Javier López

According to our database1, Javier López authored at least 89 papers between 1998 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Wireless Big Data: Technologies and Applications.
IEEE Wireless Commun., 2018

Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges.
Future Generation Comp. Syst., 2018

Security, privacy and trust of user-centric solutions.
Future Generation Comp. Syst., 2018

Access control for cyber-physical systems interconnected to the cloud.
Computer Networks, 2018

A Trust-by-Design Framework for the Internet of Things.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Policy Languages and Their Suitability for Trust Negotiation.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

2017
Dynamic Knowledge-Based Analysis in Nonsecure 5G Green Environments Using Contextual Data.
IEEE Systems Journal, 2017

HGVA: the Human Genome Variation Archive.
Nucleic Acids Research, 2017

Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation.
J. Network and Computer Applications, 2017

Modelling trust dynamics in the Internet of Things.
Inf. Sci., 2017

Evolving privacy: From sensors to the Internet of Things.
Future Generation Comp. Syst., 2017

Editorial: Special issue on security data science and cyber threat management.
Computers & Security, 2017

Digital Witness and Privacy in IoT: Anonymous Witnessing Approach.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Methodology for Privacy-Aware IoT-Forensics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Query Privacy in Sensing-as-a-Service Platforms.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Network Anomaly Detection in Critical Infrastructure Based on Mininet Network Simulator.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Analysis of Cybersecurity Threats in Industry 4.0: The Case of Intrusion Detection.
Proceedings of the Critical Information Infrastructures Security, 2017

Cybersecurity of Wearable Devices: An Experimental Analysis and a Vulnerability Assessment Method.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
On the application of generic CCA-secure transformations to proxy re-encryption.
Security and Communication Networks, 2016

Digital Witness: Safeguarding Digital Evidence by Using Secure Architectures in Personal Devices.
IEEE Network, 2016

A model-driven approach for engineering trust and reputation into software services.
J. Network and Computer Applications, 2016

Attacks to a proxy-mediated key agreement protocol based on symmetric encryption.
IACR Cryptology ePrint Archive, 2016

A Parametric Family of Attack Models for Proxy Re-Encryption.
IACR Cryptology ePrint Archive, 2016

Digital Witness: Digital Evidence Management Framework for the Internet of Things.
ERCIM News, 2016

Towards user-centric operation in 5G networks.
EURASIP J. Wireless Comm. and Networking, 2016

Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges.
CoRR, 2016

Privacy-Aware Trust Negotiation.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

2015
A Parametric Family of Attack Models for Proxy Re-encryption.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Engineering Trust-Awareness and Self-adaptability in Services and Systems.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Security and QoS tradeoff recommendation system (SQT-RS) for dynamic assessing CPRM-based systems.
Proceedings of the Q2SWinet'14, 2014

Privacy-Preserving Identity Management as a Service.
Proceedings of the Accountability and Security in the Cloud, 2014

2013
Localization in Wireless Networks: The Potential of Triangulation Techniques.
Wireless Personal Communications, 2013

Preface.
Computers & Mathematics with Applications, 2013

Towards Trust-Aware and Self-adaptive Systems.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

2012
Complete description of a heavy hailstorm over the Basque Country providing a 3D representation of lightning detections and weather radar data.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

2011
Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid Systems.
IEICE Transactions, 2011

2010
Editorial ESORICS 2007.
ACM Trans. Inf. Syst. Secur., 2010

Developing a Secure Mobile Grid System through a UML Extension.
J. UCS, 2010

Editorial.
J. Intelligent Manufacturing, 2010

3G HSPA for Broadband Communications with High Speed Vehicles.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010

A Study of Security Approaches for the Development of Mobile Grid Systems.
Proceedings of the ICSOFT 2010, 2010

Motion planning for a novel reconfigurable parallel manipulator with lockable revolute joints.
Proceedings of the IEEE International Conference on Robotics and Automation, 2010

