Juan Hernández-Serrano

Orcid: 0000-0001-5225-7404

According to our database1, Juan Hernández-Serrano authored at least 32 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DA2Wa: A secure pairing protocol between a DApp and a wallet for the blockchain scenario.
Comput. Commun., 2024

2023
A stochastic simplicial SIS model for complex networks.
Commun. Nonlinear Sci. Numer. Simul., June, 2023

2022
Data Marketplaces with a Free Sampling Service.
Proceedings of the IEEE International Conference on Services Computing, 2022

2018
Privacy risk analysis in the IoT domain.
Proceedings of the 2018 Global Internet of Things Summit, 2018

2016
Providing k-anonymity and revocation in ubiquitous VANETs.
Ad Hoc Networks, 2016

On the Road to Secure and Privacy-Preserving IoT Ecosystems.
Proceedings of the Interoperability and Open-Source Solutions for the Internet of Things, 2016

2015
Managing Privacy in the Internet of Things: DocCloud, a Use Case.
Proceedings of the Advanced Research in Data Privacy, 2015

A Cognitive-Radio-Based Method for Improving Availability in Body Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

2014
DocCloud: A document recommender system on cloud computing with plausible deniability.
Inf. Sci., 2014

Reconciling privacy and efficient utility management in smart cities.
Trans. Emerg. Telecommun. Technol., 2014

2013
Low-cost group rekeying for unattended wireless sensor networks.
Wirel. Networks, 2013

COACH: COllaborative certificate stAtus CHecking mechanism for VANETs.
J. Netw. Comput. Appl., 2013

Energy-efficient physical layer packet authenticator for machine-to-machine networks.
Trans. Emerg. Telecommun. Technol., 2013

WiMAX-based robust localization in the presence of misbehaving and/or malicious base stations.
Comput. Electr. Eng., 2013

The TAMESIS Project: Enabling Technologies for the Health Status Monitoring and Secure Exchange of Clinical Record.
Proceedings of the Seventh International Conference on Complex, 2013

2012
A Modeling of Certificate Revocation and Its Application to Synthesis of Revocation Traces.
IEEE Trans. Inf. Forensics Secur., 2012

Design of a P2P content recommendation system using affinity networks.
Comput. Commun., 2012

Cooperative detection of primary user emulation attacks in CRNs.
Comput. Networks, 2012

Optimizing energy-efficiency of PHY-Layer authentication in machine-to-machine networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

2011
Secure Lossless Aggregation Over Fading and Shadowing Channels for Smart Grid M2M Networks.
IEEE Trans. Smart Grid, 2011

Modeling the Lion Attack in Cognitive Radio Networks.
EURASIP J. Wirel. Commun. Netw., 2011

Towards a Cooperative Intrusion Detection System for Cognitive Radio Networks.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

Low-Power Low-Rate Goes Long-Range: The Case for Secure and Cooperative Machine-to-Machine Communications.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

Robust detection of primary user emulation attacks in IEEE 802.22 networks.
Proceedings of the CogART 2011, 2011

2010
Securing cognitive radio networks.
Int. J. Commun. Syst., 2010

2008
Shared Self-Organized GKM Protocol for MANETs.
J. Inf. Sci. Eng., 2008

SCFS: Towards Design and Implementation of a Secure Distributed Filesystem.
Proceedings of the SECRYPT 2008, 2008

2007
Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks.
Comput. Commun., 2007

Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm.
Proceedings of the Computational Science and Its Applications, 2007

2006
Building Hierarchical Public Key Infrastructures in Mobile Ad-Hoc Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

2005
Energy Efficiency of Load Balancing in MANET Routing Protocols.
Proceedings of the 6th ACIS International Conference on Software Engineering, 2005

Multimedia Copyright Protection Platform Demonstrator.
Proceedings of the Trust Management, Third International Conference, 2005


  Loading...