Miguel Soriano
Orcid: 0000-0003-0457-8531
According to our database1,
Miguel Soriano
authored at least 99 papers
between 1993 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
Efficient <i>k</i>-anonymous microaggregation of multivariate numerical data via principal component analysis.
Inf. Sci., 2019
2018
Incremental k-Anonymous Microaggregation in Large-Scale Electronic Surveys With Optimized Scheduling.
IEEE Access, 2018
2017
p-Probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation.
Inf. Sci., 2017
2016
Inf. Sci., 2016
2015
Proceedings of the Advanced Research in Data Privacy, 2015
Comput. Stand. Interfaces, 2015
2014
DocCloud: A document recommender system on cloud computing with plausible deniability.
Inf. Sci., 2014
Trans. Emerg. Telecommun. Technol., 2014
2013
WiMAX-based robust localization in the presence of misbehaving and/or malicious base stations.
Comput. Electr. Eng., 2013
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
2012
Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems.
Peer-to-Peer Netw. Appl., 2012
Comput. Commun., 2012
Comput. Networks, 2012
Adv. Math. Commun., 2012
Optimizing energy-efficiency of PHY-Layer authentication in machine-to-machine networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012
2011
An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking.
Wirel. Commun. Mob. Comput., 2011
Secure Lossless Aggregation Over Fading and Shadowing Channels for Smart Grid M2M Networks.
IEEE Trans. Smart Grid, 2011
IEEE Trans. Inf. Theory, 2011
EURASIP J. Wirel. Commun. Netw., 2011
An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers.
Data Knowl. Eng., 2011
Use of turbo codes with low-rate convolutional constituent codes in fingerprinting scenarios.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Proceedings of the CogART 2011, 2011
Proceedings of the 2011 International Conference on P2P, 2011
2010
Telecommun. Syst., 2010
Comput. Secur., 2010
2009
A note on the equivalence of the traceability properties of Reed-Solomon codes for certain coalition sizes.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the Emerging Challenges for Security, 2009
2008
Proceedings of the 3rd International Conference, 2008
Proceedings of the Computer Security, 2008
Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel.
Proceedings of the Critical Information Infrastructure Security, 2008
2007
Online Inf. Rev., 2007
Tracing illegal redistribution using errors-anderasures and side information decoding algorithms.
IET Inf. Secur., 2007
MAIS: Mobile Agent Integrity System - A Security System to IDS based on Autonomous Agents.
Proceedings of the SECRYPT 2007, 2007
Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Information Theoretic Security - Second International Conference, 2007
Proceedings of the Information Security and Cryptology, 2007
Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm.
Proceedings of the Computational Science and Its Applications, 2007
Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007
Proceedings of the Critical Information Infrastructures Security, 2007
Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms.
Proceedings of the The Second International Conference on Availability, 2007
2006
New Gener. Comput., 2006
Int. J. Bus. Data Commun. Netw., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques.
Proceedings of the SECRYPT 2006, 2006
Proceedings of the Computational Science and Its Applications, 2006
Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks.
Proceedings of the The First International Conference on Availability, 2006
2005
Development of a platform offering video copyright protection and security against illegal distribution.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the 6th ACIS International Conference on Software Engineering, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Proceedings of the Trust Management, Third International Conference, 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Information Hiding, 7th International Workshop, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005
2004
IEEE Trans. Signal Process., 2004
Int. J. Inf. Sec., 2004
Proceedings of the Mobility Aware Technologies and Applications, 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Computational Science, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
Proceedings of the Public Key Infrastructure, 2004
2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Interactive Multimedia on Next Generation Networks, 2003
Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
A protocol for detecting malicious hosts based on limiting the execution time of mobile agents.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Proceedings of the Web Engineering, International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003
Proceedings of the Applied Cryptography and Network Security, 2003
2002
IEEE Commun. Mag., 2002
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
Proceedings of the First European Conference on Colour in Graphics, Imaging, and Vision, 2002
1998
1995
Proceedings of the 6th IEEE International Symposium on Personal, 1995
1993
IEEE J. Sel. Areas Commun., 1993
Proceedings of the 18th Conference on Local Computer Networks, 1993
Proceedings of the CCS '93, 1993