Rolando Trujillo-Rasua
Orcid: 0000-0002-8714-4626Affiliations:
- Deakin University, VIC, Australia
- University of Luxembourg (former)
- Universitat Rovira i Virgili, Catalonia, Spain (former)
- University of Havana, Cuba (former)
According to our database1,
Rolando Trujillo-Rasua
authored at least 56 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on wwwde.uni.lu
On csauthors.net:
Bibliography
2024
Quantum Inf. Process., June, 2024
CoRR, 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
2023
On the optimal resistance against mafia and distance fraud in distance-bounding protocols.
Comput. Commun., October, 2023
ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
2022
Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation.
Knowl. Inf. Syst., 2022
Int. J. Crit. Infrastructure Prot., 2022
Appl. Math. Comput., 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
2021
J. Inf. Secur. Appl., 2021
2020
Decis. Support Syst., 2020
ACM Comput. Surv., 2020
Comput. Secur., 2020
2019
Knowl. Inf. Syst., 2019
Chunked Lectures: A new model for conducting online lectures within Information Technology higher education.
CoRR, 2019
Appl. Math. Comput., 2019
Proceedings of the 29th International Telecommunication Networks and Applications Conference, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Trans. Data Priv., 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Computer Security, 2018
2017
Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph.
Fundam. Informaticae, 2017
Rethinking (k, 𝓁)-anonymity in social graphs: (k, 𝓁)-adjacency anonymity and (k, 𝓁)-(adjacency) anonymous transformations.
CoRR, 2017
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
Proceedings of the Graphical Models for Security - 4th International Workshop, 2017
2016
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Radio Frequency Identification and IoT Security, 2016
Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0.
Proceedings of the Quantitative Evaluation of Systems - 13th International Conference, 2016
Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study.
Proceedings of the Practice of Enterprise Modeling, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
2015
Proceedings of the Advanced Research in Data Privacy, 2015
Comparing distance bounding protocols: A critical mission supported by decision theory.
Comput. Commun., 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
2014
IEEE Trans. Wirel. Commun., 2014
CoRR, 2014
2013
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013
2012
Inf. Sci., 2012
Predictive protocol for the scalable identification of RFID tags through collaborative readers.
Comput. Ind., 2012
2011
Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers.
Comput. Networks, 2011
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011
A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011
2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2010
2008
Proceedings of the Ant Colony Optimization and Swarm Intelligence, 2008