[UC3M Security Lab]

Home | People | Research | Projects | Publications | Activities | Seminars | Teaching | BSCW | On media


Publications

Getting a paper

Here you can get a copy of most papers published by members of the lab while working here or elsewhere. Please feel free to contact the authors by email if you would like a copy of any paper not currently available for download.

Copyright notice


Papers by year

    2016
    2015
    2014
    2013
    2012
    2011
    2010
    2009
    2008
    2007
    2006
    2005
    2004
    2003 and before


Other documents

    PhD Theses


2016

  1. A. Calleja, J.E. Tapiador, J. Caballero A Look into 30 Years of Malware Development from a Software Metrics Perspective. 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2016),Paris, France. (2016).

  2. R. Garrido-Pelaz, L González-Manzano, S Pastrana. Shall We Collaborate?: A Model to Analyse the Benefits of Information Sharing. Proceedings of the 2016 ACM Workshop on Information Sharing and Collaborative Security (WISCS). (2016).

  3. J.M. de Fuentes, L. González-Manzano, O. Mirzaei. Privacy models in Wireless Sensor Networks - A survey. Journal of Sensors. (2016).

  4. L. González-Manzano, J.M. de Fuentes, K.-K. R. Choo. ase-PoW: a Proof of Ownership mechanism for cloud deduplication in hierarchical environments. 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm). (2016).

  5. L. González-Manzano, J.M. de Fuentes, S. Pastrana, P. Peris, L. Hernandez. PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things. Journal of Network and Computer Applications. (2016).

  6. S. Pastrana, J. Rodriguez-Canseco, A. Calleja. ArduWorm: A Functional Malware Targeting Arduino Devices. Jornadas Nacionales de Investigacion en Ciberseguridad 2016, Granada, Spain.Best Paper Award (2016).

  7. Ana I. González-Tablas, Juan E. Tapiador. Bootstrapping Security Policies for Wearable Apps Using Attributed Structural Graphs. Sensors 16.5, 674. (2016).

  8. Ana I. González-Tablas. Analysis of the alignment of Spanish Master's programs to US National Cybersecurity Workforce Framework. Jornadas Nacionales de Investigacion en Ciberseguridad 2016, Granada, Spain. (2016).


2015

  1. A. Calleja, P. Peris-Lopez, J.E. Tapiador Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols. WISTP 2015, LNCS 9311:36-51. Springer-Verlag. (2015).

  2. C. Camara, P. Peris-Lopez, J.E. Tapiador, G. Suarez-Tangil. Non-invasive Multi-modal Human Identification System Combining ECG, GSR, and Airflow Biosignals. Journal of Medical and Biological Engineering, 35(6), 735-748.. (2015).

  3. C. Camara, P. Peris-Lopez, J.E. Tapiador. Human Identification Using Compressed ECG Signals. Journal of medical systems, 39(11), 1-10.. (2015).

  4. M. Nejati, M. Kargozar, O. Mirzaei, V. Chahkandi Analysis of an Asymmetric Cryptosystem based on Boolean Matrices and Permutations. International Congress on Technology, Communication and Knowledge (ICTCK), Mashhad, Iran. (2015).

  5. L. González-Manzano, J.M. de Fuentes, A. Orfila. Access control for the Cloud based on multi-device authentication. IEEE 14th International Conference on Trust, Security and Privacy in Computing and Communications. (2015)

  6. E. Palomar, L. González-Manzano, A. Alcaide, A. Galán. Implementing a Privacy-enhanced ABC System for Online Social Networks with Co-Ownership Management. IET Information Security. In Press (2015)

  7. C. Cámara-Nuñez, P. Peris-Lopez, J.E. Tapiador. Security and privacy issues in implantable medical devices: A comprehensive survey. Biomedical Informatics. (2015) [doi]

  8. G. Suarez-Tangil, J.E. Tapiador, P. Peris-Lopez, S. Pastrana. Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation. Pervasive and Mobile Computing. Elsevier. 18:137-151 (2015) [doi]

  9. G. Suarez-Tangil, E. Palomar, A. Ribagorda, I. Sanz. Providing SIEM Systems with Self-Adaptation. Information Fussion Elsevier, 2015. [doi]

  10. J. Blasco, J.E. Tapiador, P. Peris-Lopez, G. Suarez-Tangil. Hindering Data Theft with Encrypted Data Trees. Journal of Systems and Software. Elsevier, 2015. [pdf]

  11. S. Pastrana, A. Orfila, J.E. Tapiador, P. Peris-Lopez. DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks. Computer Networks. 80:66-88 (2015) [pdf] [doi]

  12. L. González-Manzano, A. Orfila. An efficient confidentiality-preserving Proof of Ownership for Deduplication. Journal of Network and Computer Applications. In Press. (2015) [pdf]

  13. J.M. de Fuentes, P. Peris-Lopez, J.E. Tapiador, S. Pastrana. Probabilistic Yoking Proofs For Large Scale IoT Systems. Ad Hoc Networks. In Press. (2015) [pdf] [doi]


2014

  1. Guillermo Suarez-Tangil; Juan E. Tapiador; Pedro Peris-Lopez. Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps. The 10th China International Conference on Information Security and Cryptology. INSCRYPT 2014. Beijing, China. December 2014. [pdf]

  2. Guillermo Suarez-Tangil; Mauro Conti; Juan E. Tapiador; Pedro Peris-Lopez. Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models. European Symposium on Research in Computer Security. ESORICS 2014. Wroclaw, Poland. September 2014. [pdf]

  3. P. Picazo, J.E. Tapiador, P. Peris-Lopez, G. Suarez-Tangil Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks. Sensors. Elsevier, 14:12, pp. 22619-22642 (2014). [pdf] [doi]

  4. G. Suarez-Tangil, F. Lombardi, J.E. Tapiador, R.D. Pietro. Thwarting Obfuscated Malware via Differential Fault Analysis. Mobile App Security. IEEE Computer, vol. 47:6, pp. 24-31 (2014). I.F. (2012): 1,675 (Q1). [web].

  5. G. Suarez-Tangil, J.E. Tapiador, P. Peris-Lopez, A. Ribagorda. Evolution, Detection and Analysis of Malware in Smart Devices. IEEE Communications Surveys & Tutorials. 2014. [pdf]

  6. A. Alcaide, E. Palomar, J.M. de Fuentes, L. Gonzalez-Manzano. A Privacy-aware Average Speed Monitoring System for VANETs. IET Intelligent Transport Systems. In Press. (2014)

  7. S. Pastrana, C. Torrano-Gimenez, H. Than Nguyen, A. Orfila. Anomalous Web Payload Detection: Evaluating the Resilience of 1-gram Based Classifiers. Proceedings of the VIII Conference on Intelligent Distributed Computing (IDC) . pp 195-201. Madrid, Spain. September 2014. [pdf]

  8. L. González-Manzano, Ana I. González-Tablas, J. M de Fuentes, A. Ribagorda CooPeD: Co-owned Personal Data Management. International Journal of Computers & Security. 2014. [pdf] [doi]

  9. L. González-Manzano, Ana I. González-Tablas, J. M de Fuentes, A. Ribagorda SoNeUCON_ADM: the administrative model for SoNeUCON_ABC. XII Reunión Espanola sobre Criptología y Seguridad de la Información RECSI (2014).

