Victor Sucasas

Orcid: 0000-0002-7981-401X

According to our database1, Victor Sucasas authored at least 38 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Attribute-Based Pseudonymity for Privacy-Preserving Authentication in Cloud Services.
IEEE Trans. Cloud Comput., 2023

Secure Multi-Party Computation-Based Privacy-Preserving Authentication for Smart Cities.
IEEE Trans. Cloud Comput., 2023

FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC.
IACR Cryptol. ePrint Arch., 2023

Behavioral Biometrics for Mobile User Authentication: Benefits and Limitations.
Proceedings of the IFIP Networking Conference, 2023

2022
Survey on Fully Homomorphic Encryption, Theory, and Applications.
IACR Cryptol. ePrint Arch., 2022

Through the Looking-Glass: Benchmarking Secure Multi-Party Computation Comparisons for ReLU's.
IACR Cryptol. ePrint Arch., 2022

A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT).
Trans. Emerg. Telecommun. Technol., 2022

Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices.
Proceedings of the 27th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2022

2021
A Privacy-Preserving User Authentication Mechanism for Smart City Mobile Apps.
Proceedings of the 26th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2021

2020
A Signature Scheme with Unlinkable-yet-Accountable Pseudonymity for Privacy-Preserving Crowdsensing.
IEEE Trans. Mob. Comput., 2020

Editorial: Security and Privacy Protection for Mobile Applications and Platforms.
Mob. Networks Appl., 2020

Performance of RLNC for Underwater Broadcasting.
IEEE Netw. Lett., 2020

2019
Insole Optical Fiber Sensor Architecture for Remote Gait Analysis - An e-Health Solution.
IEEE Internet Things J., 2019

2018
Physical-layer entity authentication scheme for mobile MIMO systems.
IET Commun., 2018

A privacy-enhanced OAuth 2.0 based protocol for Smart City mobile applications.
Comput. Secur., 2018

Security Framework for the Semiconductor Supply Chain Environment.
Proceedings of the Broadband Communications, Networks, and Systems, 2018

2017
A Physical-Layer Security Scheme by Phase-Based Adaptive Modulation.
IEEE Trans. Veh. Technol., 2017

A Probabilistic and Highly Efficient Topology Control Algorithm for Underwater Cooperating AUV Networks.
Sensors, 2017

Non-Invasive Insole Optical Fiber Sensor Architecture for Monitoring Foot Anomalies.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Implementation of a Pseudonym-Based Signature Scheme with Bilinear Pairings on Android.
Proceedings of the Cognitive Radio Oriented Wireless Networks, 2017

2016
A Cognitive Self-Organising Clustering Algorithm for Urban Scenarios.
Wirel. Pers. Commun., 2016

An autonomous privacy-preserving authentication scheme for intelligent transportation systems.
Comput. Secur., 2016

A survey on clustering techniques for cooperative wireless networks.
Ad Hoc Networks, 2016

An OAuth2-based protocol with strong user privacy preservation for smart city mobile e-Health apps.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Lightweight Privacy-Preserving OAuth2-Based Protocol for Smart City Mobile Apps.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

2015
Lightweight security against combined IE and SSDF attacks in cooperative spectrum sensing for cognitive radio networks.
Secur. Commun. Networks, 2015

Effect of noisy channels in MAC-based SSDF counter-mechanisms for 5G cognitive radio networks.
Proceedings of the 2015 International Symposium on Wireless Communication Systems (ISWCS), 2015

Efficient privacy preserving security protocol for VANETs with sparse infrastructure deployment.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Can We Apply Clustering in Fast Moving Objects?
Proceedings of the Wireless Internet - 8th International Conference, 2014

A cognitive approach for stable cooperative group formation in mobile environments.
Proceedings of the IEEE International Conference on Communications, 2014

On the efficiency of merging procedures in hierarchical mobile cooperative networks.
Proceedings of the IEEE International Conference on Communications, 2014

How much overhead is required for stable group formation in VANETs?
Proceedings of the 19th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2014

2013
On the Trade-Off Between Security and Energy Efficiency in Cooperative Spectrum Sensing for Cognitive Radio.
IEEE Commun. Lett., 2013

An energy efficient cooperative approach for anonymous wireless communications.
Proceedings of the European Wireless 2013, 2013

On the energy efficiency of low-mobility subsystems in hierarchical ad hoc networks.
Proceedings of the IEEE 18th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2013

2012
Inaccuracy of location information as a consequence of data collection delay and presence of misbehaving and malicious nodes.
Proceedings of the International Conference on Localization and GNSS, 2012

Moblist: A signal strength based clustering algorithm for ordered mobile scenarios.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Performance evaluation of RSS based localization systems in mobile environments.
Proceedings of the 17th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2012


  Loading...