Javier López
Orcid: 0000-0001-8066-9991Affiliations:
- University of Málaga, Spain
According to our database1,
Javier López
authored at least 274 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on lcc.uma.es
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Emerg. Top. Comput., 2024
Comput. Secur., 2024
2023
Comput. Sci. Rev., August, 2023
Comput. Secur., June, 2023
IEEE Netw., 2023
IEEE Secur. Priv., 2023
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
2022
IEEE Commun. Surv. Tutorials, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the ICT Systems Security and Privacy Protection, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
2021
Proceedings of the Advancing Research in Information and Communication Technology, 2021
IEEE Wirel. Commun., 2021
J. Inf. Secur. Appl., 2021
2020
IEEE Trans. Ind. Informatics, 2020
J. Parallel Distributed Comput., 2020
Hum. centric Comput. Inf. Sci., 2020
Proceedings of the Network and System Security - 14th International Conference, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
IEEE Internet Things J., 2019
IET Inf. Secur., 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Critical Information Infrastructures Security, 2019
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
2018
IEEE Syst. J., 2018
Sensors, 2018
KSII Trans. Internet Inf. Syst., 2018
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services.
IEEE Commun. Surv. Tutorials, 2018
Comput. Networks, 2018
Proceedings of the Trust, Privacy and Security in Digital Business, 2018
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
2017
Dynamic Knowledge-Based Analysis in Nonsecure 5G Green Environments Using Contextual Data.
IEEE Syst. J., 2017
Pervasive Mob. Comput., 2017
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation.
J. Netw. Comput. Appl., 2017
Future Gener. Comput. Syst., 2017
Comput. Secur., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Network Anomaly Detection in Critical Infrastructure Based on Mininet Network Simulator.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the Critical Information Infrastructures Security, 2017
Cybersecurity of Wearable Devices: An Experimental Analysis and a Vulnerability Assessment Method.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
2016
Secur. Commun. Networks, 2016
Digital Witness: Safeguarding Digital Evidence by Using Secure Architectures in Personal Devices.
IEEE Netw., 2016
J. Netw. Comput. Appl., 2016
Policy enforcement system for secure interoperable control in distributed Smart Grid systems.
J. Netw. Comput. Appl., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
ERCIM News, 2016
Proceedings of the Security and Trust Management - 12th International Workshop, 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Critical Information Infrastructures Security, 2016
CRC Press / Taylor & Francis, ISBN: 9781498776332, 2016
2015
Inf. Sci., 2015
Contextualising heterogeneous information in unified communications with security restrictions.
Comput. Commun., 2015
Comput. Electr. Eng., 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014
Guest editorial to the Special Issue on Component-Based Software Engineering and Software Architecture.
Sci. Comput. Program., 2014
Secur. Commun. Networks, 2014
Mob. Networks Appl., 2014
WASAM: A dynamic wide-area situational awareness model for critical domains in Smart Grids.
Future Gener. Comput. Syst., 2014
Comput. Stand. Interfaces, 2014
Comput. Secur., 2014
Security and QoS tradeoff recommendation system (SQT-RS) for dynamic assessing CPRM-based systems.
Proceedings of the Q2SWinet'14, 2014
Proceedings of the Information Security Practice and Experience, 2014
A Context-based Parametric Relationship Model (CPRM) to measure the Security and QoS tradeoff in configurable environments.
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
Proceedings of the Accountability and Security in the Cloud, 2014
2013
Secur. Commun. Networks, 2013
Requir. Eng., 2013
Math. Comput. Model., 2013
Computer, 2013
Comput. Secur., 2013
On the features and challenges of security and privacy in distributed internet of things.
Comput. Networks, 2013
Security of industrial sensor network-based remote substations in the context of the Internet of Things.
Ad Hoc Networks, 2013
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
Proceedings of the Foundations of Security Analysis and Design VII, 2013
Proceedings of the Critical Information Infrastructures Security, 2013
Proceedings of the Advanced Information Systems Engineering Workshops, 2013
2012
Proceedings of the Critical Infrastructure Protection, 2012
Wirel. Commun. Mob. Comput., 2012
Int. J. Crit. Infrastructure Prot., 2012
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
Building Trust and Reputation In: A Development Framework for Trust Models Implementation.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012
Trust & security RTD in the internet of things: opportunities for international cooperation.
Proceedings of the First International Conference on Security of Internet of Things, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the Trusted Systems, 4th International Conference, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Traffic Classifier for Heterogeneous and Cooperative Routing through Wireless Sensor Networks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
A cross-layer approach for integrating security mechanisms in sensor networks architectures.
