Lorena González-Manzano

Orcid: 0000-0002-3490-621X

According to our database1, Lorena González-Manzano authored at least 43 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On the Feasibility of Predicting Volumes of Fake News - The Spanish Case.
IEEE Trans. Comput. Soc. Syst., August, 2024

Continuous Authentication Leveraging Matrix Profile.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
A technical characterization of APTs by leveraging public resources.
Int. J. Inf. Sec., December, 2023

Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus.
Int. J. Inf. Sec., October, 2023

KeyEncoder: A secure and usable EEG-based cryptographic key generation mechanism.
Pattern Recognit. Lett., September, 2023

Cybersecurity in the digital world.
Future Gener. Comput. Syst., July, 2023

Characterizing the MasterPrint threat on Android devices with capacitive sensors.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Eye-based keystroke prediction for natural texts - a feasibility analysis.
Proceedings of the IEEE International Conference on Trust, 2022

2021
Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review.
Sensors, 2021

SmartCAMPP - Smartphone-based continuous authentication leveraging motion sensors with privacy preservation.
Pattern Recognit. Lett., 2021

Achieving cybersecurity in blockchain-based systems: A survey.
Future Gener. Comput. Syst., 2021

Zephyrus: An Information Hiding Mechanism Leveraging Ethereum Data Fields.
IEEE Access, 2021

2020
Impact of injection attacks on sensor-based continuous authentication for smartphones.
Comput. Commun., 2020

SmartLED: Smartphone-based covert channels leveraging the notification LED.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Editorial: Security and Privacy in Internet of Things.
Mob. Networks Appl., 2019

AndrODet: An adaptive Android obfuscation detector.
Future Gener. Comput. Syst., 2019

Leveraging User-related Internet of Things for Continuous Authentication: A Survey.
ACM Comput. Surv., 2019

Design recommendations for online cybersecurity courses.
Comput. Secur., 2019

2018
Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors.
Sensors, 2018

Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things.
Future Gener. Comput. Syst., 2018

Attribute-Based Credentials for Privacy-Aware Smart Health Services in IoT-Based Smart Cities.
Computer, 2018

Real-time electrocardiogram streams for continuous authentication.
Appl. Soft Comput., 2018

Secure Elliptic Curves in Cryptography.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities.
Pers. Ubiquitous Comput., 2017

Encryption by Heart (EbH) - Using ECG for time-invariant symmetric key generation.
Future Gener. Comput. Syst., 2017

PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing.
Comput. Secur., 2017

SoNeUCON<sub>ABC</sub>Pro: An Access Control Model for Social Networks with Translucent User Provenance.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Framework for Acquiring and Analyzing Traces from Cryptographic Devices.
Proceedings of the Security and Privacy in Communication Networks, 2017

2016
Privacy Models in Wireless Sensor Networks: A Survey.
J. Sensors, 2016

PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things.
J. Netw. Comput. Appl., 2016

Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management.
IET Inf. Secur., 2016

ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments.
Proceedings of the Security and Privacy in Communication Networks, 2016

Shall We Collaborate?: A Model to Analyse the Benefits of Information Sharing.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

2015
An efficient confidentiality-preserving Proof of Ownership for deduplication.
J. Netw. Comput. Appl., 2015

Access Control for the Cloud Based on Multi-device Authentication.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Extended U+F Social Network Protocol: Interoperability, reusability, data protection and indirect relationships in Web Based Social Networks.
J. Syst. Softw., 2014

Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles.
Int. J. Distributed Sens. Networks, 2014

SoNeUCON<sub>ABC</sub>, an expressive usage control model for Web-Based Social Networks.
Comput. Secur., 2014

CooPeD: Co-owned Personal Data management.
Comput. Secur., 2014

An Architecture for Trusted PaaS Cloud Computing for Personal Data.
Proceedings of the Trusted Cloud Computing, 2014

2013
User-Managed Access Control in Web Based Social Networks.
Proceedings of the Security and Privacy Preserving in Social Networks, 2013

WEVAN - A mechanism for evidence creation and verification in VANETs.
J. Syst. Archit., 2013

2012
U+F Social Network Protocol: Achieving Interoperability and Reusability between Web Based Social Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012


  Loading...