Esther Palomar

Orcid: 0000-0001-5432-3962

According to our database1, Esther Palomar authored at least 41 papers between 2006 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Performance Evaluation of a Collaborative IoT Framework for Energy-Efficient Communities.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
Towards Sustainable Energy-Efficient Communities Based on a Scheduling Algorithm.
Sensors, 2019

Cyber threat intelligence sharing: Survey and research directions.
Comput. Secur., 2019

Cooperative System and Scheduling Algorithm for Sustainable Energy-Efficient Communities.
Proceedings of the How AI Impacts Urban Living and Public Health, 2019

2018
A Novel Trust Taxonomy for Shared Cyber Threat Intelligence.
Secur. Commun. Networks, 2018

Superscalar Encrypted RISC: The Measure of a Secret Computer.
Proceedings of the 17th IEEE International Conference On Trust, 2018

On Security in Encrypted Computing.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

The Secret Processor Will Go to the Ball: Benchmark Insider-Proof Encrypted Computing.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

2017
Trusted and Secure Wireless Sensor Network Designs and Deployments.
Sensors, 2017

A Middleware Enforcing Location Privacy in Mobile Platform.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

On Obfuscating Compilation for Encrypted Computing.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Relevance Filtering for Shared Cyber Threat Intelligence (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

Encrypted computing: Speed, security and provable obfuscation against insiders.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Towards an Anonymity Supported Platform for Shared Cyber Threat Intelligence.
Proceedings of the Risks and Security of Internet and Systems, 2017

2016
Component-Based Modelling for Scalable Smart City Systems Interoperability: A Case Study on Integrating Energy Demand Response Systems.
Sensors, 2016

Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management.
IET Inf. Secur., 2016

LP-Cache: Privacy-aware Cache Model for Location-based Apps.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

A Practical Encrypted Microprocessor.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Protecting Smartphone Users' Private Locations Through Caching.
Proceedings of the E-Business and Telecommunications - 13th International Joint Conference, 2016

2015
Providing SIEM systems with self-adaptation.
Inf. Fusion, 2015

ALOC: Attribute Level of Confidence for a User-Centric Attribute Assurance.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

2014
Component-based modelling for sustainable and scalable smart meter networks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Privacy Preservation in Location-Based Mobile Applications: Research Directions.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Anonymous authentication for privacy-preserving IoT target-driven applications.
Comput. Secur., 2013

Coalitional games for the management of anonymous access in online social networks.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

2012
A secure distance-based RFID identification protocol with an off-line back-end database.
Pers. Ubiquitous Comput., 2012

A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis.
Comput. Commun., 2012

The Peer's Dilemma: A general framework to examine cooperation in pure peer-to-peer systems.
Comput. Networks, 2012

2011
Artificial Immunity-based Correlation System.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Privacy-enhancing Cryptography-based Materials.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2010
Blind Steganalysis of Mp3stego.
J. Inf. Sci. Eng., 2010

Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol.
Proceedings of the Trust, 2010

A Simple Mechanism to Maintain Peer's Cooperativeness: The Peer's RPS Dilemma.
Proceedings of the 2010 International Conference on Internet Computing, 2010

2009
Automatic Rule Generation Based on Genetic Programming for Event Correlation.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

2008
Secure content access and replication in pure P2P networks.
Comput. Commun., 2008

2007
Bayesian Analysis of Secure P2P Sharing Protocols.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

2006
Certificate-based Access Control in Pure P2P Networks.
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2006

Security in P2P Networks: Survey and Research Directions.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

A P2P Content Authentication Protocol Based on Byzantine Agreement.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

A Protocol for Secure Content Distribution in Pure P2P Networks.
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006


  Loading...