Javier Lopez

According to our database1, Javier Lopez
  • authored at least 82 papers between 1999 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Wireless Big Data: Technologies and Applications.
IEEE Wireless Commun., 2018

Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges.
Future Generation Comp. Syst., 2018

Security, privacy and trust of user-centric solutions.
Future Generation Comp. Syst., 2018

Access control for cyber-physical systems interconnected to the cloud.
Computer Networks, 2018

2017
OCPP Protocol: Security Threats and Challenges.
IEEE Trans. Smart Grid, 2017

Dynamic Knowledge-Based Analysis in Nonsecure 5G Green Environments Using Contextual Data.
IEEE Systems Journal, 2017

Recommender system for privacy-preserving solutions in smart metering.
Pervasive and Mobile Computing, 2017

HGVA: the Human Genome Variation Archive.
Nucleic Acids Research, 2017

Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation.
J. Network and Computer Applications, 2017

Modelling trust dynamics in the Internet of Things.
Inf. Sci., 2017

Evolving privacy: From sensors to the Internet of Things.
Future Generation Comp. Syst., 2017

Editorial: Special issue on security data science and cyber threat management.
Computers & Security, 2017

Resilient interconnection in cyber-physical control systems.
Computers & Security, 2017

Digital Witness and Privacy in IoT: Anonymous Witnessing Approach.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Methodology for Privacy-Aware IoT-Forensics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Modeling Malware-driven Honeypots.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

Analysis of Intrusion Detection Systems in Industrial Ecosystems.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Query Privacy in Sensing-as-a-Service Platforms.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Network Anomaly Detection in Critical Infrastructure Based on Mininet Network Simulator.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

Preventing Advanced Persistent Threats in Complex Control Networks.
Proceedings of the Computer Security - ESORICS 2017, 2017

The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Cybersecurity of Wearable Devices: An Experimental Analysis and a Vulnerability Assessment Method.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
On the application of generic CCA-secure transformations to proxy re-encryption.
Security and Communication Networks, 2016

Digital Witness: Safeguarding Digital Evidence by Using Secure Architectures in Personal Devices.
IEEE Network, 2016

A model-driven approach for engineering trust and reputation into software services.
J. Network and Computer Applications, 2016

Attacks to a proxy-mediated key agreement protocol based on symmetric encryption.
IACR Cryptology ePrint Archive, 2016

A Parametric Family of Attack Models for Proxy Re-Encryption.
IACR Cryptology ePrint Archive, 2016

Digital Witness: Digital Evidence Management Framework for the Internet of Things.
ERCIM News, 2016

Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges.
CoRR, 2016

Privacy-Aware Trust Negotiation.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control Systems.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Safeguarding Structural Controllability in Cyber-Physical Control Systems.
Proceedings of the Computer Security - ESORICS 2016, 2016

Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems.
Proceedings of the Critical Information Infrastructures Security, 2016

2015
A Parametric Family of Attack Models for Proxy Re-encryption.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Engineering Trust-Awareness and Self-adaptability in Services and Systems.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Security and QoS tradeoff recommendation system (SQT-RS) for dynamic assessing CPRM-based systems.
Proceedings of the Q2SWinet'14, 2014

Privacy-Preserving Identity Management as a Service.
Proceedings of the Accountability and Security in the Cloud, 2014

2013
Preface.
Computers & Mathematics with Applications, 2013

Towards Trust-Aware and Self-adaptive Systems.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

2012
Complete description of a heavy hailstorm over the Basque Country providing a 3D representation of lightning detections and weather radar data.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

2010
Editorial ESORICS 2007.
ACM Trans. Inf. Syst. Secur., 2010

Editorial.
J. Intelligent Manufacturing, 2010

3G HSPA for Broadband Communications with High Speed Vehicles.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010

2009
Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents.
J. UCS, 2009

2008
Fair Traceable Multi-Group Signatures.
IACR Cryptology ePrint Archive, 2008

2007
Implementation aspects of a delegation system.
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007

Attribute delegation in ubiquitous environments.
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007

Ksensor: Multithreaded kernel-level probe for passive QoS monitoring.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007

On the Protection and Technologies of Critical Information Infrastructures.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Featuring trust and reputation management systems for constrained hardware devices.
Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, 2007

2006
Unleashing public-key cryptography in wireless sensor networks.
Journal of Computer Security, 2006

A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Attribute Delegation Based on Ontologies and Context Information.
Proceedings of the Communications and Multimedia Security, 2006

2005
Casual virtual private network.
Comput. Syst. Sci. Eng., 2005

Trust, privacy and security in digital business.
Comput. Syst. Sci. Eng., 2005

Editorial.
Comput. Syst. Sci. Eng., 2005

Protection Against Spam Using Pre-Challenges.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

A Representation Model of Trust Relationships with Delegation Extensions.
Proceedings of the Trust Management, Third International Conference, 2005

On the Security of Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2005

2004
A framework for secure execution of software.
Int. J. Inf. Sec., 2004

PKI design based on the use of on-line certification authorities.
Int. J. Inf. Sec., 2004

A First Approach to Provide Anonymity in Attribute Certificates.
Proceedings of the Public Key Cryptography, 2004

2003
Applying SDL to Formal Analysis of Security Systems.
Proceedings of the SDL 2003: System Design, 2003

Towards a Business Process-Driven Framework for Security Engineering with the UML.
Proceedings of the Information Security, 6th International Conference, 2003

High-level specification of security systems.
Proceedings of the Global Telecommunications Conference, 2003

Applying the Semantic Web Layers to Access Control.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

How to Specify Security Services: A Practical Approach.
Proceedings of the Communications and Multimedia Security, 2003

2002
Verification of Authentication Protocols using SDL-method.
Proceedings of the Security in Information Systems, 2002

A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI.
Proceedings of the Information Security, 5th International Conference, 2002

Protocol Engineering Applied to Formal Analysis of Security Systems.
Proceedings of the Infrastructure Security, International Conference, 2002

Design of a VPN Software Solution Integrating TCP and UDP Services.
Proceedings of the Infrastructure Security, International Conference, 2002

Access Control Infrastructure for Digital Objects.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Secure Content Distribution for Digital Libraries.
Proceedings of the Digital Libraries: People, 2002

Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations.
Proceedings of the Electronic Government, First International Conference, 2002

XML-Based Distributed Access Control System.
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002

Message from the TrustBus Workshop Chairs.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

2001
Suitability of a Classical Analysis Method for E-commerce Protocols.
Proceedings of the Information Security, 4th International Conference, 2001

2000
Development of Secure Internet Applications for Governmental Environments.
Proceedings of the 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 2000

Distributed Storage and Revocation in Digital Certificate Databases.
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000

1999
Cert'eM: Certification System Based on Electronic Mail Service Structure.
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999


  Loading...