BibTeX records: Miguel Soriano

download as .bib file

@proceedings{DBLP:conf/esorics/2021dpm,
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jose Luis Mu{\~{n}}oz{-}Tapia and
                  Guillermo Navarro{-}Arribas and
                  Miguel Soriano},
  title        = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2021 International Workshops, {DPM} 2021 and {CBT} 2021,
                  Darmstadt, Germany, October 8, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13140},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-93944-1},
  doi          = {10.1007/978-3-030-93944-1},
  isbn         = {978-3-030-93943-4},
  timestamp    = {Sun, 30 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2021dpm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Rebollo-Monedero19,
  author       = {David Rebollo{-}Monedero and
                  Ahmad Mohamad Mezher and
                  Xavier Casanova Colom{\'{e}} and
                  Jordi Forn{\'{e}} and
                  Miguel Soriano},
  title        = {Efficient \emph{k}-anonymous microaggregation of multivariate numerical
                  data via principal component analysis},
  journal      = {Inf. Sci.},
  volume       = {503},
  pages        = {417--443},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2019.07.042},
  doi          = {10.1016/J.INS.2019.07.042},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Rebollo-Monedero19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Rebollo-Monedero18,
  author       = {David Rebollo{-}Monedero and
                  Cesar Hernandez{-}Baigorri and
                  Jordi Forn{\'{e}} and
                  Miguel Soriano},
  title        = {Incremental k-Anonymous Microaggregation in Large-Scale Electronic
                  Surveys With Optimized Scheduling},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {60016--60044},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2875949},
  doi          = {10.1109/ACCESS.2018.2875949},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/Rebollo-Monedero18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2018-1,
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6},
  doi          = {10.1007/978-3-319-99073-6},
  isbn         = {978-3-319-99072-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2018-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2018-2,
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11099},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1},
  doi          = {10.1007/978-3-319-98989-1},
  isbn         = {978-3-319-98988-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2018-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Rebollo-Monedero17,
  author       = {David Rebollo{-}Monedero and
                  Jordi Forn{\'{e}} and
                  Miguel Soriano and
                  Jordi Puiggal{\'{\i}} Allepuz},
  title        = {p-Probabilistic k-anonymous microaggregation for the anonymization
                  of surveys with uncertain participation},
  journal      = {Inf. Sci.},
  volume       = {382-383},
  pages        = {388--414},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2016.12.002},
  doi          = {10.1016/J.INS.2016.12.002},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/Rebollo-Monedero17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/Caballero-GilMH16,
  author       = {C{\'{a}}ndido Caballero{-}Gil and
                  Jezabel Molina{-}Gil and
                  Juan Hern{\'{a}}ndez{-}Serrano and
                  Olga Le{\'{o}}n and
                  Miguel Soriano{-}Iba{\~{n}}ez},
  title        = {Providing k-anonymity and revocation in ubiquitous VANETs},
  journal      = {Ad Hoc Networks},
  volume       = {36},
  pages        = {482--494},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.adhoc.2015.05.016},
  doi          = {10.1016/J.ADHOC.2015.05.016},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/Caballero-GilMH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Rebollo-Monedero16,
  author       = {David Rebollo{-}Monedero and
                  Jordi Forn{\'{e}} and
                  Miguel Soriano and
                  Jordi Puiggal{\'{\i}} Allepuz},
  title        = {k-Anonymous microaggregation with preservation of statistical dependence},
  journal      = {Inf. Sci.},
  volume       = {342},
  pages        = {1--23},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ins.2016.01.012},
  doi          = {10.1016/J.INS.2016.01.012},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/Rebollo-Monedero16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/CampoGPS15,
  author       = {Juan Vera del Campo and
                  Sandra Guasch and
                  Josep Pegueroles and
                  Miguel Soriano},
  title        = {Private surveys on VoIP},
  journal      = {Comput. Commun.},
  volume       = {68},
  pages        = {25--32},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comcom.2015.06.014},
  doi          = {10.1016/J.COMCOM.2015.06.014},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/CampoGPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/ToucedaCZS15,
  author       = {Diego Suarez Touceda and