Wirel. Commun. Mob. Comput., 2011
IEEE Trans. Smart Grid, 2011
J. Syst. Archit., 2011
J. Netw. Comput. Appl., 2011
IET Commun., 2011
IEICE Trans. Inf. Syst., 2011
Concurr. Comput. Pract. Exp., 2011
Concurr. Comput. Pract. Exp., 2011
Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks.
Comput. J., 2011
Comput. Electr. Eng., 2011
Proceedings of the Security and Trust Management - 7th International Workshop, 2011
Proceedings of the Future Internet, 2011
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010
IEEE Trans. Syst. Man Cybern. Part C, 2010
Sensors, 2010
J. Univers. Comput. Sci., 2010
J. Comput. Secur., 2010
Inf. Softw. Technol., 2010
Comput. Stand. Interfaces, 2010
Comput. Secur., 2010
Comput. Commun., 2010
A Study of Security Approaches for the Development of Mobile Grid Systems.
Proceedings of the ICSOFT 2010, 2010
Proceedings of the Critical Information Infrastructures Security, 2010
2009
Advances in Information Security 43, Springer, ISBN: 978-0-387-75629-5, 2009
Next generation wireless communications and mobile computing/networking technologies.
Wirel. Commun. Mob. Comput., 2009
Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents.
J. Univers. Comput. Sci., 2009
Internet Res., 2009
Int. J. Grid High Perform. Comput., 2009
Concurrent access control for multi-user and multi-processor systems based on trust relationships.
Concurr. Comput. Pract. Exp., 2009
Proceedings of the Trust, 2009
Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros.
Proceedings of the XIV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2009), 2009
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009
Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks.
Proceedings of the Foundations of Security Analysis and Design V, 2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application.
Proceedings of the Advances in Conceptual Modeling - Challenging Perspectives, 2009
Proceedings of the 2009 International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2009
Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros.
Proceedings of the Memorias de la XII Conferencia Iberoamericana de Software Engineering (CIbSE 2009), 2009
2008
Proceedings of the 4th International Workshop on Security and Trust Management, 2008
Comput. Stand. Interfaces, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
KeyLED - transmitting sensitive data over out-of-band channels in wireless sensor networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008
Engineering Process Based on Grid Use Cases for Mobile Grid Systems.
Proceedings of the ICSOFT 2008, 2008
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices.
Proceedings of the The Third International Conference on Availability, 2008
2007
Telecommun. Syst., 2007
A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes.
Mob. Networks Appl., 2007
Inf. Secur. Tech. Rep., 2007
The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection.
Inf. Secur. Tech. Rep., 2007
Inf. Secur. Tech. Rep., 2007
A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks.
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Foundations of Security Analysis and Design IV, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, 2007
2006
Telematics Informatics, 2006
A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the Second International Workshop on Security, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Communications and Multimedia Security, 2006
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
Casual virtual private network.
Comput. Syst. Sci. Eng., 2005
Trust, privacy and security in digital business.
Comput. Syst. Sci. Eng., 2005
Editorial.
Comput. Syst. Sci. Eng., 2005
Comput. Stand. Interfaces, 2005
Protection Against Spam Using Pre-Challenges.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the Advances in Informatics, 2005
Proceedings of the Trust Management, Third International Conference, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Public Key Infrastructure, 2005
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
2004
Int. J. Inf. Sec., 2004
Comput. Secur., 2004
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the 5th International Conference on Computer Systems and Technologies, 2004
Proceedings of the working conference on Advanced visual interfaces, 2004
2003
Int. J. Inf. Sec., 2003
Virtual certificates and synthetic certificates: new paradigms for improving public key validation.
Comput. Commun., 2003
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003
A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the SDL 2003: System Design, 2003
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Global Telecommunications Conference, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
Proceedings of the Communications and Multimedia Security, 2003
2002
Verification of Authentication Protocols using SDL-method.
Proceedings of the Security in Information Systems, 2002
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI.
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Infrastructure Security, International Conference, 2002
Proceedings of the Infrastructure Security, International Conference, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Digital Libraries: People, 2002
Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations.
Proceedings of the Electronic Government, First International Conference, 2002
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
2001
Proceedings of the Information Security, 4th International Conference, 2001
2000
Proceedings of the 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 2000
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000
1999
Proceedings of the Information Security, Second International Workshop, 1999
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999
1998
Secure Examinations through the Internet.
Proceedings of the Teleteaching '98 - Distance Learning, 1998