Candelaria Hernández-Goya

Orcid: 0000-0002-9468-708X

According to our database1, Candelaria Hernández-Goya authored at least 52 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BLE-based secure tracking system proposal.
Wirel. Networks, August, 2024

Research on smart-locks cybersecurity and vulnerabilities.
Wirel. Networks, August, 2024

Improving Privacy in Federated Learning-Based Intrusion Detection for IoT Networks.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

2022
Secure ambient intelligence prototype for airports.
J. Ambient Intell. Humaniz. Comput., 2022

BLE Beacon System for Smartphone Secure Tracking.
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence, 2022

Smart-Lock Attack Through Bluetooth Communications Replication.
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence, 2022

2021
Using blockchain in the follow-up of emergency situations related to events.
Softw. Pract. Exp., 2021

Detection of forest fires outbreaks by dynamic fuzzy logic controller.
Log. J. IGPL, 2021

A secure approach to monitoring emergency health resources.
EURASIP J. Wirel. Commun. Netw., 2021

2019
Blockchain-Based Ubiquitous Transport and Logistics Monitoring System.
Proceedings of the 13th International Conference on Ubiquitous Computing and Ambient Intelligence, 2019

2018
Forest Fire Prevention, Detection, and Fighting Based on Fuzzy Logic and Wireless Sensor Networks.
Complex., 2018

Beacon-Based Fuzzy Indoor Tracking at Airports.
Proceedings of the 12th International Conference on Ubiquitous Computing and Ambient Intelligence, 2018

Monitoring Environmental Conditions in Airports with Wireless Sensor Networks.
Proceedings of the 12th International Conference on Ubiquitous Computing and Ambient Intelligence, 2018

Fuzzy-Based Forest Fire Prevention and Detection by Wireless Sensor Networks.
Proceedings of the International Joint Conference SOCO'18-CISIS'18-ICEUTE'18, 2018

2017
Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.
Sensors, 2017

Secure System Communication to Emergencies for Victims Management Through Identity Based Signcryption Scheme.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2017

IBSC System for Victims Management in Emergency Scenarios.
Proceedings of the 2nd International Conference on Internet of Things, 2017

2016
Patients' Data Management System Through Identity Based Encryption.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2016

Distributed Communication System for Emergencies.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

2015
Poster: Indoor Location System for Vehicles.
Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects, 2015

2014
Alternative Communication System for Emergency Situations.
Proceedings of the WEBIST 2014, 2014

FastTriaje: A Mobile System for Victim Classification in Emergency Situations.
Proceedings of the WEBIST 2014, 2014

2013
Analysis of Lightweight Cryptographic Solutions for Authentication in IoT.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2013, 2013

2011
Efficient Public Key Certificate Management for Mobile Ad Hoc Networks.
EURASIP J. Wirel. Commun. Netw., 2011

Extending OLSR Functionalities to PKI Management.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011

2010
Flexible Authentication in Vehicular Ad hoc Networks
CoRR, 2010

Stimulating Cooperation in Self-Organized Vehicular Networks
CoRR, 2010

Secret Sharing Based on a Hard-on-Average Problem
CoRR, 2010

Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Data aggregation for information authentication in VANETs.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers.
J. Univers. Comput. Sci., 2009

Self-organized authentication in mobile ad-hoc networks.
J. Commun. Networks, 2009

Rethinking Self-organized Public-key Management for Mobile Ad-Hoc Networks.
Proceedings of the Security in Information Systems, 2009

Deterministic Cryptanalysis of some Stream Ciphers.
Proceedings of the Security in Information Systems, 2009

Designing communication-oriented node authentication for VANETs.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

Cooperation Enforcement Schemes in Vehicular Ad-Hoc Networks.
Proceedings of the Computer Aided Systems Theory, 2009

Differentiated Services to Provide Efficient Node Authentication in VANETs.
Proceedings of the 2009 International Conference on Security & Management, 2009

Cooperation requirements for packet forwarding in vehicular ad-hoc networks (VANETs).
Proceedings of the 2009 International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2009

2008
Self-organized authentication architecture for Mobile Ad-hoc Networks.
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008

Using New Tools for Certificate Repositories Generation in MANETs.
Proceedings of the Data and Applications Security XXII, 2008

Cooperative Security Schemes for Mobile Ad-Hoc Networks.
Proceedings of the Cooperative Design, 2008

2007
A rational approach to cryptographic protocols.
Math. Comput. Model., 2007

Balancedness in Binary Sequences with Cryptographic Applications.
Proceedings of the Parallel Processing and Applied Mathematics, 2007

2006
Zero-Knowledge Hierarchical Authentication in MANETs.
IEICE Trans. Inf. Syst., 2006

Deterministic Analysis of Balancedness in Symmetric Cryptography.
Proceedings of the Computer and Information Sciences, 2006

2005
Algorithm for Proving the Knowledge of an Independent Vertex Set.
Proceedings of the Computer Aided Systems Theory, 2005

2004
A New Role of Graph Theory: The Design of Probably Secure Cryptoprotocols.
Inf. Secur. J. A Glob. Perspect., 2004

A Game-Theoretic Model for Two-Party Cryptographic Protocols.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

2003
A Zero-Knowledge Identification Scheme.
Proceedings of the Computer Network Security, 2003

A Secret Sharing Scheme Using Matrices.
Proceedings of the Computational Science and Its Applications, 2003

The teaching of cryptologic mathematics.
Proceedings of the 4th International Conference on Computer Systems and Technologies: e-Learning, 2003

2001
Strong Solutions to the Identification Problem.
Proceedings of the Computing and Combinatorics, 7th Annual International Conference, 2001


  Loading...