                  Jos{\'{e}} Mar{\'{\i}}a Sierra Camara and
                  Sherali Zeadally and
                  Miguel Soriano},
  title        = {Attribute-based authorization for structured Peer-to-Peer {(P2P)}
                  networks},
  journal      = {Comput. Stand. Interfaces},
  volume       = {42},
  pages        = {71--83},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.csi.2015.04.007},
  doi          = {10.1016/J.CSI.2015.04.007},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/ToucedaCZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/CampoPHS15,
  author       = {Juan Vera del Campo and
                  Josep Pegueroles and
                  Juan Hern{\'{a}}ndez{-}Serrano and
                  Miguel Soriano},
  editor       = {Guillermo Navarro{-}Arribas and
                  Vicen{\c{c}} Torra},
  title        = {Managing Privacy in the Internet of Things: DocCloud, a Use Case},
  booktitle    = {Advanced Research in Data Privacy},
  series       = {Studies in Computational Intelligence},
  volume       = {567},
  pages        = {443--463},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-09885-2\_24},
  doi          = {10.1007/978-3-319-09885-2\_24},
  timestamp    = {Fri, 09 Jun 2017 11:04:39 +0200},
  biburl       = {https://dblp.org/rec/series/sci/CampoPHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/Rebollo-MonederoBHFS14,
  author       = {David Rebollo{-}Monedero and
                  Andrea Bartoli and
                  Juan Hern{\'{a}}ndez{-}Serrano and
                  Jordi Forn{\'{e}} and
                  Miguel Soriano},
  title        = {Reconciling privacy and efficient utility management in smart cities},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {25},
  number       = {1},
  pages        = {94--108},
  year         = {2014},
  url          = {https://doi.org/10.1002/ett.2708},
  doi          = {10.1002/ETT.2708},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/Rebollo-MonederoBHFS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/CampoPHS14,
  author       = {Juan Vera del Campo and
                  Josep Pegueroles and
                  Juan Hern{\'{a}}ndez{-}Serrano and
                  Miguel Soriano},
  title        = {DocCloud: {A} document recommender system on cloud computing with
                  plausible deniability},
  journal      = {Inf. Sci.},
  volume       = {258},
  pages        = {387--402},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2013.04.007},
  doi          = {10.1016/J.INS.2013.04.007},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/CampoPHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/Hernandez-SerranoLS13,
  author       = {Juan Hern{\'{a}}ndez{-}Serrano and
                  Olga Le{\'{o}}n and
                  Miguel Soriano},
  title        = {WiMAX-based robust localization in the presence of misbehaving and/or
                  malicious base stations},
  journal      = {Comput. Electr. Eng.},
  volume       = {39},
  number       = {7},
  pages        = {2318--2329},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.compeleceng.2013.03.006},
  doi          = {10.1016/J.COMPELECENG.2013.03.006},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/Hernandez-SerranoLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/CaubetEAMS13,
  author       = {Juan Caubet and
                  Oscar Esparza and
                  Juanjo Alins and
                  Jorge Mata{-}D{\'{\i}}az and
                  Miguel Soriano},
  editor       = {M. Carmen Fern{\'{a}}ndez Gago and
                  Fabio Martinelli and
                  Siani Pearson and
                  Isaac Agudo},
  title        = {Securing Identity Assignment Using Implicit Certificates in {P2P}
                  Overlays},
  booktitle    = {Trust Management {VII} - 7th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2013, Malaga, Spain, June 3-7, 2013. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {401},
  pages        = {151--165},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38323-6\_11},
  doi          = {10.1007/978-3-642-38323-6\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/CaubetEAMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/MoreiraFS12,
  author       = {Jos{\'{e}} Moreira and
                  Marcel Fernandez and
                  Miguel Soriano},
  title        = {On the relationship between the traceability properties of Reed-Solomon
                  codes},
  journal      = {Adv. Math. Commun.},
  volume       = {6},
  number       = {4},
  pages        = {467--478},
  year         = {2012},
  url          = {https://doi.org/10.3934/amc.2012.6.467},
  doi          = {10.3934/AMC.2012.6.467},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/MoreiraFS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LeonHS12,
  author       = {Olga Le{\'{o}}n and
                  Juan Hern{\'{a}}ndez{-}Serrano and
                  Miguel Soriano},
  title        = {Cooperative detection of primary user emulation attacks in CRNs},
  journal      = {Comput. Networks},
  volume       = {56},
  number       = {14},
  pages        = {3374--3384},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.comnet.2012.05.008},
