Helena Rifà-Pous

Orcid: 0000-0003-0923-0235

According to our database1, Helena Rifà-Pous authored at least 39 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Signature-Based Wireless Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks.
IEEE Access, 2024

2023
Anomaly-based cyberattacks detection for smart homes: A systematic literature review.
Internet Things, July, 2023

From False-Free to Privacy-Oriented Communitarian Microblogging Social Networks.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Multi-channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks and Their Attack Signatures.
Proceedings of the Computer, Communication, and Signal Processing. AI, Knowledge Engineering and IoT for Smart Systems, 2023

2022
Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks: A state of the art review.
Expert Syst. Appl., 2022

2021
Collaborative and efficient privacy-preserving critical incident management system.
Expert Syst. Appl., 2021

2019
Privacy Analysis on Microblogging Online Social Networks: A Survey.
ACM Comput. Surv., 2019

SeVEP: Secure and Verifiable Electronic Polling System.
IEEE Access, 2019

IPAM: Information Privacy Assessment Metric in Microblogging Online Social Networks.
IEEE Access, 2019

2018
Difficulties and Challenges of Anomaly Detection in Smart Cities: A Laboratory Analysis.
Sensors, 2018

VSPReP: Verifiable, Secure and Privacy-Preserving Remote Polling with Untrusted Computing Devices.
Proceedings of the Future Network Systems and Security - 4th International Conference, 2018

2017
Attack Classification Schema for Smart City WSNs.
Sensors, 2017

On Improving Automated Self-assessment with Moodle Quizzes: Experiences from a Cryptography Course.
Proceedings of the Technology Enhanced Assessment, 20th International Conference, 2017

2016
A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks.
Sensors, 2016

PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting.
J. Netw. Comput. Appl., 2016

Enabling Collaborative Privacy in User-Generated Emergency Reports.
Proceedings of the Privacy in Statistical Databases, 2016

State-of-the-art, challenges and open issues in integrating security and privacy in P2P content distribution systems.
Proceedings of the Eleventh International Conference on Digital Information Management, 2016

2015
A Cognitive-Radio-Based Method for Improving Availability in Body Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Framework for preserving security and privacy in peer-to-peer content distribution systems.
Expert Syst. Appl., 2015

An architecture for the analysis and detection of anomalies in smart city WSNs.
Proceedings of the IEEE First International Smart Cities Conference, 2015

2012
Review of Robust Cooperative Spectrum Sensing Techniques for Cognitive Radio Networks.
Wirel. Pers. Commun., 2012

HorNet: Microblogging for a Contributory Social Network.
IEEE Internet Comput., 2012

Recipients' Anonymity in Multihop Ad-Hoc Networks.
IEICE Trans. Inf. Syst., 2012

Authenticating hard decision sensing reports in cognitive radio networks.
Comput. Networks, 2012

2011
A Fair and Secure Cluster Formation Process for Ad Hoc Networks.
Wirel. Pers. Commun., 2011

Robust Detection of Incumbents in Cognitive Radio Networks Using Groups.
IEICE Trans. Commun., 2011

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices.
Future Internet, 2011

ℤ<sub>2</sub>ℤ<sub>4</sub>-additive perfect codes in Steganography.
Adv. Math. Commun., 2011

A secure and anonymous cooperative sensing protocol for cognitive radio networks.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

Spectrum Sharing Models in Cognitive Radio Networks.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011

Anonymous reputation based reservations in e-commerce (amnesic).
Proceedings of the 13th International Conference on Electronic Commerce, 2011

2010
Perfect Z2Z4-linear codes in Steganography
CoRR, 2010

2009
Cryptographic Energy Costs Are Assumable in Ad Hoc Networks.
IEICE Trans. Inf. Syst., 2009

Product perfect codes and steganography.
Digit. Signal Process., 2009

A Secure Mobile-Based Authentication System for e-Banking.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

2007
A Forwarding Spurring Protocol for Multihop Ad Hoc Networks (FURIES).
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007

An Interdomain PKI Model Based on Trust Lists.
Proceedings of the Public Key Infrastructure, 2007

Secure Dynamic MANET On-demand (SEDYMO) Routing Protocol.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

2006
A Service Oriented Trust Development Platform.
Proceedings of the ISSE 2006, 2006


  Loading...