  10. L. González-Manzano, Ana I. González-Tablas, J. M de Fuentes, A. Ribagorda Extended U+F Social Network Protocol: Interoperability, reusability, data protection and indirect relationships in Web Based Social Networks. International Journal of Systems and Software. 2014. [pdf] [doi]

  11. L. González-Manzano, B. Brost, M.Aumuller An architecture for trusted PaaS cloud computing for personal data. Ergebnisse der Trusted Cloud Initiative, Springer Verlang. In press 2014. [pdf]

  12. L. González-Manzano, Ana I. González-Tablas, J. M de Fuentes, A. Ribagorda SoNeUCON_ABC, an expressive usage control model for Web-Based Social Networks. International Journal of Computers & Security. 2014. [pdf] [doi]

  13. G. Suarez-Tangil, J.E. Tapiador, P. Peris-Lopez, J. Blasco. Dendroid: A Text Mining Approach to Analyzing and Classifying Code Structures in Android Malware Families. Expert Systems With Applications. Elsevier vol. 41:4, pp. 1104-1117 (2014) [doi] [pdf] [bib]

  14. S. Pastrana, A. Orfila, J. E. Tapiador, P. Peris-Lopez. Randomized Anagram Revisited Journal of Network and Computer Applications. 41:182-196 (2014) [doi] [pdf]

  15. J. M de Fuentes, J. Blasco, Ana I. González-Tablas, L. González-Manzano. Applying information hiding in VANETs to covertly report misbehaving vehicles. International Journal of Distributed Sensor Networks. In press 2014. [pdf]


2013

  1. Jorge López Ardieta; Juan E. Tapiador; Guillermo Suarez-Tangil. Information Sharing Models for Cooperative Cyber Defence. In International Conference on Cyber Conflict.. NATO Cooperative Cyber Defence Centre of Excellence Publications. Tallin, Estonia. May 2013. [pdf]

  2. J. M de Fuentes, L. González-Manzano, Ana I. González-Tablas, J. Blasco Security models in vehicular ad-hoc networks: a survey. IETE Technical review. 2013. [pdf]

  3. J. M de Fuentes, Ana I. González-Tablas, L. González-Manzano, J. Blasco WEVAN - Wireless-based Evidence generation and verification in Vehicular Ad-hoc Networks. Journal of Systems Architecture. 2013. [doi]

  4. J. M de Fuentes, L. González-Manzano, Ana I. González-Tablas, B. Ramos El proyecto E-SAVE: asegurando las comunicaciones vehiculares para la mejora de la seguridad vial. VII Congreso Iberoamericano en Seguridad Informática (CIBSI). October 2013.

  5. L. González-Manzano, A. I. González-Tablas, J. M de Fuentes, A. Ribagorda Seguridad en Redes Sociales: problemas, tendencias y retos futuros. VII Congreso Iberoamericano en Seguridad Informática (CIBSI). October 2013.

  6. L. González-Manzano, A. I. González-Tablas, J. M de Fuentes, A. Ribagorda User-Managed Access Control in Web Based Social Networks. Security and Privacy Preserving in Social Networks Chapter, Springer, In press (2013). [pdf] [doi]

  7. A. I. González-Tablas Ferreres, A. Alcaide, J. M. de Fuentes, J. Montero. Privacy-preserving and Accountable On-the-road Prosecution of Invalid Vehicular Mandatory Authorizations. In press (2013).

  8. A. Alcaide, E. Palomar, J. Montero, A. Ribagorda. Anonymous Authentication for Privacy-preserving IoT Target-driven Applications. Computers and Security Journal In press (2013).

  9. S. Pastrana, J. Montero, A. Orfila. Evading IDS and Firewalls as Fundamental Sources of Information in SIEMS. Advances in Security Information Management: perceptions and outcomes pp. 157-180 (2013). [isbn] [pdf]

  10. G. Suarez-Tangil, E. Palomar, A. Ribagorda, Y. Zhang. Towards an Intelligent Security Event Information Management System . Advances in Security Information Management: perceptions and outcomes pp. 239-258 (2013). [isbn] [pdf]


2012

  1. R. Vega, A. Alcaide, G. Suarez-Tangil, A. Ribagorda. A Semantic Crawler: Olympic Women. 7 Conferencia Ibérica de Sistemas y Tecnologías de Información CISTI (2012). [doi]

  2. M. Safkhani, P. Peris, N. Bagheri, M. Naderi, J.C. Hernandez. On the Security of Tan et al. Serverless RFID Authentication and Search Protocols. 8th Workshop on RFID Security and Privacy 2012 pp. 1-19(2012). [doi] [pdf]

  3. M. Safkhani, N. Bagheri, P. Peris, A. Mitrokotsa. On the Traceability of Tags in SUAP RFID Authentication Protocols. 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA) (2012). [doi] [pdf]

  4. P. Peris, M. Safkhani, N. Bagheri, A. Mitrokotsa, J.C. Hernandez. Weaknesses in Another Gen2-based RFID Authentication Protocol. 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA) (2012). [doi]

  5. J.C. Hernandez, P. Peris, M. Safkhani, N. Bagheri, M. Naderi. Yet Another Fallen Hash-based RFID Authentication Protocol. Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems: 6th IFIP WG 11.2 International Workshop, SPRINGER (2012). [doi]

  6. L. Gonzalez-Manzano, A.I Gonzalez-Tablas, J.M De Fuentes, A. Ribagorda. U+F Social Network Protocol: Achieving Interoperability and Reusability between Web based Social Networks. IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) pp. 1387-1392(2012). [doi]

  7. C. Camara, P. Peris, B. Ramos. La seguridad de manana: seguridad en IMDs. XII Reunión Espanola sobre Criptología y Seguridad de la Información RECSI (2012). [pdf]

  8. L. Gonzalez-Manzano, A.I Gonzalez-Tablas, J.M De Fuentes, B. Ramos. Control de acceso en redes sociales web. XII Reunión Espanola sobre Criptología y Seguridad de la Información RECSI (2012). [pdf]

  9. E. Palomar, A. Alcaide, A. Ribagorda, Y. zhang. The Peer's Dilemma: A general framework to examine cooperation in pure peer-to-peer systems. Computer networks 56(17):3756-3766(2012). [doi]

  10. J. Lopez, A.I Gonzalez-Tablas, J.M De Fuentes, B. Ramos. A taxonomy and survey of attacks on digital signatures . Computers and security 67-112(2012). [doi]

  11. J.M De Fuentes, A.I Gonzalez-Tablas, J.Lopez, A. Ribagorda. Towards an automatic enforcement for speeding: enhanced model and intelligent transportation systems realisation. IET intelligent transport systems 6:270-281(2012). [doi] [pdf]

  12. J.M. Estevez, J.C. Hernandez, P. Peris. Online Randomization Strategies to Obfuscate User Behavioral Patterns. Journal of Network and Systems Management 20(4):561-578(2012). [doi] [pdf]

  13. D.F. Barrero, J.C. Hernandez, P. Peris, D. Camacho, M.D. Rodriguez. A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol. Expert systems (2012). [doi]

  14. S. Pastrana, A. Mitrokotsa, A. Orfila, P. Peris. Evaluation of Classification Algorithms for Intrusion Detection in MANETs. Knowledge Based Systems. 36:217-225, 2012. [doi] [pdf]

  15. J. Blasco, J.C. Hernandez-Castro, J.E. Tapiador, A. Ribagorda. Bypassing information leakage protection with trusted applications. Computers & Security. 31(4):557-568, 2012. [doi] [pdf]

  16. J.C. Hernandez-Castro, J.E. Tapiador, P. Peris, J.A. Clark, E.-G Talbi. Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. Int. J. Foundations of Computer Science. 23(2):543-553, 2012.

  17. J.A. Clark, J.E. Tapiador, J. McDermid, P.-C. Cheng, D. Agrawal, N. Ivanic, D. Sloggett. Modelling Uncertain and Time-dependent Security Labels in MLS Systems. E-business and Telecommunications - Revised selected papers from SECRYPT 2010, CCIS 222:158-171.