  doi          = {10.1016/J.COMNET.2012.05.008},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LeonHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/CampoPHS12,
  author       = {Juan Vera del Campo and
                  Josep Pegueroles and
                  Juan Hern{\'{a}}ndez{-}Serrano and
                  Miguel Soriano},
  title        = {Design of a {P2P} content recommendation system using affinity networks},
  journal      = {Comput. Commun.},
  volume       = {36},
  number       = {1},
  pages        = {90--104},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.comcom.2012.07.018},
  doi          = {10.1016/J.COMCOM.2012.07.018},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/CampoPHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/ToucedaCS12,
  author       = {Diego Suarez Touceda and
                  Jos{\'{e}} Sierra Camara and
                  Miguel Soriano},
  title        = {Decentralized certification scheme for secure admission in on-the-fly
                  peer-to-peer systems},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {5},
  number       = {2},
  pages        = {105--124},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12083-011-0113-7},
  doi          = {10.1007/S12083-011-0113-7},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/ToucedaCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/BartoliHSDKB12,
  author       = {Andrea Bartoli and
                  Juan Hern{\'{a}}ndez{-}Serrano and
                  Miguel Soriano and
                  Mischa Dohler and
                  Apostolos A. Kountouris and
                  Dominique Barthel},
  title        = {Optimizing energy-efficiency of PHY-Layer authentication in machine-to-machine
                  networks},
  booktitle    = {Workshops Proceedings of the Global Communications Conference, {GLOBECOM}
                  2012, 3-7 December 2012, Anaheim, California, {USA}},
  pages        = {1663--1668},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/GLOCOMW.2012.6477835},
  doi          = {10.1109/GLOCOMW.2012.6477835},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/BartoliHSDKB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/Rebollo-MonederoFS11,
  author       = {David Rebollo{-}Monedero and
                  Jordi Forn{\'{e}} and
                  Miguel Soriano},
  title        = {An algorithm for k-anonymous microaggregation and clustering inspired
                  by the design of distortion-optimized quantizers},
  journal      = {Data Knowl. Eng.},
  volume       = {70},
  number       = {10},
  pages        = {892--921},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.datak.2011.06.005},
  doi          = {10.1016/J.DATAK.2011.06.005},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dke/Rebollo-MonederoFS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/Hernandez-SerranoLS11,
  author       = {Juan Hern{\'{a}}ndez{-}Serrano and
                  Olga Le{\'{o}}n and
                  Miguel Soriano},
  title        = {Modeling the Lion Attack in Cognitive Radio Networks},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2011},
  year         = {2011},
  url          = {https://doi.org/10.1155/2011/242304},
  doi          = {10.1155/2011/242304},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejwcn/Hernandez-SerranoLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/FernandezMS11,
  author       = {Marcel Fernandez and
                  Jos{\'{e}} Moreira and
                  Miguel Soriano},
  title        = {Identifying Traitors Using the Koetter-Vardy Algorithm},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {57},
  number       = {2},
  pages        = {692--704},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIT.2010.2095194},
  doi          = {10.1109/TIT.2010.2095194},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/FernandezMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/BartoliHSDKB11,
  author       = {Andrea Bartoli and
                  Juan Hern{\'{a}}ndez{-}Serrano and
                  Miguel Soriano and
                  Mischa Dohler and
                  Apostolos A. Kountouris and
                  Dominique Barthel},
  title        = {Secure Lossless Aggregation Over Fading and Shadowing Channels for
                  Smart Grid {M2M} Networks},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {2},
  number       = {4},
  pages        = {844--864},
  year         = {2011},
  url          = {https://doi.org/10.1109/TSG.2011.2162431},
  doi          = {10.1109/TSG.2011.2162431},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/BartoliHSDKB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/EsparzaMTS11,
  author       = {Oscar Esparza and
                  Jose L. Mu{\~{n}}oz and
                  Joan Tom{\`{a}}s{-}Buliart and
                  Miguel Soriano},
  title        = {An infrastructure for detecting and punishing malicious hosts using
                  mobile agent watermarking},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {11},
  number       = {11},
  pages        = {1446--1462},
  year         = {2011},
