Javier López

According to our database1, Javier López
  • authored at least 153 papers between 1999 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Cyber Stealth Attacks in Critical Information Infrastructures.
IEEE Systems Journal, 2018

IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations.
Sensors, 2018

Addressing Security in OCPP: Protection Against Man-in-the-Middle Attacks.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

2017
OCPP Protocol: Security Threats and Challenges.
IEEE Trans. Smart Grid, 2017

Recommender system for privacy-preserving solutions in smart metering.
Pervasive and Mobile Computing, 2017

Resilient interconnection in cyber-physical control systems.
Computers & Security, 2017

Analysis of Intrusion Detection Systems in Industrial Ecosystems.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

From SMOG to Fog: A security perspective.
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017

Preventing Advanced Persistent Threats in Complex Control Networks.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Policy enforcement system for secure interoperable control in distributed Smart Grid systems.
J. Network and Computer Applications, 2016

Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control Systems.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Safeguarding Structural Controllability in Cyber-Physical Control Systems.
Proceedings of the Computer Security - ESORICS 2016, 2016

Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems.
Proceedings of the Critical Information Infrastructures Security, 2016

Location Privacy in Wireless Sensor Networks.
CRC Press / Taylor & Francis, ISBN: 9781498776332, 2016

2015
Relay selection for secure 5G green communications.
Telecommunication Systems, 2015

Probabilistic receiver-location privacy protection in wireless sensor networks.
Inf. Sci., 2015

A three-stage analysis of IDS for critical infrastructures.
Computers & Security, 2015

Contextualising heterogeneous information in unified communications with security restrictions.
Computer Communications, 2015

Awareness and reaction strategies for critical infrastructure protection.
Computers & Electrical Engineering, 2015

2014
Guest editorial to the Special Issue on Component-Based Software Engineering and Software Architecture.
Sci. Comput. Program., 2014

Analysis and taxonomy of security/QoS tradeoff solutions for the future internet.
Security and Communication Networks, 2014

A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms.
MONET, 2014

WASAM: A dynamic wide-area situational awareness model for critical domains in Smart Grids.
Future Generation Comp. Syst., 2014

Building trust from context similarity measures.
Computer Standards & Interfaces, 2014

Diagnosis mechanism for accurate monitoring in critical infrastructure protection.
Computer Standards & Interfaces, 2014

A practical solution for sealed bid and multi-currency auctions.
Computers & Security, 2014

Preserving Receiver-Location Privacy in Wireless Sensor Networks.
Proceedings of the Information Security Practice and Experience, 2014

A Context-based Parametric Relationship Model (CPRM) to measure the Security and QoS tradeoff in configurable environments.
Proceedings of the IEEE International Conference on Communications, 2014

Delegated Access for Hadoop Clusters in the Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

2013
(Un)Suitability of Anonymous Communication Systems to WSN.
IEEE Systems Journal, 2013

User-centric secure integration of personal RFID tags and sensor networks.
Security and Communication Networks, 2013

A framework for enabling trust requirements in social cloud applications.
Requir. Eng., 2013

Secure sealed-bid online auctions using discreet cryptographic proofs.
Mathematical and Computer Modelling, 2013

Wide-Area Situational Awareness for Critical Infrastructure Protection.
IEEE Computer, 2013

Covert communications through network configuration messages.
Computers & Security, 2013

Smart control of operational threats in control substations.
Computers & Security, 2013

A privacy-aware continuous authentication scheme for proximity-based access control.
Computers & Security, 2013

On the features and challenges of security and privacy in distributed internet of things.
Computer Networks, 2013

Security of industrial sensor network-based remote substations in the context of the Internet of Things.
Ad Hoc Networks, 2013

Location Privacy in WSNs: Solutions, Challenges, and Future Trends.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

Towards Automatic Critical Infrastructure Protection through Machine Learning.
Proceedings of the Critical Information Infrastructures Security, 2013

Towards Engineering Trust-Aware Future Internet Systems.
Proceedings of the Advanced Information Systems Engineering Workshops, 2013

2012
Overview of Critical Information Infrastructure Protection.
Proceedings of the Critical Infrastructure Protection, 2012

On the energy cost of authenticated key agreement in wireless sensor networks.
Wireless Communications and Mobile Computing, 2012

Preface.
Journal of Computer Security, 2012

Advanced secure multimedia services for digital homes.
Information Systems Frontiers, 2012

