José María de Fuentes

According to our database1, José María de Fuentes authored at least 34 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 





AndrODet: An adaptive Android obfuscation detector.
Future Generation Comp. Syst., 2019

Design recommendations for online cybersecurity courses.
Computers & Security, 2019

Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors.
Sensors, 2018

Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things.
Future Generation Comp. Syst., 2018

Attribute-Based Credentials for Privacy-Aware Smart Health Services in IoT-Based Smart Cities.
IEEE Computer, 2018

Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities.
Personal and Ubiquitous Computing, 2017

Recent Advances in Security and Privacy for Wireless Sensor Networks 2016.
J. Sensors, 2017

Encryption by Heart (EbH) - Using ECG for time-invariant symmetric key generation.
Future Generation Comp. Syst., 2017

PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing.
Computers & Security, 2017

SoNeUCONABCPro: An Access Control Model for Social Networks with Translucent User Provenance.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Framework for Acquiring and Analyzing Traces from Cryptographic Devices.
Proceedings of the Security and Privacy in Communication Networks, 2017

TriFlow: Triaging Android Applications using Speculative Information Flows.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Privacy Models in Wireless Sensor Networks: A Survey.
J. Sensors, 2016

PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things.
J. Network and Computer Applications, 2016

ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments.
Proceedings of the Security and Privacy in Communication Networks, 2016

Recent Advances in Security and Privacy for Wireless Sensor Networks.
J. Sensors, 2015

Probabilistic yoking proofs for large scale IoT systems.
Ad Hoc Networks, 2015

Access Control for the Cloud Based on Multi-device Authentication.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Extended U+F Social Network Protocol: Interoperability, reusability, data protection and indirect relationships in Web Based Social Networks.
Journal of Systems and Software, 2014

Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles.
IJDSN, 2014

SoNeUCONABC, an expressive usage control model for Web-Based Social Networks.
Computers & Security, 2014

CooPeD: Co-owned Personal Data management.
Computers & Security, 2014

AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps.
Proceedings of the 13th IEEE International Conference on Trust, 2014

User-Managed Access Control in Web Based Social Networks.
Proceedings of the Security and Privacy Preserving in Social Networks, 2013

WEVAN - A mechanism for evidence creation and verification in VANETs.
Journal of Systems Architecture - Embedded Systems Design, 2013

Leveraging Quiz-based Multiple-prize Web Tournaments for Reinforcing Routine Mathematical Skills.
Educational Technology & Society, 2013

A taxonomy and survey of attacks on digital signatures.
Computers & Security, 2013

Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations.
Ad Hoc Networks, 2013

A framework for avoiding steganography usage over HTTP.
J. Network and Computer Applications, 2012

U+F Social Network Protocol: Achieving Interoperability and Reusability between Web Based Social Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

POSTER Towards a Privacy - Respectful Telematic Verification System for Vehicle and Driver Authorizations.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2011

L-PEP: A Logic to Reason about Privacy-Enhancing Cryptography Protocols.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

Automatic Rule Generation Based on Genetic Programming for Event Correlation.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies.
Proceedings of the The Third International Conference on Availability, 2008