  url          = {https://doi.org/10.1002/wcm.941},
  doi          = {10.1002/WCM.941},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/EsparzaMTS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/3pgcic/CampoGS11,
  author       = {Juan Vera del Campo and
                  Ana Gomez{-}Muro and
                  Miguel Soriano},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Joanna Kolodziej and
                  Samee Ullah Khan},
  title        = {Private Audio Streaming for an Automated Phone Assistance System},
  booktitle    = {2011 International Conference on P2P, Parallel, Grid, Cloud and Internet
                  Computing, 3PGCIC 2011, Barcelona, Catalonia, Spain, October 26-28,
                  2011},
  pages        = {128--133},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/3PGCIC.2011.62},
  doi          = {10.1109/3PGCIC.2011.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/3pgcic/CampoGS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cogart/LeonHS11,
  author       = {Olga Le{\'{o}}n and
                  Juan Hern{\'{a}}ndez{-}Serrano and
                  Miguel Soriano},
  editor       = {Simone Frattasi and
                  Nicola Marchetti},
  title        = {Robust detection of primary user emulation attacks in {IEEE} 802.22
                  networks},
  booktitle    = {CogART 2011, International Conference on Cognitive Radio and Advanced
                  Spectrum Management, Barcelona, Spain, October 26-29, 2011},
  pages        = {51},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2093256.2093307},
  doi          = {10.1145/2093256.2093307},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cogart/LeonHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Tomas-BuliartGFS11,
  author       = {Joan Tom{\`{a}}s{-}Buliart and
                  Ana Gomez{-}Muro and
                  Marcel Fernandez and
                  Miguel Soriano},
  title        = {Use of turbo codes with low-rate convolutional constituent codes in
                  fingerprinting scenarios},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123142},
  doi          = {10.1109/WIFS.2011.6123142},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/Tomas-BuliartGFS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FernandezCSD10,
  author       = {Marcel Fernandez and
                  Josep Cotrina and
                  Miguel Soriano and
                  Neus Domingo},
  title        = {A note about the identifier parent property in Reed-Solomon codes},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {628--635},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.12.012},
  doi          = {10.1016/J.COSE.2009.12.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FernandezCSD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/LeonHS10,
  author       = {Olga Le{\'{o}}n and
                  Juan Hern{\'{a}}ndez{-}Serrano and
                  Miguel Soriano},
  title        = {Securing cognitive radio networks},
  journal      = {Int. J. Commun. Syst.},
  volume       = {23},
  number       = {5},
  pages        = {633--652},
  year         = {2010},
  url          = {https://doi.org/10.1002/dac.1102},
  doi          = {10.1002/DAC.1102},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/LeonHS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/Tomas-BuliartFS10,
  author       = {Joan Tom{\`{a}}s{-}Buliart and
                  Marcel Fernandez and
                  Miguel Soriano},
  title        = {Traitor tracing over YouTube video service - proof of concept},
  journal      = {Telecommun. Syst.},
  volume       = {45},
  number       = {1},
  pages        = {47--60},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11235-009-9236-z},
  doi          = {10.1007/S11235-009-9236-Z},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/telsys/Tomas-BuliartFS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2010,
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0},
  doi          = {10.1007/978-3-642-17650-0},
  isbn         = {978-3-642-17649-4},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2010,
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Miguel Soriano},
  title        = {Trust, Privacy and Security in Digital Business, 7th International
                  Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6264},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15152-1},
  doi          = {10.1007/978-3-642-15152-1},
  isbn         = {978-3-642-15151-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Morales-RochaSP09,
  author       = {Victor Morales{-}Rocha and
                  Miguel Soriano and
                  Jordi Puiggali},
  title        = {New voter verification scheme using pre-encrypted ballots},
  journal      = {Comput. Commun.},
  volume       = {32},
  number       = {7-10},
  pages        = {1219--1227},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.comcom.2009.03.007},
  doi          = {10.1016/J.COMCOM.2009.03.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/Morales-RochaSP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/FernandezNSD09,
  author       = {Marcel Fernandez and
                  Josep Cotrina Navau and
