Arturo Ribagorda

According to our database1, Arturo Ribagorda authored at least 92 papers between 1993 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors.
Sensors, 2018

2015
Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System.
IEEE Trans. Dependable Sec. Comput., 2015

Providing SIEM systems with self-adaptation.
Information Fusion, 2015

2014
Extended U+F Social Network Protocol: Interoperability, reusability, data protection and indirect relationships in Web Based Social Networks.
Journal of Systems and Software, 2014

Evolution, Detection and Analysis of Malware for Smart Devices.
IEEE Communications Surveys and Tutorials, 2014

SoNeUCONABC, an expressive usage control model for Web-Based Social Networks.
Computers & Security, 2014

CooPeD: Co-owned Personal Data management.
Computers & Security, 2014

2013
User-Managed Access Control in Web Based Social Networks.
Proceedings of the Security and Privacy Preserving in Social Networks, 2013

Anonymous authentication for privacy-preserving IoT target-driven applications.
Computers & Security, 2013

2012
Bypassing information leakage protection with trusted applications.
Computers & Security, 2012

The Peer's Dilemma: A general framework to examine cooperation in pure peer-to-peer systems.
Computer Networks, 2012

U+F Social Network Protocol: Achieving Interoperability and Reusability between Web Based Social Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Artificial Immunity-based Correlation System.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

On the Strength of Egglue and Other Logic CAPTCHAs.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

A Functional Framework to Evade Network IDS.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study.
Computers & Security, 2010

A Strong Authentication Protocol Based on Portable One-Time Dynamic URLs.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol.
Proceedings of the Trust, 2010

Side-channel Attack on the HumanAuth CAPTCHA.
Proceedings of the SECRYPT 2010, 2010

Shortcomings in CAPTCHA Design and Implementation: Captcha2, a Commercial Proposal.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

A Simple Mechanism to Maintain Peer's Cooperativeness: The Peer's RPS Dilemma.
Proceedings of the 2010 International Conference on Internet Computing, 2010

Modeling NIDS Evasion with Genetic Programming.
Proceedings of the 2010 International Conference on Security & Management, 2010

Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming.
Proceedings of the ARES 2010, 2010

2009
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification.
J. Inf. Sci. Eng., 2009

LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification.
Computer Standards & Interfaces, 2009

Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard.
Computer Standards & Interfaces, 2009

Extended electronic signature policies.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

On the Need to Divide the Signature Creation Environment.
Proceedings of the SECRYPT 2009, 2009

Steganalysis of Hydan.
Proceedings of the Emerging Challenges for Security, 2009

Remotely Telling Humans and Computers Apart: An Unsolved Problem.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming.
Proceedings of the Applications of Evolutionary Computing, 2009

Automatic Rule Generation Based on Genetic Programming for Event Correlation.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

2008
On the Distinguishability of Distance-Bounded Permutations in Ordered Channels.
IEEE Trans. Information Forensics and Security, 2008

Guaranteeing the Authenticity of Location Information.
IEEE Pervasive Computing, 2008

Automated design of a lightweight block cipher with Genetic Programming.
KES Journal, 2008

Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions.
J. Inf. Sci. Eng., 2008

EVAWEB V2: Enhancing a Web-Based Assessment Systems Focused on Nonrepudiation Use and Teaching.
IJWLTT, 2008

Cryptanalysis of Syverson's Rational Exchange Protocol.
I. J. Network Security, 2008

Bayesian rational exchange.
Int. J. Inf. Sec., 2008

Secure content access and replication in pure P2P networks.
Computer Communications, 2008

Autonomous decision on intrusion detection with trained BDI agents.
Computer Communications, 2008

Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

CSteg: Talking in C Code - Steganography of C Source Code in Text.
Proceedings of the SECRYPT 2008, 2008

Nature-Inspired Synthesis of Rational Protocols.
Proceedings of the Parallel Problem Solving from Nature, 2008

Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol.
Proceedings of the Modelling, 2008

CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies.
Proceedings of the The Third International Conference on Availability, 2008

2007
EVAWEB: A Web-Based Assessment System to Learn X.509/PKIX-Based Digital Signatures.
IEEE Trans. Education, 2007

Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags.
Proceedings of the Third International Workshop on Security, 2007

A Multi-party Rational Exchange Protocol.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Towards Automated Design of Multi-party Rational Exchange Security Protocols.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

Spatial-Temporal Certification Framework and Extension of X.509 Attribute Certificate Framework and SAML Standard to Support Spatial-Temporal Certificates.
Proceedings of the Public Key Infrastructure, 2007

An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

2006
Steganography in games: A general methodology and its application to the game of Go.
Computers & Security, 2006

Towards self-authenticable smart cards.
Computer Communications, 2006

M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Lamar: A New Pseudorandom Number Generator Evolved by Means of Genetic Programming.
Proceedings of the Parallel Problem Solving from Nature, 2006

Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming.
Proceedings of the Parallel Problem Solving from Nature, 2006

Certificate-based Access Control in Pure P2P Networks.
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2006

EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

A Legal Ontology to Support Privacy Preservation in Location-Based Services.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Effectiveness Evaluation of Data Mining Based IDS.
Proceedings of the Advances in Data Mining, 2006

RFID Systems: A Survey on Security Threats and Proposed Solutions.
Proceedings of the Personal Wireless Communications, 2006

Evolving hash functions by means of genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

Security in P2P Networks: Survey and Research Directions.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

A P2P Content Authentication Protocol Based on Byzantine Agreement.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

A Protocol for Secure Content Distribution in Pure P2P Networks.
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006

Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

2005
The strict avalanche criterion randomness test.
Mathematics and Computers in Simulation, 2005

Intrusion Detection Effectiveness Improvement by a Multiagent System.
IJCSA, 2005

Secure Electronic Payments in Heterogeneous Networking: New Authentication Protocols Approach.
Proceedings of the Computational Science and Its Applications, 2005

Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Providing Personalization and Automation to Spatial-Temporal Stamping Services.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

2004
Beware of the Security Software.
Information Systems Security, 2004

Low computational cost integrity for block ciphers.
Future Generation Comp. Syst., 2004

Secure Communications in Multi-Agent Systems Protecting KQML.
Proceedings of the Security In Information Systems, 2004

Security Issues in Network File Systems.
Proceedings of the Computational Science and Its Applications, 2004

2003
Protection of Multiagent Systems.
Proceedings of the Computational Science and Its Applications, 2003

Fuzzy logic on decision model for IDS.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

Adaptive Agents Applied to Intrusion Detection.
Proceedings of the Multi-Agent Systems and Applications III, 2003

Path-Stamps: A Proposal for Enhancing Security of Location Tracking Applications.
Proceedings of the 15th Conference on Advanced Information Systems Engineering (CAiSE '03), 2003

2002
Towards an XML format for time-stamps.
Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, 2002

Genetic Cryptoanalysis of Two Rounds TEA.
Proceedings of the Computational Science - ICCS 2002, 2002

A Secure Perspective of Data. Including Authentication in the NewsML DTD.
Proceedings of the IADIS International Conference WWW/Internet 2002, 2002

2001
Genetic Algorithms Can be Used to Obtain Good Linear Congruential Generators.
Cryptologia, 2001

Search Engines as a Security Threat.
IEEE Computer, 2001

Search Engines as a security thread.
Proceedings of WebNet 2001, 2001

Project WebOracle: Developing an advanced web server security assesment tool.
Proceedings of WebNet 2001, 2001

Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers.
Proceedings of the Cryptography and Coding, 2001

1999
IPR techniques applied to a multimedia environment in the HYPERMEDIA project.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

1993
Encryption and error correction codes for reliable file storage.
Computers & Security, 1993


  Loading...