  18. J. Blasco, J. C. Hernandez-Castro, J. M. de Fuentes, B. Ramos. A framework for avoiding steganography usage over HTTP. Journal of Network and Computer Applications 35(1):491-501, 2012. [doi] [pdf]

  19. J.M. de Fuentes, A.I. Gonzalez-Tablas, L. Gonzalez-Manzano, A. Ribagorda. Diseño de un protocolo para el envío de notificaciones de denuncias por hechos de circulación al vehículo a través de tecnologías ITS. Congreso Español de Sistemas Inteligentes de Transporte (ITS) 2012.

  20. A.I. Gonzalez-Tablas, J.M. de Fuentes, A. Alcaide, A. Ribagorda. Proyectos E-SAVE y PRECIOUS sobre la aplicación de tecnologías ITS para la supervisión del cumplimiento de normas. Congreso Español de Sistemas Inteligentes de Transporte (ITS) 2012. [pdf]

  21. E. Palomar, J. de Fuentes, A.I. Gonzalez-Tablas, A. Alcaide. Hindering False Event Dissemination in VANETs with Proof-of-Work Mechanisms. Transportation Research Part C, 23:85-97, 2012 [doi] [pdf]

  22. F. Le Fessant, A. Papadimitriou, A. Carneiro Viana, C. Sengul, E. Palomar. A Sinkhole Resilient Protocol for Wireless Sensor Networks: Performance and Security Analysis. Computer Communications 35(2):234-248, 2012. [doi]

  23. P. Peris-Lopez, A. Orfila, E. Palomar, J. C. Hernandez-Castro. A Secure Distance-based RFID Identification Protocol with an Off-line Back-end Database. Personal and Ubiquitous Computing 16(3):351-365. Springer London, 2012. [doi] [pdf]


2011

  1. M. Safkhani, P. Peris, J.C. Hernandez, N. Bagheri, M. Naderi. Cryptanalysis of Cho et al.'s Protocol: A Hash-Based RFID Tag Mutual Authentication Protocol. International Conference on Applied and Computational Mathematics (ICACM) (2012). [pdf]

  2. H. Martin, P. Peris, E. San Millan, L.A. Entrena ATOM: A Pseudorandom Number Generator Suitable for RFID Protocols. XXVI Design of Circuits and Integrated Systems DCIS (2011). [doi] [pdf]

  3. J. C. Hernandez, P. Peris, J.P. Aumasson On the Key Schedule Strength of PRESENT. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011. Revised Selected Papers, SPRINGER pp. 253-263 (2011). [doi] [pdf]

  4. G. Suarez-Tangil, A. Ribagorda, S. Pastrana, E. Palomar Artificial Immunity-based Correlation System. International Conference on Security and Cryptography. SECRYPT 2011 pp. 379-382 (2011). [doi] [pdf]

  5. A. alcaide, E. Palomar, I. Barroso, A.E. Abdallah Privacy-Enhancing Cryptography-based Materials. International Conference on Security and Cryptography. SECRYPT 2011 pp. 379-382 (2011).

  6. A. alcaide, J. Blasco, E. Galan, A. Orfila Cross-Site Scripting: An Overview. Innovations in SMEs and Conducting E-Business: Technologies, Trends and Solutions pp. 61-75 (2011).

  7. J.E. Tapiador, J.A. Clark. Masquerade Mimicry Attack Detection: A Randomized Approach. Computers & Security 30:297-310 (2011). [doi] [pdf]

  8. P. Peris, J.C. Hernandez-Castro, J.E. Tapiador, J.C.A. van der Lubbe. Cryptanalysis of an EPC Class-1 Generation-2 Standard Compliant Authentication Protocol. Engineering Applications of Artificial Intelligence 24(6):1061-1069 (2011). [doi] [pdf]

  9. J.E. Tapiador, M. Srivatsa, J.A. Clark, J.A. McDermid. Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing. WCNS 2011, LNCS 6827:207-218. [pdf]

  10. J. Montero-Castillo, E. Palomar. Cooperation in Ad Hoc Network Security Services - Classification and Survey. UBICOMM 2011, pp. 175-179. [pdf]

  11. S. Pastrana, A. Orfila, A. Ribagorda. A functional framework to evade Network IDS. HICSS 44: Hawaii International Conference on Systems Sciences, 2011. [doi] [pdf]

  12. G. Suarez-Tangil, E. Palomar, S. Pastrana, A. Ribagorda. Artificial Immunity-based Correlation System. SECRYPT 2011, pp. 79. [doi] [pdf]

  13. H. Gascon, A. Orfila, J. Blasco. Analysis of Update Delays in Signature-based Network Intrusion Detection Systems. Computers & Security, 30(8): 613-624 (2011). [doi] [pdf]

  14. A. Ribagorda. Aspectos técnicos de seguridad en la Ley 11/2007 y su Reglamento de desarrollo parcial. Administración electrónica y ciudadanos. Cívitas. Thomson Reuters. España. 2011, pp. 718-742.

  15. M. Naser, P. Peris-Lopez, R. Budiarto, B. Ramos Alvarez. A Note on the Security of PAP. Computer Communications 34(18):2248-2249 (2011). [doi] [pdf]

  16. P. Peris-Lopez, A. Orfila, J. C. Hernandez-Castro, J. C. A. van der Lubbe. Flaws on RFID Grouping-Proofs. Guidelines for Future Sound Protocols. Journal of Network and Computer Applications 34:833-845 (2011). [doi] [pdf]

  17. P. Peris-Lopez, A. Orfila, A. Mitrokotsa, J.C.A. van der Lubbe. A Comprehensive RFID Solution to Enhance Inpatient Medication Safety. International Journal of Medical Informatics 80(1):13-24 (2011). [doi] [pdf]

  18. Julio C. Hernandez-Castro, Pedro Peris-Lopez, Jean-Philippe Aumasson. On the key schedule strength of PRESENT. SETOP 2011. [pdf]

  19. J.-P. Aumasson, A. Mitrokotsa, Pedro Peris-Lopez. A Note on a Privacy-Preserving Distance Bounding Protocol. ICICS 2011, volume 7043 of LNCS, pp. 78-98. [doi] [pdf]

  20. M. Merhi, J. C. Hernandez-Castro, and P. Peris-Lopez. Studying the Pseudo Random Number Generator of a Low-cost RFID Tag. RFID-TA 2011, pp. 381-385. [doi] [pdf]

  21. H. Martin, E. San Millan, L. Entrena, P. Peris-Lopez, J. Cesar Hernandez-Castro. AKARI-X: a Pseudorandom Number Generator for Secure Lightweight Systems. IOLTS 2011, pp. 228-233. [doi] [pdf]

  22. A. Mitrokotsa, M. Beye and P. Peris-Lopez. Threats to Networked RFID Systems.. Book Chapter in Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID Networks, 3:39-68 (2011).

  23. J.M. de Fuentes, A.I. Gonzalez-Tablas, A. Ribagorda. Overview of security issues in Vehicular Ad-hoc Networks. Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts, 2011. [pdf]

  24. J. Munera, J.M. de Fuentes, A.I. Gonzalez-Tablas. Towards a comparable evaluation for VANET protocols: NS-2 experiments builder assistant and extensible test bed. Embedded Security in Cars Conference (ESCAR) 2011. [pdf]

  25. J.L. Hernandez-Ardieta, D. Vara Cuesta. Harmonizing Common Criteria and Formal Risk Analysis Methodologies: Security Target Construction through Risk Analysis. 12th International Common Criteria Conference, 2011.