                  Miguel Soriano and
                  Neus Domingo},
  editor       = {Dimitris Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {On the {IPP} Properties of Reed-Solomon Codes},
  booktitle    = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC}
                  11 International Information Security Conference, {SEC} 2009, Pafos,
                  Cyprus, May 18-20, 2009. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {297},
  pages        = {87--97},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01244-0\_8},
  doi          = {10.1007/978-3-642-01244-0\_8},
  timestamp    = {Thu, 29 Aug 2019 08:10:01 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/FernandezNSD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MoreiraFS09,
  author       = {Jos{\'{e}} Moreira and
                  Marcel Fernandez and
                  Miguel Soriano},
  title        = {A note on the equivalence of the traceability properties of Reed-Solomon
                  codes for certain coalition sizes},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {36--40},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386488},
  doi          = {10.1109/WIFS.2009.5386488},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MoreiraFS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/Hernandez-SerranoPS08,
  author       = {Juan Hern{\'{a}}ndez{-}Serrano and
                  Josep Pegueroles and
                  Miguel Soriano},
  title        = {Shared Self-Organized {GKM} Protocol for MANETs},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {24},
  number       = {6},
  pages        = {1629--1646},
  year         = {2008},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2008/200811\_02.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/Hernandez-SerranoPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/Tomas-BuliartFS08,
  author       = {Joan Tom{\`{a}}s{-}Buliart and
                  Marcel Fernandez and
                  Miguel Soriano},
  editor       = {Roberto Setola and
                  Stefan Geretshuber},
  title        = {Protection of Mobile Agents Execution Using a Modified Self-Validating
                  Branch-Based Software Watermarking with External Sentinel},
  booktitle    = {Critical Information Infrastructure Security, Third International
                  Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5508},
  pages        = {287--294},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-03552-4\_26},
  doi          = {10.1007/978-3-642-03552-4\_26},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/Tomas-BuliartFS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Tomas-BuliartFS08,
  author       = {Joan Tom{\`{a}}s{-}Buliart and
                  Marcel Fernandez and
                  Miguel Soriano},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {New Considerations about the Correct Design of Turbo Fingerprinting
                  Codes},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {501--516},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_32},
  doi          = {10.1007/978-3-540-88313-5\_32},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Tomas-BuliartFS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ev/Morales-RochaPS08,
  author       = {Victor Morales{-}Rocha and
                  Jordi Puiggali and
                  Miguel Soriano},
  editor       = {Robert Krimmer and
                  R{\"{u}}diger Grimm},
  title        = {Secure Remote Voter Registration},
  booktitle    = {3rd International Conference, Co-organized by Council of Europe, Gesellschaft
                  f{\"{u}}r Informatik and E-Voting.CC, August 6th-9th, 2008 in
                  Castle Hofen, Bregenz, Austria},
  series       = {{LNI}},
  volume       = {{P-131}},
  pages        = {95--108},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/29193},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ev/Morales-RochaPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/FernandezSC07,
  author       = {Marcel Fernandez and
                  Miguel Soriano and
                  Josep Cotrina},
  title        = {Tracing illegal redistribution using errors-anderasures and side information
                  decoding algorithms},
  journal      = {{IET} Inf. Secur.},
  volume       = {1},
  number       = {2},
  pages        = {83--90},
  year         = {2007},
  url          = {https://doi.org/10.1049/iet-ifs:20055145},
  doi          = {10.1049/IET-IFS:20055145},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/FernandezSC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CampoPS07,
  author       = {Juan Vera del Campo and
                  Josep Pegueroles and
                  Miguel Soriano},
  title        = {Providing Security Services in a Resource Discovery System},
  journal      = {J. Networks},
  volume       = {2},
  number       = {1},
  pages        = {48--59},
  year         = {2007},
  url          = {https://doi.org/10.4304/jnw.2.1.48-59},
  doi          = {10.4304/JNW.2.1.48-59},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/CampoPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/oir/FernandezNS07,