Analysis of requirements for critical control systems.
IJCIP, 2012

Selecting key management schemes for WSN applications.
Computers & Security, 2012

A Conceptual Framework for Trust Models.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Building Trust and Reputation In: A Development Framework for Trust Models Implementation.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Trust & security RTD in the internet of things: opportunities for international cooperation.
Proceedings of the First International Conference on Security of Internet of Things, 2012

HIDE_DHCP: Covert Communications through Network Configuration Messages.
Proceedings of the Information Security and Privacy Research, 2012

Addressing Situational Awareness in Critical Domains of a Smart Grid.
Proceedings of the Network and System Security - 6th International Conference, 2012

Security in the Distributed Internet of Things.
Proceedings of the Trusted Systems, 4th International Conference, 2012

A Novel Key Update Protocol in Mobile Sensor Networks.
Proceedings of the Information Systems Security, 8th International Conference, 2012

A Task Ordering Approach for Automatic Trust Establishment.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN.
Proceedings of the Computer Security - ESORICS 2012, 2012

Accountability for cloud and other future Internet services.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Security and QoS Tradeoffs: Towards a FI Perspective.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Traffic Classifier for Heterogeneous and Cooperative Routing through Wireless Sensor Networks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
A cross-layer approach for integrating security mechanisms in sensor networks architectures.
Wireless Communications and Mobile Computing, 2011

An Early Warning System Based on Reputation for Energy Control Systems.
IEEE Trans. Smart Grid, 2011

A methodology for security assurance-driven system development.
Requir. Eng., 2011

Security services architecture for Secure Mobile Grid Systems.
Journal of Systems Architecture - Embedded Systems Design, 2011

Systematic design of secure Mobile Grid systems.
J. Network and Computer Applications, 2011

Real-time location and inpatient care systems based on passive RFID.
J. Network and Computer Applications, 2011

Analysis of location privacy solutions in wireless sensor networks.
IET Communications, 2011

Special Issue: Securing Distributed Networks and Systems.
Concurrency and Computation: Practice and Experience, 2011

Secure SCADA framework for the protection of energy control systems.
Concurrency and Computation: Practice and Experience, 2011

Securing the Internet of Things.
IEEE Computer, 2011

Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks.
Comput. J., 2011

Key management systems for sensor networks in the context of the Internet of Things.
Computers & Electrical Engineering, 2011

Secure Architecure for the Integration of RFID and Sensors in Personal Networks.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers
, 2011

Engineering Secure Future Internet Services.
Proceedings of the Future Internet, 2011

Managing Incidents in Smart Grids à la Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

SenseKey - Simplifying the Selection of Key Management Schemes for Sensor Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2010

Authentication and Key Establishment in Dynamic Wireless Sensor Networks.
Sensors, 2010

JCS special issue on EU-funded ICT research on Trust and Security.
Journal of Computer Security, 2010

Analysis of Secure Mobile Grid Systems: A systematic approach.
Information & Software Technology, 2010

A security framework for a workflow-based grid development platform.
Computer Standards & Interfaces, 2010

Editorial.
Computers & Security, 2010

Pervasive authentication and authorization infrastructures for mobile users.
Computers & Security, 2010

Certified electronic mail: Properties revisited.
Computers & Security, 2010

Trust management systems for wireless sensor networks: Best practices.
Computer Communications, 2010

A scale based trust model for multi-context environments.
Computers & Mathematics with Applications, 2010

Early Warning System for Cascading Effect Control in Energy Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2010

2009
Secure Multi-Party Non-Repudiation Protocols and Applications
Advances in Information Security 43, Springer, ISBN: 978-0-387-75629-5, 2009

Next generation wireless communications and mobile computing/networking technologies.
Wireless Communications and Mobile Computing, 2009

Integrating wireless sensor networks and the internet: a security analysis.
Internet Research, 2009

An Evolutionary Trust and Distrust Model.
Electr. Notes Theor. Comput. Sci., 2009

Concurrent access control for multi-user and multi-processor systems based on trust relationships.
Concurrency and Computation: Practice and Experience, 2009

Editorial.
Computers & Security, 2009

Secure multiparty payment with an intermediary entity.
Computers & Security, 2009

Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems.
Proceedings of the Trust, 2009

Reusable security use cases for mobile grid environments.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks.
Proceedings of the Foundations of Security Analysis and Design V, 2009

