José María de Fuentes
According to our database1, José María de Fuentes
Legend:Book In proceedings Article PhD thesis Other
Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things.
Future Generation Comp. Syst., 2018
Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities.
Personal and Ubiquitous Computing, 2017
Recent Advances in Security and Privacy for Wireless Sensor Networks 2016.
J. Sensors, 2017
Encryption by Heart (EbH) - Using ECG for time-invariant symmetric key generation.
Future Generation Comp. Syst., 2017
PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing.
Computers & Security, 2017
TriFlow: Triaging Android Applications using Speculative Information Flows.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Privacy Models in Wireless Sensor Networks: A Survey.
J. Sensors, 2016
PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things.
J. Network and Computer Applications, 2016
ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments.
Proceedings of the Security and Privacy in Communication Networks, 2016
Recent Advances in Security and Privacy for Wireless Sensor Networks.
J. Sensors, 2015
Probabilistic yoking proofs for large scale IoT systems.
Ad Hoc Networks, 2015
Access Control for the Cloud Based on Multi-device Authentication.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Extended U+F Social Network Protocol: Interoperability, reusability, data protection and indirect relationships in Web Based Social Networks.
Journal of Systems and Software, 2014
Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles.
SoNeUCONABC, an expressive usage control model for Web-Based Social Networks.
Computers & Security, 2014
CooPeD: Co-owned Personal Data management.
Computers & Security, 2014
User-Managed Access Control in Web Based Social Networks.
Proceedings of the Security and Privacy Preserving in Social Networks, 2013
WEVAN - A mechanism for evidence creation and verification in VANETs.
Journal of Systems Architecture - Embedded Systems Design, 2013
Leveraging Quiz-based Multiple-prize Web Tournaments for Reinforcing Routine Mathematical Skills.
Educational Technology & Society, 2013
A taxonomy and survey of attacks on digital signatures.
Computers & Security, 2013
Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations.
Ad Hoc Networks, 2013
A framework for avoiding steganography usage over HTTP.
J. Network and Computer Applications, 2012
U+F Social Network Protocol: Achieving Interoperability and Reusability between Web Based Social Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012
POSTER Towards a Privacy - Respectful Telematic Verification System for Vehicle and Driver Authorizations.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2011
L-PEP: A Logic to Reason about Privacy-Enhancing Cryptography Protocols.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010
Automatic Rule Generation Based on Genetic Programming for Event Correlation.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009
CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies.
Proceedings of the The Third International Conference on Availability, 2008