  author       = {Marcel Fernandez and
                  Josep Cotrina Navau and
                  Miguel Soriano},
  title        = {?-error."{\textgreater}A class of non-linear asymptotic fingerprinting
                  codes with ?-error},
  journal      = {Online Inf. Rev.},
  volume       = {31},
  number       = {1},
  pages        = {22--37},
  year         = {2007},
  url          = {https://doi.org/10.1108/14684520710731010},
  doi          = {10.1108/14684520710731010},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/oir/FernandezNS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ZarzaPS07,
  author       = {Luis Zarza and
                  Josep Pegueroles and
                  Miguel Soriano},
  title        = {Evaluation Function for Synthesizing Security Protocols by means of
                  Genetic Algorithms},
  booktitle    = {Proceedings of the The Second International Conference on Availability,
                  Reliability and Security, {ARES} 2007, The International Dependability
                  Conference - Bridging Theory and Practice, April 10-13 2007, Vienna,
                  Austria},
  pages        = {1207--1213},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ARES.2007.83},
  doi          = {10.1109/ARES.2007.83},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ZarzaPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/PaezTFS07,
  author       = {Rafael P{\'{a}}ez and
                  Joan Tom{\`{a}}s{-}Buliart and
                  Jordi Forn{\'{e}} and
                  Miguel Soriano},
  editor       = {Javier L{\'{o}}pez and
                  Bernhard M. H{\"{a}}mmerli},
  title        = {Securing Agents against Malicious Host in an Intrusion Detection System},
  booktitle    = {Critical Information Infrastructures Security, Second International
                  Workshop, {CRITIS} 2007, M{\'{a}}laga, Spain, October 3-5, 2007.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5141},
  pages        = {94--105},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-89173-4\_9},
  doi          = {10.1007/978-3-540-89173-4\_9},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/PaezTFS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/ZarzaPS07,
  author       = {Luis Zarza and
                  Josep Pegueroles and
                  Miguel Soriano},
  title        = {Interpretation of Binary Strings as Security Protocols for their Evolution
                  by means of Genetic Algorithms},
  booktitle    = {18th International Workshop on Database and Expert Systems Applications
                  {(DEXA} 2007), 3-7 September 2007, Regensburg, Germany},
  pages        = {708--712},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/DEXA.2007.79},
  doi          = {10.1109/DEXA.2007.79},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/ZarzaPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/Hernandez-SerranoPS07,
  author       = {Juan Hern{\'{a}}ndez{-}Serrano and
                  Josep Pegueroles and
                  Miguel Soriano},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova},
  title        = {Supporting Mobility in {GKM} over Ad-Hoc Network Using a Decentralized
                  and Spontaneous Algorithm},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2007, International
                  Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4706},
  pages        = {526--539},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74477-1\_49},
  doi          = {10.1007/978-3-540-74477-1\_49},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsa/Hernandez-SerranoPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/FernandezNSD07,
  author       = {Marcel Fernandez and
                  Josep Cotrina Navau and
                  Miguel Soriano and
                  Neus Domingo},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {A Note About the Traceability Properties of Linear Codes},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {251--258},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_20},
  doi          = {10.1007/978-3-540-76788-6\_20},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/FernandezNSD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Tomas-BuliartFS07,
  author       = {Joan Tom{\`{a}}s{-}Buliart and
                  Marcel Fernandez and
                  Miguel Soriano},
  editor       = {Yvo Desmedt},
  title        = {Improvement of Collusion Secure Convolutional Fingerprinting Information
                  Codes},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {76--88},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_6},
  doi          = {10.1007/978-3-642-10230-1\_6},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Tomas-BuliartFS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/Tomas-BuliartFS07,
  author       = {Joan Tom{\`{a}}s{-}Buliart and
                  Marcel Fernandez and
                  Miguel Soriano},
  editor       = {Bruno Apolloni and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Using Informed Coding and Informed Embedding to Design Robust Fingerprinting
                  Embedding Systems},
  booktitle    = {Knowledge-Based Intelligent Information and Engineering Systems, 11th