Two-Hand Virtual Object Manipulation Based on Networked Architecture.
Proceedings of the Haptics: Generating and Perceiving Tangible Sensations, 2010

2009
Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents.
J. UCS, 2009

Obtaining Security Requirements for a Mobile Grid System.
IJGHPC, 2009

Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros.
Proceedings of the XIV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2009), 2009

The FAST Platform: An Open and Semantically-Enriched Platform for Designing Multi-channel and Enterprise-Class Gadgets.
Proceedings of the Service-Oriented Computing, 7th International Joint Conference, 2009

Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros.
Proceedings of the Memorias de la XII Conferencia Iberoamericana de Software Engineering (CIbSE 2009), 2009

2008
Fair Traceable Multi-Group Signatures.
IACR Cryptology ePrint Archive, 2008

Enabling semantics-aware collaborative tagging and social search in an open interoperable tagosphere.
Proceedings of the iiWAS'2008, 2008

Engineering Process Based on Grid Use Cases for Mobile Grid Systems.
Proceedings of the ICSOFT 2008, 2008

2007
Implementation aspects of a delegation system.
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007

Attribute delegation in ubiquitous environments.
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007

Ksensor: Multithreaded kernel-level probe for passive QoS monitoring.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007

Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Featuring trust and reputation management systems for constrained hardware devices.
Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, 2007

2006
Unleashing public-key cryptography in wireless sensor networks.
Journal of Computer Security, 2006

A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Attribute Delegation Based on Ontologies and Context Information.
Proceedings of the Communications and Multimedia Security, 2006

2005
Casual virtual private network.
Comput. Syst. Sci. Eng., 2005

Trust, privacy and security in digital business.
Comput. Syst. Sci. Eng., 2005

Editorial.
Comput. Syst. Sci. Eng., 2005

Protection Against Spam Using Pre-Challenges.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

A Representation Model of Trust Relationships with Delegation Extensions.
Proceedings of the Trust Management, Third International Conference, 2005

On the Security of Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2005

2004
A framework for secure execution of software.
Int. J. Inf. Sec., 2004

PKI design based on the use of on-line certification authorities.
Int. J. Inf. Sec., 2004

A First Approach to Provide Anonymity in Attribute Certificates.
Proceedings of the Public Key Cryptography, 2004

2003
Applying SDL to Formal Analysis of Security Systems.
Proceedings of the SDL 2003: System Design, 2003

Towards a Business Process-Driven Framework for Security Engineering with the UML.
Proceedings of the Information Security, 6th International Conference, 2003

High-level specification of security systems.
Proceedings of the Global Telecommunications Conference, 2003

Applying the Semantic Web Layers to Access Control.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

How to Specify Security Services: A Practical Approach.
Proceedings of the Communications and Multimedia Security, 2003

2002
Verification of Authentication Protocols using SDL-method.
Proceedings of the Security in Information Systems, 2002

A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI.
Proceedings of the Information Security, 5th International Conference, 2002

Protocol Engineering Applied to Formal Analysis of Security Systems.
Proceedings of the Infrastructure Security, International Conference, 2002

Design of a VPN Software Solution Integrating TCP and UDP Services.
Proceedings of the Infrastructure Security, International Conference, 2002

Access Control Infrastructure for Digital Objects.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Secure Content Distribution for Digital Libraries.
Proceedings of the Digital Libraries: People, 2002

Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations.
Proceedings of the Electronic Government, First International Conference, 2002

XML-Based Distributed Access Control System.
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002

Message from the TrustBus Workshop Chairs.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

2001
Suitability of a Classical Analysis Method for E-commerce Protocols.
Proceedings of the Information Security, 4th International Conference, 2001

2000
Development of Secure Internet Applications for Governmental Environments.
Proceedings of the 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 2000

Distributed Storage and Revocation in Digital Certificate Databases.
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000

1999
Cert'eM: Certification System Based on Electronic Mail Service Structure.
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

1998
Secure Examinations through the Internet.
Teleteaching, 1998


  Loading...