Rafael Páez

Orcid: 0000-0003-1721-0883

According to our database1, Rafael Páez authored at least 14 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Secure Internet Voting Protocol (SIVP): A secure option for electoral processes.
J. King Saud Univ. Comput. Inf. Sci., 2022

2020
An Architecture for Biometric Electronic Identification Document System Based on Blockchain †.
Future Internet, 2020

2018
Internet Voting Protocols: An Analysis of the Cryptographic Operations per Phase.
Int. J. Commun. Networks Inf. Secur., 2018

2015
Inefficiency of IDS Static Anomaly Detectors in Real-World Networks.
Future Internet, 2015

2010
Artificial Immune Systems - AIS as Security Network Solution.
Proceedings of the Bio-Inspired Models of Network, Information, and Computing Systems, 2010

2009
Laocoonte: An agent based Intrusion Detection System.
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009

2007
WAP PKI and certification path validation.
Int. J. Internet Protoc. Technol., 2007

MAIS: Mobile Agent Integrity System - A Security System to IDS based on Autonomous Agents.
Proceedings of the SECRYPT 2007, 2007

Securing Agents against Malicious Host in an Intrusion Detection System.
Proceedings of the Critical Information Infrastructures Security, 2007

A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS.
Proceedings of the The Second International Conference on Availability, 2007

2006
Building a Virtual Hierarchy for Managing Trust Relationships in a Hybrid Architecture.
J. Comput., 2006

PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios.
Proceedings of the Critical Information Infrastructures Security, 2006

PKI Trust Relationships: from a Hybrid Architecture to a Hierarchical Model.
Proceedings of the The First International Conference on Availability, 2006

2005
Cooperative Agents and Software Fingerprinting for Security in Intrusion Detection Systems based on Autonomous Agents.
Proceedings of the IASTED International Conference on Databases and Applications, 2005


  Loading...