  26. A.I. Gonzalez-Tablas, A. Alcaide, G. Suarez-Tangil, J. M. de Fuentes, I. Barroso-Perez. Towards a privacy-respectful telematic verification system for vehicle & driver authorizations (Poster). Eighth Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services(MOBIQUITOUS 2011) (2011) [uri] [pdf] [poster]


2010

  1. S. Şen, J.A. Clark, J.E. Tapiador. Security Threats in Mobile Ad Hoc Networks. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET. Auerbach Publications (CRC Press), 2010.

  2. P. Peris, J.C. Hernandez-Castro, J.E. Tapiador, T. Li, Y. Li. Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer. Computer Networks 54(9):1502-1508 (2010). [doi] [pdf]

  3. J.C. Hernandez-Castro, J.E. Tapiador, E. Palomar, A. Romero. Blind Steganalysis of MP3Stego. Journal of Information Science and Engineering 26(5):1787-1799 (2010). [doi] [pdf]

  4. J.E. Tapiador, J.A. Clark. Information-Theoretic Detection of Masquerade Mimicry Attacks. NSS 2010, pp. 183-190. [doi] [pdf]

  5. J.E. Tapiador, J.A. Clark. Learning Autonomic Security Reconfiguration Policies. IEEE TSP 2010, pp. 902-909. [doi] [pdf]

  6. J.C. Hernandez-Castro, P. Peris, R.C.-W. Phan, J.E. Tapiador. Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol. RFIDSec 2010, LNCS 6370:22-34. [doi] [pdf]

  7. P. Peris, J.C.Hernandez-Castro, R.C.-W. Phan, J.E. Tapiador, T. Li. Passive Cryptanalysis of an Ultralightweight Authentication Protocol of RFIDsec'10 Asia. RFIDSec 2010.

  8. J.C. Hernandez-Castro, P. Peris, R.C.-W. Phan, J.E. Tapiador, T. Li. Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol. INSCRYPT 2010. [doi] [pdf]

  9. J.A. Clark, J.E. Tapiador, J. McDermid, P.-C. Cheng, D. Agrawal, N. Ivanic, D. Sloggett. Risk Based Access Control with Uncertain and Time-dependent Sensitivity. SECRYPT 2010, pp. 5-13. [doi] [pdf]

  10. D.R. White, J.E. Tapiador, J.C. Hernandez-Castro, J.A. Clark. Fine-Grained Timing using Genetic Programming. EuroGP 2010, LNCS 6021:325-336. [doi] [pdf]

  11. P. Peris, J.C. Hernandez-Castro, J.E. Tapiador, J.C.A. van der Lubbe. Security Flaws in a Recent Ultralightweight RFID Protocol. RFIDSec Asia 2010. [doi] [pdf]

  12. P. Peris, J.C. Hernandez-Castro, J.E. Tapiador, E. Palomar, J.C.A. van der Lubbe. Cryptographic Puzzles and Distance-bounding Protocols: Practical Tools for RFID Security IEEE RFID 2010, pp. 45-52. [doi] [pdf]

  13. J. Blasco, A. Orfila, A. Ribagorda. Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming. ARES 2010, pp. 327-332. [doi] [pdf]

  14. S. Pastrana, A. Orfila, A. Ribagorda. Modeling NIDS evasion using Genetic Programming. 2010 World Congress in Computer Science, Computer Engineering and Applied Computing, WORLDCOMP'10. [pdf]

  15. S. Pastrana, A. Orfila, A. Ribagorda. EVADIR: una metodologia para la evasion de IDS de red. XI Reunion Espanola sobre Criptologia y Seguridad de la Informacion, RECSI'10. [pdf]

  16. G. Suarez-Tangil, E. Palomar, B. Ramos-Alvarez, A Ribagorda. An Experimental Comparison of Source Location Privacy Methods for Power Optimization in WSN. WSEAS 2010, pp. 79-84. [doi] [pdf]

  17. G. Suarez-Tangil, E. Palomar, A. Ribagorda, B Ramos-Alvarez. Anonymity in the service of attackers. UPGRADE 2010, pp. 27-30. [doi] [pdf]

  18. A. Ribagorda. Las medidas de seguridad en el Reglamento de desarrollo de la Ley Orgánica 15/1999 de protección de datos de carácter personal . Comentario Ley Orgánica de protección de datos de carácter personal. Cívitas. Thomson Reuters. España. 2010, pp. 736-761.

  19. A. Ribagorda, Ana I. Gonzalez-Tablas, A. Alcaide. An Overview of Information Security. Advanced in Artificial Intelligence for Privacy Protection and Security. World Scientific, 2010, pp. 29-59

  20. P. Peris-Lopez, T. Li, J. C. Hernandez-Castro. Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. IEICE E93-D(3):518-527 (2010). [doi] [pdf]

  21. A. Mitrokotsa, C. Dimitrakakis, P. Peris-Lopez, J. C. Hernandez-Castro. Reid et al.'s Distance Bounding Protocol and Mafia Fraud Attacks over Noisy Channels. IEEE Communications Letters 14(2):121-123 (2010). [doi] [pdf]

  22. P. Peris-Lopez, E. San Millan, J. C.A. van der Lubbe, L. A. Entrena. Cryptographically Secure Pseudo-Random Bit Generator for RFID Tags. ICITST 2010, pp. 228-233. [pdf]

  23. P. Peris-Lopez. Lightweight Cryptography in Radio Frequency Identification Systems: Analysis and Design of Protocols and Cryptographic Primitives. Book Chapter in Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID Networks. VDM Verlag Dr. Mueller, (2010). [link]

  24. J.M. de Fuentes, A.I. Gonzalez-Tablas, A. Ribagorda. Modelo de procedimiento sancionador electrónico aplicado al control del tráfico vehicular. RECSI 2010. [pdf]

  25. J.M. de Fuentes, A.I. Gonzalez-Tablas, A. Ribagorda. Autenticación y privacidad en redes vehiculares. Novática 202 (2010). [pdf]

  26. J.M. de Fuentes, A.I. Gonzalez-Tablas, A. Ribagorda. Authentication and privacy in vehicular networks. UPGRADE 9(6), 2010. [pdf]

  27. E. Palomar, A. Alcaide, Ana I. Gonzalez-Tablas, A. Ribagorda. A Simple Mechanism to Maintain Peer's Cooperativeness: The Peer's RPS Dilemma. International Conference on Internet Computing 2010, pp. 37-43.

