Miguel Soriano

Orcid: 0000-0003-0457-8531

According to our database1, Miguel Soriano authored at least 99 papers between 1993 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Efficient <i>k</i>-anonymous microaggregation of multivariate numerical data via principal component analysis.
Inf. Sci., 2019

2018
Incremental k-Anonymous Microaggregation in Large-Scale Electronic Surveys With Optimized Scheduling.
IEEE Access, 2018

2017
p-Probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation.
Inf. Sci., 2017

2016
k-Anonymous microaggregation with preservation of statistical dependence.
Inf. Sci., 2016

Providing k-anonymity and revocation in ubiquitous VANETs.
Ad Hoc Networks, 2016

2015
Managing Privacy in the Internet of Things: DocCloud, a Use Case.
Proceedings of the Advanced Research in Data Privacy, 2015

Attribute-based authorization for structured Peer-to-Peer (P2P) networks.
Comput. Stand. Interfaces, 2015

Private surveys on VoIP.
Comput. Commun., 2015

2014
DocCloud: A document recommender system on cloud computing with plausible deniability.
Inf. Sci., 2014

Reconciling privacy and efficient utility management in smart cities.
Trans. Emerg. Telecommun. Technol., 2014

2013
WiMAX-based robust localization in the presence of misbehaving and/or malicious base stations.
Comput. Electr. Eng., 2013

Securing Identity Assignment Using Implicit Certificates in P2P Overlays.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

2012
Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems.
Peer-to-Peer Netw. Appl., 2012

Design of a P2P content recommendation system using affinity networks.
Comput. Commun., 2012

Cooperative detection of primary user emulation attacks in CRNs.
Comput. Networks, 2012

On the relationship between the traceability properties of Reed-Solomon codes.
Adv. Math. Commun., 2012

Optimizing energy-efficiency of PHY-Layer authentication in machine-to-machine networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

2011
An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking.
Wirel. Commun. Mob. Comput., 2011

Secure Lossless Aggregation Over Fading and Shadowing Channels for Smart Grid M2M Networks.
IEEE Trans. Smart Grid, 2011

Identifying Traitors Using the Koetter-Vardy Algorithm.
IEEE Trans. Inf. Theory, 2011

Modeling the Lion Attack in Cognitive Radio Networks.
EURASIP J. Wirel. Commun. Netw., 2011

An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers.
Data Knowl. Eng., 2011

Use of turbo codes with low-rate convolutional constituent codes in fingerprinting scenarios.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Robust detection of primary user emulation attacks in IEEE 802.22 networks.
Proceedings of the CogART 2011, 2011

Private Audio Streaming for an Automated Phone Assistance System.
Proceedings of the 2011 International Conference on P2P, 2011

2010
Traitor tracing over YouTube video service - proof of concept.
Telecommun. Syst., 2010

Securing cognitive radio networks.
Int. J. Commun. Syst., 2010

A note about the identifier parent property in Reed-Solomon codes.
Comput. Secur., 2010

2009
New voter verification scheme using pre-encrypted ballots.
Comput. Commun., 2009

A note on the equivalence of the traceability properties of Reed-Solomon codes for certain coalition sizes.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

On the IPP Properties of Reed-Solomon Codes.
Proceedings of the Emerging Challenges for Security, 2009

2008
Shared Self-Organized GKM Protocol for MANETs.
J. Inf. Sci. Eng., 2008

Secure Remote Voter Registration.
Proceedings of the 3rd International Conference, 2008

New Considerations about the Correct Design of Turbo Fingerprinting Codes.
Proceedings of the Computer Security, 2008

Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel.
Proceedings of the Critical Information Infrastructure Security, 2008

2007
?-error.">A class of non-linear asymptotic fingerprinting codes with ?-error.
Online Inf. Rev., 2007

Providing Security Services in a Resource Discovery System.
J. Networks, 2007

Tracing illegal redistribution using errors-anderasures and side information decoding algorithms.
IET Inf. Secur., 2007

MAIS: Mobile Agent Integrity System - A Security System to IDS based on Autonomous Agents.
Proceedings of the SECRYPT 2007, 2007

Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Improvement of Collusion Secure Convolutional Fingerprinting Information Codes.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

A Note About the Traceability Properties of Linear Codes.
Proceedings of the Information Security and Cryptology, 2007

Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm.
Proceedings of the Computational Science and Its Applications, 2007

Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

Securing Agents against Malicious Host in an Intrusion Detection System.
Proceedings of the Critical Information Infrastructures Security, 2007

Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms.
Proceedings of the The Second International Conference on Availability, 2007

