Rodrigo Roman
Orcid: 0000-0002-4099-1422
According to our database1,
Rodrigo Roman
authored at least 71 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 11th International Conference on Internet of Things: Systems, 2024
Proceedings of the 19th Asia Joint Conference on Information Security, 2024
2023
Comput. Secur., June, 2023
IEEE Secur. Priv., 2023
2022
2021
Guest Editorial Introduction of the Special Issue on Edge Intelligence for Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021
2020
IEEE Trans. Ind. Informatics, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
IEEE Internet Things J., 2019
2018
KSII Trans. Internet Inf. Syst., 2018
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges.
Future Gener. Comput. Syst., 2018
Tracking Advanced Persistent Threats in Critical Infrastructures Through Opinion Dynamics.
Proceedings of the Computer Security, 2018
2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017
Proceedings of the Critical Information Infrastructures Security, 2017
2016
Digital Witness: Safeguarding Digital Evidence by Using Secure Architectures in Personal Devices.
IEEE Netw., 2016
ERCIM News, 2016
2014
2013
Secur. Commun. Networks, 2013
Int. J. Commun. Syst., 2013
IEEE Commun. Surv. Tutorials, 2013
On the features and challenges of security and privacy in distributed internet of things.
Comput. Networks, 2013
Security of industrial sensor network-based remote substations in the context of the Internet of Things.
Ad Hoc Networks, 2013
2012
Wirel. Commun. Mob. Comput., 2012
Trust & security RTD in the internet of things: opportunities for international cooperation.
Proceedings of the First International Conference on Security of Internet of Things, 2012
Proceedings of the Trusted Systems, 4th International Conference, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
2011
A cross-layer approach for integrating security mechanisms in sensor networks architectures.
Wirel. Commun. Mob. Comput., 2011
J. Netw. Comput. Appl., 2011
Concurr. Comput. Pract. Exp., 2011
Comput. Electr. Eng., 2011
Proceedings of the Security and Trust Management - 7th International Workshop, 2011
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010
Comput. Commun., 2010
2009
Internet Res., 2009
Proceedings of the Trust, 2009
Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks.
Proceedings of the Foundations of Security Analysis and Design V, 2009
2008
KeyLED - transmitting sensitive data over out-of-band channels in wireless sensor networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
Telecommun. Syst., 2007
A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes.
Mob. Networks Appl., 2007
Inf. Secur. Tech. Rep., 2007
The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection.
Inf. Secur. Tech. Rep., 2007
A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks.
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the Foundations of Security Analysis and Design IV, 2007
Proceedings of the Public Key Infrastructure, 2007
Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, 2007
2006
Proceedings of the Second International Workshop on Security, 2006
Proceedings of the Critical Information Infrastructures Security, 2006
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006
2005
Casual virtual private network.
Comput. Syst. Sci. Eng., 2005
Protection Against Spam Using Pre-Challenges.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the Computational Science and Its Applications, 2005
2002
Proceedings of the Infrastructure Security, International Conference, 2002