  28. J.L. Hernandez-Ardieta, J. Heppe, and J.F. Carvajal-Vion. STORK: The European Electronic Identity Interoperability Platform. IEEE Latin America Transactions 8(2):190-193. April 2010. [pdf]

  29. J.L. Hernandez-Ardieta, A.I. Gonzalez-Tablas, B. Ramos. Taxonomía de ataques a entornos de creación de firma electrónica. RECSI 2010. [pdf]

  30. A.I. Gonzalez-Tablas, M. Alam, M. Hoffmann. An Architecture for User-Managed Location Sharing in the Future Internet of Services. The 4th International Workshop on Trustworthy Internet of People, Things & Services (TIoPTS 2010) (2010) [uri] [pdf]


2009

  1. J.E. Tapiador, J.C. Hernandez-Castro, J.A. Clark, S. Stepney. Highly Entangled Multi-qubit States with Simple Algebraic Structure. J. Phys. A: Math. Theor. 42 (2009) 415301 [doi] [pdf]

  2. P. Peris, T. Li, J.C. Hernandez-Castro, J.M.E. Tapiador. Practical Attacks on a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard. Computer Communications 32(7-10):1185-1193 (2009) [doi] [pdf]

  3. P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. An Ultralight Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. Journal of Information Science and Engineering 25(1):33-57 (2009). [doi] [pdf]

  4. P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. Cryptanalysis of a Novel Authentication Protocol Conforming EPC-C1G2 Standard. Computer Standards & Interfaces 31(2):372-380 (2009) [doi] [pdf]

  5. P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. LAMED - A PRNG for EPC Class-1 Generation-2 RFID Specification. Computer Standards & Interfaces 31(1):88-97 (2009) [doi] [pdf]

  6. P. Peris, J.C. Hernandez-Castro, J.E. Tapiador, J.C.A. van der Lubbe. Weaknesses in Two Recent Lightweight RFID Authentication Protocols. INSCRYPT 2009, LNCS 6151:383-392. [doi] [pdf]

  7. P. Peris-Lopez, J.C. Hernandez-Castro, J.E. Tapiador, E. San Millan, J.C.A. van der Lubbe. Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Enviroments. SEWCN 2009 (in conjunction with SecureComm 2009). [doi] [pdf]

  8. S. Şen, J.A. Clark, J.E. Tapiador. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks. AdHocNets 2009, pp. 224--239. [doi] [pdf]

  9. H. Chen, J.A. Clark, J.E. Tapiador, S.A. Shaikh, H. Chivers, P. Nobles. A Multi-Objective Optimisation Approach to IDS Sensor Placement. CISIS 2009. [pdf]

  10. E. Palomar, A. Ribagorda, J.E. Tapiador, J.C. Hernandez-Castro. Effects of Cooperation-based Peer-to-Peer Authentication on System Performance. Workshop on Secure Multimedia Communication and Services (SECMCS'09), pp. 444-448. [doi] [pdf]

  11. P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, T. Li, and J.C.A. van der Lubbe. Weaknesses in Two Recent Lightweight RFID Authentication Protocols. RFIDSec 2009. [doi] [pdf]

  12. J.C. Hernandez-Castro, J.M.E. Tapiador, P. Peris-Lopez, T. Li, J.-J. Quisquater. Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations. Int. Workshop on Coding and Cryptography 2009. [doi] [pdf]

  13. A. Orfila, J.M.E. Tapiador, A. Ribagorda. Evolving High-speed, Easy-to-understand Network Intrusion Detection Rules with Genetic Programming. EvoCOMNET 2009. LNCS 5484:93-98. [doi] [pdf]

  14. J.C. Hernandez-Castro, J.M.E. Tapiador, P. Peris-Lopez, John A. Clark, El-Ghazali Talbi. Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. ISPDP 2009, pp. 1-5. [doi] [pdf]

  15. J. Blasco, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda, M.A. Orellana. Steganalysis of Hydan. SEC 2009. IFIP 297:132-142. [doi] [pdf]

  16. P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. Attacking RFID Systems. Security in RFID and Sensor Networks, Chapter 2, pp. 29-48. Auerbach Publications (CRC Press), 2009.

  17. P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. Lightweight Cryptography for RFID Systems. Security in RFID and Sensor Networks, Chapter 6, pp. 121-150. Auerbach Publications (CRC Press), 2009.

  18. E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda. Secure Content Distribution in Pure Peer-to-Peer and Ad Hoc Networks. Handbook of Research on Secure Multimedia Distribution, Chapter 20. IGI Global, 2009.

  19. A. Orfila, J.M.E. Tapiador, A. Ribagorda. Trends, Problems and Misconceptions on Testing Network Intrusion Detection Systems Effectiveness. Computer Security: Intrusion, Detection and Prevention, Chapter 3, pp. 51-62. Nova Publishers, 2009.

  20. A. Alcaide, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda. Game Theory and Cooperation Analysis. Cooperative Wireless Communication, Chapter 9, pp. 191-208. Auerbach Publications (CRC Press), 2009.

  21. E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda. Cooperation-based Security in P2P and Mobile Ad Hoc Networks. Cooperative Wireless Communication, Chapter 17, pp. 391-412. Auerbach Publications (CRC Press), 2009.

  22. G. Suarez-Tangil, E. Palomar, A. Ribagorda, B. Ramos-Alvarez. Métodos y Técnicas del Atacante para Ocultar su Identidad en la Red. Novatica 2009, pp. 18-21. [doi] [pdf]

  23. G. Suarez-Tangil, E. Palomar, J.D. Fuentes, J. Blasco, A. Ribagorda. Automatic Rule Generation Based on Genetic Programming for Event Correlation. CISIS 2009, pp. 127-134. [doi] [pdf]

  24. P. Martin, A. Orfila, J. Carbo. Negotiation Of Network Security Policy By Means Of Agents. PAAMS 2009, Vol. 55, pp. 266-273. [doi] [pdf]

  25. D. Garzon, B. Ramos. Creación dinámica de ediciones con repositorio de datos en lenguaje XML. CISTI 2009, pp. 807-812. [pdf]

  26. J.M. de Fuentes, A.I. Gonzalez-Tablas, B. Ramos, A. Ribagorda. Protocolo de creación de evidencias en entornos vehiculares. V Congreso Iberoamericano de Seguridad Informática (CIBSI), 2009. [pdf]

  27. J.M. de Fuentes, A.I. Gonzalez-Tablas, A. Ribagorda. Witness-based evidence generation in Vehicular Ad-Hoc Networks. Embedded Security in Cars Conference (ESCAR) 2009. [pdf]

  28. J.L. Hernandez-Ardieta, A.I. Gonzalez-Tablas, B. Ramos, and A. Ribagorda. Aumento de la Fiabilidad de Evidencias Digitales mediante la División del Entorno de Firma en un Protocolo de Intercambio Justo. CIBSI 2009. [pdf]

  29. J.L. Hernandez-Ardieta, A.I. Gonzalez-Tablas, B. Ramos, and A. Ribagorda. Extended Electronic Signature Policies. 2nd ACM International Conference on Security of Information and Networks (SIN 2009) pp. 268-277. [pdf]

  30. J.L. Hernandez-Ardieta, A.I. Gonzalez-Tablas, B. Ramos, and A. Ribagorda. On the Need to Divide the Signature Creation Environment. SECRYPT 2009 pp. 375-379. [pdf]

  31. J.L. Hernandez-Ardieta, A.I. Gonzalez-Tablas, B. Ramos. Formal Validation of OFEPSP+ with AVISPA. Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, LNCS Vol. 5511, pp. 124-137, 2009. [pdf]

  32. J.L. Hernandez-Ardieta, J. Heppe, and J.F. Carvajal Vion. STORK: Plataforma europea para la interoperabilidad de identidades electrónicas. TELECOM I+D 2009.