A Multidimensional Reputation Scheme for Identity Federations.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application.
Proceedings of the Advances in Conceptual Modeling - Challenging Perspectives, 2009

Security assurance during the software development cycle.
Proceedings of the 2009 International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2009

2008
Enabling Attribute Delegation in Ubiquitous Environments.
MONET, 2008

Multiparty nonrepudiation: A survey.
ACM Comput. Surv., 2008

Anonymity analysis in credentials-based systems: A formal framework.
Computer Standards & Interfaces, 2008

Situation awareness mechanisms for wireless sensor networks.
IEEE Communications Magazine, 2008

A Model for Trust Metrics Analysis.
Proceedings of the Trust, 2008

An Asynchronous Node Replication Attack in Wireless Sensor Networks.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

KeyLED - transmitting sensitive data over out-of-band channels in wireless sensor networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Delegating Privileges over Finite Resources: A Quota Based Delegation Approach.
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008

Fair Traceable Multi-Group Signatures.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices.
Proceedings of the The Third International Conference on Availability, 2008

2007
Integration of non-repudiation services in mobile DRM scenarios.
Telecommunication Systems, 2007

A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes.
MONET, 2007

An effective multi-layered defense framework against spam.
Inf. Sec. Techn. Report, 2007

The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection.
Inf. Sec. Techn. Report, 2007

On the deployment of a real scalable delegation service.
Inf. Sec. Techn. Report, 2007

A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks.
Proceedings of the Third International Workshop on Security, 2007

Estimation of TTP Features in Non-repudiation Service.
Proceedings of the Computational Science and Its Applications, 2007

On the Protection and Technologies of Critical Information Infrastructures.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

2006
Specification of a framework for the anonymous use of privileges.
Telematics and Informatics, 2006

Anonymous attribute certificates based on traceable signatures.
Internet Research, 2006

Preface.
Int. J. Inf. Sec., 2006

An anti-spam scheme using pre-challenges.
Computer Communications, 2006

Service-Oriented Security Architecture for CII based on Sensor Networks.
Proceedings of the Second International Workshop on Security, 2006

A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Graphical Representation of Authorization Policies for Weighted Credentials.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
A metadata-based access control model for web services.
Internet Research, 2005

Why have public key infrastructures failed so far?
Internet Research, 2005

Optimized multi-party certified email protocols.
Inf. Manag. Comput. Security, 2005

Security protocols analysis: A SDL-based approach.
Computer Standards & Interfaces, 2005

Specification and design of advanced authentication and authorization services.
Computer Standards & Interfaces, 2005

Trust, Privacy and Security in E-Business: Requirements and Solutions.
Proceedings of the Advances in Informatics, 2005

Attacking an Asynchronous Multi-party Contract Signing Protocol.
Proceedings of the Progress in Cryptology, 2005

Classifying Public Key Certificates.
Proceedings of the Public Key Infrastructure, 2005

On Secure Profiling.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

A Novel Method to Maintain Privacy in Mobile Agent Applications.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
Agent-mediated non-repudiation protocols.
Electronic Commerce Research and Applications, 2004

Authentication and authorization infrastructures (AAIs): a comparative survey.
Computers & Security, 2004

Non-repudiation protocols for multiple entities.
Computer Communications, 2004

Analysis of a Free Roaming Agent Result-Truncation Defense Scheme.
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004

Timeout Estimation Using a Simulation Model for Non-repudiation Protocols.
Proceedings of the Computational Science and Its Applications, 2004

Sorting out sorting through concretization with robotics.
Proceedings of the working conference on Advanced visual interfaces, 2004

2003
A secure solution for commercial digital libraries.
Online Information Review, 2003

Analysis of e-commerce protocols: Adapting a traditional technique.
Int. J. Inf. Sec., 2003

Integrating PMI services in CORBA applications.
Computer Standards & Interfaces, 2003

Virtual certificates and synthetic certificates: new paradigms for improving public key validation.
Computer Communications, 2003

Intermediary Non-repudiation Protocols.
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003

A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Practical Service Charge for P2P Content Distribution.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

1999
Implementation of Virtual Private Networks at the Transport Layer.
Proceedings of the Information Security, Second International Workshop, 1999

Efficient Detection of Failure Modes in Electronic Commerce Protocols.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999


  Loading...