Rolando Trujillo-Rasua

Orcid: 0000-0002-8714-4626

Affiliations:
  • Deakin University, VIC, Australia
  • University of Luxembourg (former)
  • Universitat Rovira i Virgili, Catalonia, Spain (former)
  • University of Havana, Cuba (former)


According to our database1, Rolando Trujillo-Rasua authored at least 54 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Software-Based Memory Erasure with relaxed isolation requirements: Extended Version.
CoRR, 2024

2023
On the optimal resistance against mafia and distance fraud in distance-bounding protocols.
Comput. Commun., October, 2023

Automated generation of attack trees with optimal shape and labelling.
CoRR, 2023

ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

2022
Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation.
Knowl. Inf. Syst., 2022

APT attacks on industrial control systems: A tale of three incidents.
Int. J. Crit. Infrastructure Prot., 2022

Traceability in supply chains: A Cyber security analysis.
Comput. Secur., 2022

Analysis of centrality measures under differential privacy models.
Appl. Math. Comput., 2022

Forward Traceability for Product Authenticity Using Ethereum Smart Contracts.
Proceedings of the Network and System Security - 16th International Conference, 2022

Is Eve nearby? Analysing protocols under the distant-attacker assumption.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

2021
Secure memory erasure in the presence of man-in-the-middle attackers.
J. Inf. Secur. Appl., 2021

2020
Secure attribute-based search in RFID-based inventory control systems.
Decis. Support Syst., 2020

Applications of Distributed Ledger Technologies to the Internet of Things: A Survey.
ACM Comput. Surv., 2020

Attribute evaluation on attack trees with incomplete information.
Comput. Secur., 2020

2019
Conditional adjacency anonymity in social graphs under active attacks.
Knowl. Inf. Syst., 2019

Robust active attacks on social graphs.
Data Min. Knowl. Discov., 2019

Security of Distance-Bounding: A Survey.
ACM Comput. Surv., 2019

Chunked Lectures: A new model for conducting online lectures within Information Technology higher education.
CoRR, 2019

Distance-based vertex identification in graphs: The outer multiset dimension.
Appl. Math. Comput., 2019

Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks.
Proceedings of the 29th International Telecommunication Networks and Applications Conference, 2019

Post-Collusion Security and Distance Bounding.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Anonymising social graphs in the presence of active attackers.
Trans. Data Priv., 2018

Distance-Bounding Protocols: Verification without Time and Location.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Automated Identification of Desynchronisation Attacks on Shared Secrets.
Proceedings of the Computer Security, 2018

2017
Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph.
Fundam. Informaticae, 2017

Rethinking (k, 𝓁)-anonymity in social graphs: (k, 𝓁)-adjacency anonymity and (k, 𝓁)-(adjacency) anonymous transformations.
CoRR, 2017

Refinement-Aware Generation of Attack Trees.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

New Directions in Attack Tree Research: Catching up with Industrial Needs.
Proceedings of the Graphical Models for Security - 4th International Workshop, 2017

2016
k-Metric antidimension: A privacy measure for social graphs.
Inf. Sci., 2016

Characterizing 1-Metric Antidimensional Trees and Unicyclic Graphs.
Comput. J., 2016

Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't.
Proceedings of the Security Protocols XXIV, 2016

Optimality Results on the Security of Lookup-Based Protocols.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0.
Proceedings of the Quantitative Evaluation of Systems - 13th International Conference, 2016

Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study.
Proceedings of the Practice of Enterprise Modeling, 2016

A Class of Precomputation-Based Distance-Bounding Protocols.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Counteracting Active Attacks in Social Network Graphs.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

2015
Privacy in Spatio-Temporal Databases: A Microaggregation-Based Approach.
Proceedings of the Advanced Research in Data Privacy, 2015

Comparing distance bounding protocols: A critical mission supported by decision theory.
Comput. Commun., 2015

Attack Trees with Sequential Conjunction.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

2014
Distance Bounding Facing Both Mafia and Distance Frauds.
IEEE Trans. Wirel. Commun., 2014

Distance-bounding facing both mafia and distance frauds: Technical report.
CoRR, 2014

2013
On the privacy offered by (k, δ)-anonymity.
Inf. Syst., 2013

Privacy in RFID and mobile objects.
CoRR, 2013

Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

2012
Privacy in rfid and mobile objects.
PhD thesis, 2012

Microaggregation- and permutation-based anonymization of movement data.
Inf. Sci., 2012

Predictive protocol for the scalable identification of RFID tags through collaborative readers.
Comput. Ind., 2012

2011
Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers.
Comput. Networks, 2011

Scalable trajectory-based protocol for RFID tags identification.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

2010
The Poulidor Distance-Bounding Protocol.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Privacy-preserving publication of trajectories using microaggregation.
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2010

2008
Regional Traffic Assignment by ACO.
Proceedings of the Ant Colony Optimization and Swarm Intelligence, 2008


  Loading...