2008

  1. J.E. Tapiador, J.C. Hernandez-Castro, A. Alcaide, A. Ribagorda. On the Distinguishability of Distance-bounded Permutations in Ordered Channels. IEEE Transactions on Information Forensics and Security 3(2):166-172 (2008) [doi] [pdf]

  2. A. Alcaide, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda. Automated Synthesis of Multiparty Rational Exchange Security Protocols. International Transactions on Systems Science and Applications 4(4):312-321 (2008) [pdf]

  3. J. Polimon, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. Automated Design of a Lightweight Block Cipher with Genetic Programming. International Journal of Knowledge-Based and Intelligent Engineering Systems 12(1):3-14 (2008) [doi] [pdf]

  4. A. Alcaide, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda. Cryptanalysis of Syverson's Rational Exchange Protocol. International Journal of Network Security 7(2):190-195 (2008) [doi] [pdf]

  5. J.M.E. Tapiador, J.C. Hernandez-Castro, P. Peris, A. Ribagorda. Automated Design of Cryptographic Hash Schemes by Evolving Highly Non-Linear Functions. Journal of Information Science and Engineering 24(5):1485-1504 (2008) [doi] [pdf]

  6. E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda. Secure Content Access and Replication in Pure P2P Networks. Computer Communications 31(2):266-279 (2008) [doi] [pdf]

  7. J.M.E. Tapiador, A. Alcaide, J.C. Hernandez-Castro, A. Ribagorda. Bayesian Rational Exchange. International Journal of Information Security 7(1):85-100 (2008) [doi] [pdf]

  8. P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. Advances on Ultralightweight Cryptography for Low-cost RFID Tags: Gossamer Protocol. WISA 2008, LNCS 5379:56-68. [doi] [pdf]

  9. J.C. Hernandez-Castro, J.M.E. Tapiador, N. Veyrat-Charvillon, J.-J. Quisquater. Ayin - A Collision-free Function for Low-cost RFID Systems. META 2008. [doi] [pdf]

  10. J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. Non-Standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol. MCO 2008, pp. 589-596. [doi] [pdf]

  11. P. Peris, T. Li, L. Tong-Lee, J.C. Hernandez-Castro, J.M.E. Tapiador. Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard. RFIDSec 2008. [doi] [pdf]

  12. A. Alcaide, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda. Nature-inspired Synthesis of Rational Protocols. PPSN 2008, LNCS 5199:981-990. [doi] [pdf]

  13. J. Blasco, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. CSteg: Talking in C Code. SECRYPT 2008, pp. 399-406. [pdf]

  14. J.C. Hernandez-Castro, J.M.E. Tapiador, J.-J. Quisquater. On the Salsa20 Core Function. FSE 2008, LNCS 5086:462-469. [doi] [pdf]

  15. P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. RFID Specification Revisited. The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems, Chapter 6, pp. 127-156. Auerbach Publications (CRC Press), 2008.

  16. A. Orfila, J. Carbo, A. Ribagorda. Autonomous decision on intrusion detection with trained BDI agents. Computer Communications 31(9): 1803-1813 (2008). [doi] [pdf]

  17. A. Ribagorda. Electronic Signature at the Heart of Information Security Development: An Overview. Electronic Signature Law: Emerging Trends. Amicus Book. Icfai University Press. Hyderabad. India. 2008, pp. 83-96

  18. A. Ribagorda. La dimensión técnica de la protección de datos personales. Estudios en Homenaje al Profesor Gregorio Peces-Barba. Editorial Dykinson. Madrid. 2008, pp. 1127-1142.

  19. A. Ribagorda. La protección de datos personales y la seguridad de la información. Revista Jurídica de Castilla y León., vol. 16. pp. 1127-1142. (2008)

  20. Pedro Peris-Lopez, Tong-Lee Lim, Tieyan Li. Providing Stronger Authentication at a Low-Cost to RFID Tags Operating under the EPCglobal Framework.. TSP 2008, pp. 159-166. [doi] [pdf]

  21. J.M. de Fuentes, A.I. Gonzalez-Tablas, A. Ribagorda. CERTILOC: Implementation of a spatial-temporal certification service compatible with several localization technologies. International Conference on Availability, Reliability and Security (ARES), 2008. [pdf]

  22. J.M. de Fuentes, A.I. Gonzalez-Tablas, A. Ribagorda. Hacia un sistema preventivo del exceso de velocidad. RECSI 2008. [pdf]

  23. A. Torres-Vazquez, A. Ribagorda, B. Ramos. On the use of genetic programming to develop cryptographic hashes. RECSI 2008, pp. 83-90. [pdf]

  24. J.L. Hernandez-Ardieta, A.I. Gonzalez-Tablas and B. Ramos. An Optimistic Fair Exchange Protocol based on Signature Policies. Computers & Security 27(7-8):309-322, December 2008 [pdf]

  25. J.L. Hernandez-Ardieta, A.I. Gonzalez-Tablas and B. Ramos. Repudio de firmas electrónicas en Infraestructuras de Clave Pública.. RECSI 2008, pp. 595-606. [pdf]

  26. A.I. Gonzalez-Tablas, B. Ramos, A. Ribagorda. Guaranteeing the Authenticity of Location Information. IEEE Pervasive Computing 7(3):72-80 (2008) [doi] [pdf]

  27. A.I. Gonzalez-Tablas, A. Orfila, B. Ramos, A. Ribagorda. EVAWEB v2: Enhancing a web-based assessment system focused on non-repudiation use and teaching. International Journal of Web-Based Learning and Teaching Technologies 3(1): 265-276 (2008) [doi] [pdf]


2007

  1. J.M.E. Tapiador, J.A. Clark, J.C. Hernandez-Castro. Non-Linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-boxes. 2007 IMA Conference on Cryptography and Coding, LNCS 4887:99-117. [doi] [pdf]

  2. E. Palomar, A. Alcaide, J.M.E. Tapiador, J.C. Hernandez-Castro. Bayesian Analysis of Secure P2P Sharing Protocols. IS 2007 (OTM Workshops), LNCS 4804:1701-1717. [doi] [pdf]

  3. A. Alcaide, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda. A Multi-party Rational Exchange Protocol. IS 2007 (OTM Workshops), LNCS 4805:42-43. [doi] [pdf]

  4. P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. SECUBIQ 2007 (EUC Workshops), LNCS 4809:781-794. [doi] [pdf]

  5. A. Alcaide, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda. Towards Automated Design of Multi-party Rational Exchange. RRS 2007, pp. 387-390. [doi] [pdf]

  6. E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda. A P2P File-Sharing Protocol based on Cryptographic Puzzles. DBISP2P 2007. [pdf]

  7. P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. Cryptanalysis of a Novel Authentication Protocol Conforming EPC-C1G2 Standard. RFIDSec 2007. [doi] [pdf]

  8. J.M.E. Tapiador, J.C. Hernandez-Castro, J.A. Clark. Heuristic Search for Non-Linear Cryptanalytic Approximations. CEC 2007. [doi] [pdf]

  9. E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda. Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security. PDMST 2007 (DEXA), pp. 779-783. [doi] [pdf]

  10. P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. Solving the Simultaneously Scanning Problem Anonymously: Clumping Proofs for RFID Tags. SecPerU 2007, pp. 55-60. [doi] [pdf]

  11. A. Ribagorda. Las medidas de seguridad en el borrador del nuevo Reglamento de la Ley Org´nica 15/1999 de Protección de Datos de Carácter Personal. Revista Española de Protección de Datos, vol. 2. pp. 41-62. (2007)

  12. B. Ramos, A.I. Gonzalez-Tablas, A. Ribagorda. Comercio Electrónico basado en Servicios de Localización. Servicio de No Repudio. CISTI 2007, Vol II, pp. 477-488. [pdf]

  13. J.M. Sierra, A. Ribagorda. Towards self-authenticable smart cards. Computer Communications 29(15):2781-2787, 2007. [doi]

  14. J.L. Hernandez-Ardieta, A.I. Gonzalez-Tablas and B. Ramos. Protocolo de intercambio justo para comercio electrónico basado en políticas de firma.. CEDI 2007, pp. 249-256. [pdf]

  15. A.I. Gonzalez-Tablas, B. Ramos, A. Ribagorda. Spatial-Temporal Certification Framework and Extension of X.509 Attribute Certificate Framework and SAML Standard to Support Spatial-Temporal Certificates. The 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007) (2007) [doi] [pdf]