2006
Punishing Malicious Hosts with the Cryptographic Traces Approach.
New Gener. Comput., 2006

Multicast Copyright Protection System Based on a Trusted Soft-Engine.
Int. J. Bus. Data Commun. Netw., 2006

Obtaining Traceability Codes from Chinese Reminder Theorem Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Secure brokerage mechanisms for mobile electronic commerce.
Comput. Commun., 2006

Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques.
Proceedings of the SECRYPT 2006, 2006

A Practical Solution for Distribution Rights Protection in Multicast Environments.
Proceedings of the Computational Science and Its Applications, 2006

Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks.
Proceedings of the The First International Conference on Availability, 2006

2005
Development of a platform offering video copyright protection and security against illegal distribution.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Energy Efficiency of Load Balancing in MANET Routing Protocols.
Proceedings of the 6th ACIS International Conference on Software Engineering, 2005

Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Multimedia Copyright Protection Platform Demonstrator.
Proceedings of the Trust Management, Third International Conference, 2005

A New Class of Codes for Fingerprinting Schemes.
Proceedings of the Information Security Practice and Experience, 2005

Tracing Traitors by Guessing Secrets. The <i>q</i>-Ary Case.
Proceedings of the Information Security Practice and Experience, 2005

A Family of Collusion 2-Secure Codes.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Practical Scenarios for the Van Trung-Martirosyan Codes.
Proceedings of the Computational Science and Its Applications, 2005

Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms.
Proceedings of the Computational Science and Its Applications, 2005

Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

2004
Identification of traitors in algebraic-geometric traceability codes.
IEEE Trans. Signal Process., 2004

Certificate revocation system implementation based on the Merkle hash tree.
Int. J. Inf. Sec., 2004

Soft-Decision Tracing in Fingerprinted Multimedia Content.
IEEE Multim., 2004

Detecting and Proving Manipulation Attacks in Mobile Agent Systems.
Proceedings of the Mobility Aware Technologies and Applications, 2004

Efficient Recovery of Secrets.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Identification Algorithms for Sequential Traitor Tracing.
Proceedings of the Progress in Cryptology, 2004

Identification of Traitors Using a Trellis.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Security Issues in Virtual Grid Environments.
Proceedings of the Computational Science, 2004

Punishing manipulation attacks in mobile agent systems.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

CERVANTES - A Certificate Validation Test-Bed.
Proceedings of the Public Key Infrastructure, 2004

2003
E-MHT. An Efficient Protocol for Certificate Status Checking.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

A Certificate Status Checking Protocol for the Authenticated Dictionary.
Proceedings of the Computer Network Security, 2003

Efficient Offline Certificate Revocation.
Proceedings of the Interactive Multimedia on Next Generation Networks, 2003

Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003

A generalization of traceability codes using ideal-based codes.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

Implementation of an Efficient Authenticated Dictionary for Certificate Revocation.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

A protocol for detecting malicious hosts based on limiting the execution time of mobile agents.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts.
Proceedings of the Web Engineering, International Conference, 2003

Protocols for Malicious Host Revocation.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Group Rekeying Algorithm Using Pseudo-random Functions and Modular Reduction.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Protecting Intellectual Property by Guessing Secrets.
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003

Evaluation of Revocation Systems with a JAVA Test-bed.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Practical Asymmetric Fingerprinting with a TTP.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts.
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003

Using OCSP to Secure Certificate-Using Transactions in M-commerce.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
A security and usability proposal for mobile electronic commerce.
IEEE Commun. Mag., 2002

Fingerprinting Concatenated Codes with Efficient Identification.
Proceedings of the Information Security, 5th International Conference, 2002

Decoding codes with the identifiable parent property.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

Soft-decision decoding of traceability codes.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002

Efficient Identification of Traitors in Fingerprinted Multimedia Contents.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

Testing Color-Mixing Laws In Soil Mineral Mixtures.
Proceedings of the First European Conference on Colour in Graphics, Imaging, and Vision, 2002

1998
Spreading Codes Generator for Wireless CDMA Networks.
Wirel. Pers. Commun., 1998

1995
Uncorrelated PN sequences generator for spreading codes in CDMA systems.
Proceedings of the 6th IEEE International Symposium on Personal, 1995

1993
Secure Data Transmission in Extended Ethernet Environments.
IEEE J. Sel. Areas Commun., 1993

Implementation of a security system in a local area network environment.
Proceedings of the 18th Conference on Local Computer Networks, 1993

A Particular Solution to Provide Secure Communications in an Ethernet Environment.
Proceedings of the CCS '93, 1993


  Loading...