Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros.
Proceedings of the Memorias de la XII Conferencia Iberoamericana de Software Engineering (CIbSE 2009), 2009

2008
Enabling Attribute Delegation in Ubiquitous Environments.
Mob. Networks Appl., 2008

Fair Traceable Multi-Group Signatures.
IACR Cryptol. ePrint Arch., 2008

An Evolutionary Trust and Distrust Model.
Proceedings of the 4th International Workshop on Security and Trust Management, 2008

Multiparty nonrepudiation: A survey.
ACM Comput. Surv., 2008

Anonymity analysis in credentials-based systems: A formal framework.
Comput. Stand. Interfaces, 2008

Situation awareness mechanisms for wireless sensor networks.
IEEE Commun. Mag., 2008

A Model for Trust Metrics Analysis.
Proceedings of the Trust, 2008

An Asynchronous Node Replication Attack in Wireless Sensor Networks.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

KeyLED - transmitting sensitive data over out-of-band channels in wireless sensor networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Delegating Privileges over Finite Resources: A Quota Based Delegation Approach.
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008

Engineering Process Based on Grid Use Cases for Mobile Grid Systems.
Proceedings of the ICSOFT 2008, 2008

A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices.
Proceedings of the The Third International Conference on Availability, 2008

2007
Integration of non-repudiation services in mobile DRM scenarios.
Telecommun. Syst., 2007

A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes.
Mob. Networks Appl., 2007

An effective multi-layered defense framework against spam.
Inf. Secur. Tech. Rep., 2007

The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection.
Inf. Secur. Tech. Rep., 2007

On the deployment of a real scalable delegation service.
Inf. Secur. Tech. Rep., 2007

A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks.
Proceedings of the Third International Workshop on Security, 2007

Implementation aspects of a delegation system.
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007

Attribute delegation in ubiquitous environments.
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007

Estimation of TTP Features in Non-repudiation Service.
Proceedings of the Computational Science and Its Applications, 2007

On the Protection and Technologies of Critical Information Infrastructures.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Featuring trust and reputation management systems for constrained hardware devices.
Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, 2007

2006
Specification of a framework for the anonymous use of privileges.
Telematics Informatics, 2006

Anonymous attribute certificates based on traceable signatures.
Internet Res., 2006

Preface.
Int. J. Inf. Sec., 2006

An anti-spam scheme using pre-challenges.
Comput. Commun., 2006

A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Service-Oriented Security Architecture for CII based on Sensor Networks.
Proceedings of the Second International Workshop on Security, 2006

A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Attribute Delegation Based on Ontologies and Context Information.
Proceedings of the Communications and Multimedia Security, 2006

Applying intrusion detection systems to wireless sensor networks.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

Graphical Representation of Authorization Policies for Weighted Credentials.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
A metadata-based access control model for web services.
Internet Res., 2005

Why have public key infrastructures failed so far?
Internet Res., 2005

Optimized multi-party certified email protocols.
Inf. Manag. Comput. Security, 2005

Casual virtual private network.
Comput. Syst. Sci. Eng., 2005

Trust, privacy and security in digital business.
Comput. Syst. Sci. Eng., 2005

Editorial.
Comput. Syst. Sci. Eng., 2005

Security protocols analysis: A SDL-based approach.
Comput. Stand. Interfaces, 2005

Specification and design of advanced authentication and authorization services.
Comput. Stand. Interfaces, 2005

Protection Against Spam Using Pre-Challenges.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Trust, Privacy and Security in E-Business: Requirements and Solutions.
Proceedings of the Advances in Informatics, 2005

A Representation Model of Trust Relationships with Delegation Extensions.
Proceedings of the Trust Management, Third International Conference, 2005

Attacking an Asynchronous Multi-party Contract Signing Protocol.
Proceedings of the Progress in Cryptology, 2005

On the Security of Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2005

Classifying Public Key Certificates.
Proceedings of the Public Key Infrastructure, 2005

On Secure Profiling.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

A Novel Method to Maintain Privacy in Mobile Agent Applications.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
A framework for secure execution of software.
Int. J. Inf. Sec., 2004

PKI design based on the use of on-line certification authorities.
Int. J. Inf. Sec., 2004

Agent-mediated non-repudiation protocols.
Electron. Commer. Res. Appl., 2004

Authentication and authorization infrastructures (AAIs): a comparative survey.
Comput. Secur., 2004

Non-repudiation protocols for multiple entities.
Comput. Commun., 2004

Analysis of a Free Roaming Agent Result-Truncation Defense Scheme.
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004

A First Approach to Provide Anonymity in Attribute Certificates.
Proceedings of the Public Key Cryptography, 2004

Timeout Estimation Using a Simulation Model for Non-repudiation Protocols.
Proceedings of the Computational Science and Its Applications, 2004

Specification and formal verification of security requirements.
Proceedings of the 5th International Conference on Computer Systems and Technologies, 2004

Sorting out sorting through concretization with robotics.
Proceedings of the working conference on Advanced visual interfaces, 2004

2003
A secure solution for commercial digital libraries.
Online Inf. Rev., 2003

Analysis of e-commerce protocols: Adapting a traditional technique.
Int. J. Inf. Sec., 2003

Integrating PMI services in CORBA applications.
Comput. Stand. Interfaces, 2003

Virtual certificates and synthetic certificates: new paradigms for improving public key validation.
Comput. Commun., 2003

Intermediary Non-repudiation Protocols.
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003

A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Applying SDL to Formal Analysis of Security Systems.
Proceedings of the SDL 2003: System Design, 2003

Towards a Business Process-Driven Framework for Security Engineering with the UML.
Proceedings of the Information Security, 6th International Conference, 2003

Practical Service Charge for P2P Content Distribution.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

High-level specification of security systems.
Proceedings of the Global Telecommunications Conference, 2003

Applying the Semantic Web Layers to Access Control.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

How to Specify Security Services: A Practical Approach.
Proceedings of the Communications and Multimedia Security, 2003

2002
Verification of Authentication Protocols using SDL-method.
Proceedings of the Security in Information Systems, 2002

A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI.
Proceedings of the Information Security, 5th International Conference, 2002

Protocol Engineering Applied to Formal Analysis of Security Systems.
Proceedings of the Infrastructure Security, International Conference, 2002

Design of a VPN Software Solution Integrating TCP and UDP Services.
Proceedings of the Infrastructure Security, International Conference, 2002

Access Control Infrastructure for Digital Objects.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Secure Content Distribution for Digital Libraries.
Proceedings of the Digital Libraries: People, 2002

Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations.
Proceedings of the Electronic Government, First International Conference, 2002

XML-Based Distributed Access Control System.
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002

Message from the TrustBus Workshop Chairs.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

2001
Suitability of a Classical Analysis Method for E-commerce Protocols.
Proceedings of the Information Security, 4th International Conference, 2001

2000
Development of Secure Internet Applications for Governmental Environments.
Proceedings of the 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 2000

Distributed Storage and Revocation in Digital Certificate Databases.
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000

1999
Implementation of Virtual Private Networks at the Transport Layer.
Proceedings of the Information Security, Second International Workshop, 1999

Efficient Detection of Failure Modes in Electronic Commerce Protocols.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

Cert'eM: Certification System Based on Electronic Mail Service Structure.
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

1998
Secure Examinations through the Internet.
Proceedings of the Teleteaching '98 - Distance Learning, 1998


  Loading...