  16. A.I. Gonzalez-Tablas, J. M. Fuentes, J. C. Calvo, A. Orfila, J. Gallo, J. Patter. CERTILOC: Analisis y diseno de un servicio de certificacion espacio-temporal respetuoso con la privacidad. CEDI'07, (2007) [pdf]

  17. A.I. Gonzalez-Tablas, K. Wouters, B. Ramos, A. Ribagorda. EVAWEB: A web-based assessment system to learn X.509/PKIX digital signatures. IEEE Transactions on Education 50(2):112-117 (2007) [doi] [pdf]


2006

  1. J.C. Hernandez-Castro, I. Blasco-Lopez, J.M.E. Tapiador, A. Ribagorda. Steganography in Games: A General Methodology and its Application to the Game of Go. Computers & Security 25(1):64-71 (2006). [doi] [pdf]

  2. P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. EMAP: An Efficient Mutual Authentication Protocol for Low-cost RFID Tags. IS 2006 (OTM Workshops), LNCS 4277:352-361. [doi] [pdf]

  3. P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID Tags. RFIDSec 2006. [doi] [pdf]

  4. E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda. Certificate-based Access Control in Pure P2P Networks. P2P 2006, pp. 177-184. [doi] [pdf]

  5. E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda. A Protocol for Secure Content Distribution in Pure P2P Networks. PDMST 2006 (DEXA), pp. 712-716. [doi] [pdf]

  6. C. Lamenca, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. Lamar: A New Pseudorandom Number Generator Evolved by means of Genetic Programming. PPSN 2006, LNCS 4193:850-859. [doi] [pdf]

  7. P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. M2AP: A Minimalist Mutual Authentication Protocol for Low-cost RFID tags. UIC 2006, LNCS 4159:912-923. [doi] [pdf]

  8. E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda. Security in P2P Networks: Survey and Research Directions. EUC 2006, LNCS 4097:183-192. [doi] [pdf]

  9. P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda. RFID Systems: A Survey on Security Threats and Proposed Solutions. PWC 2006, LNCS 4217:159-170. [doi] [pdf]

  10. E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda. A P2P Content Authentication Protocol based on Byzantine Agreement. ETRICS 2006, LNCS 3995:60-72. [doi] [pdf]

  11. A. Alcaide, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda. An Extended Model of Rational Exchange based on Dynamic Games of Imperfect Information. ETRICS 2006, LNCS 3995:396-408. [doi] [pdf]

  12. J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda, B. Ramos. Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming. CEC 2006, pp.192-199. [doi] [pdf]

  13. A. Orfila, J. Carbo, A. Ribagorda. Effectiveness Evaluation of Data Mining Based IDS. ICDM 2006,Vol. 4065, pp. 377-388. [doi] [pdf]

  14. B. Ramos, A.I. Gonzalez-Tablas, A. Ribagorda, J.C. Hernandez-Castro. Legislación, ética y seguridad para la preservación de la privacidad de la información espacio-temporal. CISTI 2006, Vol II, pp. 535-550. [pdf]

  15. S. Petrovic, G. Alvarez, A. Orfila, J. Carbo. Labelling Clusters in an Intrusion Detection System Using a Combination of Clustering Evaluation Techniques. HICSS 2006, pp. 129-137. [doi] [pdf]

  16. S. Petrovic, G. Alvarez, A. Orfila, J. Carbo. Labelling IDS Clusters by Means of the Silhouette Index. RECSI 2006, pp. 760-772. [doi] [pdf]

  17. A.I. Gonzalez-Tablas, B. Ramos, A. Ribagorda, J. Estevez-Tapiador. Mecanismo de certificacion espacio-temporal basado en el estandar SAML. RECSI 2006 (2006) [pdf]

  18. H.A. Mitre, A.I. Gonzalez-Tablas, B. Ramos, A. Ribagorda. A legal ontology to support privacy preservation in Location-Based Services. On the Move to Meaningful Internet Systems 2006 (OTM 2006 Workshops) Volume 4278/2006, pp. 1755-1764 (2006) [doi] [pdf]

  19. A.I. Gonzalez-Tablas, A. Orfila, B. Ramos, A. Ribagorda. EVAWEB v2: enhancing a web-based assessment system. IV International Conference on Multimedia and Information and Communication Technologies in Education. (2006) [pdf]


2005

  1. G. Macia, J.E. Diaz-Verdejo, J.M.E. Tapiador. PIM-DM Cost Analysis in Loop-Free Topologies. ISCC 2005, pp. 719-723. [doi] [pdf]

  2. J.M.E. Tapiador, P. Garcia-Teodoro, J.E. Diaz-Verdejo. Detection of Web-based Attacks through Markovian Protocol Parsing. ISCC 2005, pp. 457-462. [doi] [pdf]

  3. A. Izquierdo, J. Torres, J.M.E. Tapiador, J.C. Hernandez. Attacks on Port-Knocking Authentication Mechanism. ICCSA 2005, LNCS 3483:1292-1300. [doi] [pdf]

  4. A. Alcaide, J.M.E. Tapiador, A. Izquierdo, J.M. Sierra. A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol. ICCSA 2005, LNCS 3483:1309-1318. [doi] [pdf]

  5. A. Orfila, J. Carbo, A. Ribagorda. Intrusion Detection Effectiveness Improvement by a Multiagent System. International Journal of Computer Science & Applications 2(1): 1-6 (2005). [doi] [pdf]

  6. A.I. Gonzalez-Tablas, K. Wouters. Integrating XML Linked Time-Stamps in OASIS Digital Signature Services. 9th IFIP TC-6 TC-11 Communications and Multimedia Security International Conference (CMS 2005) Volume 3677/2005, pp. 301-310 (2005) [doi] [pdf]

  7. A.I. Gonzalez-Tablas, K. Kursawe, B. Ramos, A. Ribagorda. Survey on location authentication protocols and spatial-temporal attestation services. Embedded and Ubiquitous Computing (EUC 2005 Workshops) Volume 3823/2005, pp. 797-806 (2005) [doi] [pdf]

  8. A.I. Gonzalez-Tablas, L. M. Salas, B. Ramos, A. Ribagorda. Providing personalization and automation to spatial-temporal stamping services. 1st International Workshop on Secure and Ubiquitous Networks (SUN’05) (2005) [doi] [pdf]

  9. A.I. Gonzalez-Tablas, B. Ramos, A. Ribagorda. Protocolos de sellado espacio-temporal: Mejorando su precision y disminuyendo el nivel de confianza requerido. Tercer Congreso Iberoamericano de Seguridad Informatica (CIBSI '05) (2005) [pdf]


2004

  1. J.M.E. Tapiador, P. Garcia-Teodoro, J.E. Diaz-Verdejo. Anomaly Detection Methods in Wired Networks: A Survey and Taxonomy. Computer Communications 27(16):1569-1584 (2004) [doi] [pdf]

  2. J.M.E. Tapiador, P. Garcia-Teodoro, J.E. Diaz-Verdejo. Measuring Normality in HTTP Traffic for Anomaly-based Intrusion Detection. Computer Networks 45(2):175-193 (2004) [doi] [pdf]

  3. J.M.E. Tapiador, P. Garcia-Teodoro, J.E. Diaz-Verdejo. N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer. ICCSA 2004 LNCS 3043:841-850. [doi] [pdf]

  4. S. Petrovic, G. Alvarez, A. Orfila, J. Carbo. Fast Predictor-Corrector Intrusion Detection System based on Clustering. RECSI 2004, pp. 507-516. [doi] [pdf]

  5. A. Orfila, J. Carbo, A. Ribagorda. Decision Model Analysis for Spam. Information & Security: An International Journal 15(2):151-161 (2004). [doi] [pdf]

  6. A.I. Gonzalez-Tablas, K. Wouters, B. Ramos. Teaching X.509/PKIX based digital signatures while enhancing non-repudiation of a web based assessment system. IADIS International Conference WWW/Internet 2004 (2004) [pdf]

  7. A.I. Gonzalez-Tablas, B. Ramos, A. Ribagorda. Hacia una caracterizacion de los servicios de datacion digital con respecto a otros servicios de terceros de confianza. RECSI 2004 (2004) [pdf]


2003 and before

  1. J.M.E. Tapiador, P. Garcia-Teodoro, J.E. Diaz-Verdejo. NSDF: A Computer Network System Description Framework and its Application to Network Security. Computer Networks 43(5):573-600 (2003) [doi] [pdf]

  2. J.M.E. Tapiador, P. Garcia-Teodoro, J.E. Diaz-Verdejo. Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection. IWIA 2003, pp. 3-12. [doi] [pdf]

  3. A. Orfila, J. Carbo, A. Ribagorda. Fuzzy Logic on Decision Model for IDS. FUZZ 2003, pp. 1237-1242. [doi] [pdf]

  4. J. Carbo, A. Orfila, A. Ribagorda. Adaptive Agents applied to Intrusion Detection. CEEMAS 2003, Vol. 2691, pp. 445-453. [doi] [pdf]

  5. P. Martin, A. Orfila, J. Carbo. Robust New Method in Frequency Domain Watermarking. ISC 2001, pp. 166-182. [doi] [pdf]

  6. J.C. Hernandez, B. Ramos, A. Ribagorda, J.M. Sierra. Search engines as a security threats. IEEE Computer 34(10):25-30, 2001 [doi]

  7. A.I. Gonzalez-Tablas, B. Ruiz-Mezcua, S. Torres-Guijarro, P. Fernandez-Cid. Implementacion del codificador de voz G.722 sobre el DSP TMS320F206. URSI 2000, (2000) [pdf]

  8. K. Wouters, B. Preneel, A.I. Gonzalez-Tablas, A. Ribagorda. Towards an XML format for time-stamps. ACM Workshop on XML Security 2002, pp. 61-70 (2002) [doi] [pdf]

  9. A.I. Gonzalez-Tablas, E. Castro, A. Ribagorda, M. Velasco. A secure perspective of data. Including authentication in the NewsML DTD. IADIS International Conference WWW/Internet 2002, (2002)

  10. A.I. Gonzalez-Tablas, E. Castro, A. Ribagorda, M. Velasco. Adding security information in XML documents. 13th International Conference on Information and Intelligent Systems (IIS 2002), (2002) [pdf]

  11. A.I. Gonzalez-Tablas, J. Carbo. Un sistema versatil de pagos electronicos para un servicio remoto de apuestas. RECSI 2002 [pdf]

  12. A.I. Gonzalez-Tablas, M.A. Fernandez, J.M. Sierra Camara, A. Orfila . Aproximaciones a la seguridad en educacion via Web en entornos controlados: integridad, no repudio y sellado de tiempo en la tele-evaluacion. RECSI 2002 [pdf]

  13. A.I. Gonzalez-Tablas, B. Ramos, A. Ribagorda. Path-stamps: A proposal on enhancing security of location tracking applications. Ubiquitous Mobile Information and Collaboration Systems Workshop (UMICS 2003) (2003) [pdf]

  14. A.I. Gonzalez-Tablas. La iniciativa europea para la normalizacion de la firma electronica. Revista de Contratacion Electronica (RCE) 34:91-101 (2003) [pdf]

  15. A.I. Gonzalez-Tablas, E. Castro, A. Ribagorda, M. Velasco. Adding security information in XML documents. Journal of Information and Organizational Sciences 27(1):1-14 (2003) [pdf]

  16. A.I. Gonzalez-Tablas, B. Ramos, A. Ribagorda. La necesidad de regular la certificacion de la localizacion de entidades en el ambito de las comunicaciones electronicas. Revista de Contratacion Electronica (RCE) 43:39-59 (2003) [pdf]


PhD Theses

  1. Guillermo Suarez de Tangil.
    Mining structural and behavioral patterns in smart malware.
    Supervised by Dr. Juan E. Tapiador and Dr. Pedro Peris López (2014). [web]

  2. Lorena González-Manzano.
    A user-managed access control model and mechanisms for Web Based Social Networks. Enhancing expressive power, co-ownership management, interoperability and authorized data exposures..
    Supervised by Dra. A. Isabel González-Tablas and Dr. Arturo Ribagorda (2014). [pdf]

  3. Sergio Pastrana.
    Attacks Against Intrusion Detection Networks: Evasion, Reverse Engineering and Optimal Countermeasures.
    Supervised by Dr. Agustín Orfila and Dr. Juan E. Tapiador (2014). [pdf]

  4. J. Blasco.
    Information Leakage and Steganography: Detecting and Blocking Covert Channels.
    Supervised by: Dr. Julio César Hernández Castro and Dr. Pedro Peris López (2012). [pdf]

  5. J.M De Fuentes.
    Improvements on the enforcement process based on intelligent transportation techniques: model and mechanisms for electronic reporting, offence notification and evidence generation.
    Supervised by Dra. A. Isabel González-Tablas and Dr. Arturo Ribagorda (2012). [pdf]

  6. J. Lopez Hernandez-Ardieta.
    Enhancing the Reliability of Digital Signatures as Non-repudiation Evidence under a Holistic Threat Model.
    Supervised by A.I. Gonzalez-Tablas (2011).

  7. A. Alcaide Raya.
    Rational Exchange Protocols.
    Supervised by J.E. Tapiador and A. Ribagorda (2009).

  8. P. Peris Lopez.
    Lightweight Cryptography in Radio Frequency Identification (RFID) Systems.
    Supervised by J.C. Hernandez-Castro and A. Ribagorda (2008).

  9. E. Palomar Gonzalez.
    Content Authentication and Access Control in Pure Peer-to-Peer Networks.
    Supervised by J.E. Tapiador and A. Ribagorda (2008).

  10. A.I. Gonzalez-Tablas Ferreres.
    Arquitectura y Mecanismos para la Provisión de Servicios de Acreditación y Sellado Espacio-temporal.
    Supervised by A. Ribagorda and B. Ramos (2005).

  11. A. Orfila Diaz-Pabon.
    Eficacia de los Sistemas de Detección de Intrusiones. Un Análisis Orientado a la Decisión.
    Supervised by A. Ribagorda (2005).

  12. J.C. Hernandez Castro.
    Aplicaciones de Técnicas de la Inteligencia Artificial a la Criptología.
    Supervised by A. Ribagorda (2003).

  13. J.M. Sierra Camara.
    Gestión de Protocolos de Seguridad en Internet. Desarrollo y Validación de un Protocolo en el Marco ISAKMP.
    Supervised by A. Ribagorda (2000).

  14. B. Ramos Alvarez.
    Mecanismo de Autenticación basado en un Sistema de Contraseñas Desechables Independientes.
    Supervised by A. Ribagorda (1999).

  15. P. Diez.
    Modelo Abstracto para el Desarrollo de Sistemas Hipermediales Seguros.
    Supervised by A. Ribagorda (1995).

  16. F. Garcia Merayo.
    Extensión de los Lenguajes Científicos para su Uso en Algoritmos Paralelos y Vectoriales.
    Supervised by A. Ribagorda (1989).



Copyright notice:

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.




UNIVERSIDAD CARLOS III DE MADRID
DEPARTMENT OF COMPUTER SCIENCE