                  International Conference, {KES} 2007, {XVII} Italian Workshop on Neural
                  Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4694},
  pages        = {992--999},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74829-8\_121},
  doi          = {10.1007/978-3-540-74829-8\_121},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/Tomas-BuliartFS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PaezTFS07,
  author       = {Rafael P{\'{a}}ez and
                  Joan Tom{\`{a}}s and
                  Jordi Forn{\'{e}} and
                  Miguel Soriano},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {{MAIS:} Mobile Agent Integrity System - {A} Security System to {IDS}
                  based on Autonomous Agents},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {41--47},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 13:27:09 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PaezTFS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/EsparzaMSF06,
  author       = {Oscar Esparza and
                  Jose L. Mu{\~{n}}oz and
                  Miguel Soriano and
                  Jordi Forn{\'{e}}},
  title        = {Secure brokerage mechanisms for mobile electronic commerce},
  journal      = {Comput. Commun.},
  volume       = {29},
  number       = {12},
  pages        = {2308--2321},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comcom.2006.03.005},
  doi          = {10.1016/J.COMCOM.2006.03.005},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/EsparzaMSF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FernandezSN06,
  author       = {Marcel Fernandez and
                  Miguel Soriano and
                  Josep Cotrina Navau},
  title        = {Obtaining Traceability Codes from Chinese Reminder Theorem Codes},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {1},
  pages        = {227--230},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.1.227},
  doi          = {10.1093/IETFEC/E89-A.1.227},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FernandezSN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbdcn/PeguerolesFRS06,
  author       = {Josep Pegueroles and
                  Marcel Fernandez and
                  Francisco Rico{-}Novella and
                  Miguel Soriano},
  title        = {Multicast Copyright Protection System Based on a Trusted Soft-Engine},
  journal      = {Int. J. Bus. Data Commun. Netw.},
  volume       = {2},
  number       = {2},
  pages        = {55--67},
  year         = {2006},
  url          = {https://doi.org/10.4018/jbdcn.2006040104},
  doi          = {10.4018/JBDCN.2006040104},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbdcn/PeguerolesFRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ngc/EsparzaMSF06,
  author       = {Oscar Esparza and
                  Jose L. Mu{\~{n}}oz and
                  Miguel Soriano and
                  Jordi Forn{\'{e}}},
  title        = {Punishing Malicious Hosts with the Cryptographic Traces Approach},
  journal      = {New Gener. Comput.},
  volume       = {24},
  number       = {4},
  pages        = {351--376},
  year         = {2006},
  url          = {https://doi.org/10.1007/BF03037399},
  doi          = {10.1007/BF03037399},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ngc/EsparzaMSF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CampoPS06,
  author       = {Juan Vera del Campo and
                  Josep Pegueroles and
                  Miguel Soriano},
  title        = {Providing Security Services in a Multiprotocol Service Discovery System
                  for Ubiquitous Networks},
  booktitle    = {Proceedings of the The First International Conference on Availability,
                  Reliability and Security, {ARES} 2006, The International Dependability
                  Conference - Bridging Theory and Practice, April 20-22 2006, Vienna
                  University of Technology, Austria},
  pages        = {148--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ARES.2006.100},
  doi          = {10.1109/ARES.2006.100},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CampoPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/PeguerolesFRS06,
  author       = {Josep Pegueroles and
                  Marcel Fernandez and
                  Francisco Rico{-}Novella and
                  Miguel Soriano},
  editor       = {Marina L. Gavrilova and
                  Osvaldo Gervasi and
                  Vipin Kumar and
                  Chih Jeng Kenneth Tan and
                  David Taniar and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Hyunseung Choo},
  title        = {A Practical Solution for Distribution Rights Protection in Multicast
                  Environments},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2006, International
                  Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3982},
  pages        = {527--536},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11751595\_56},
  doi          = {10.1007/11751595\_56},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/PeguerolesFRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZarzaPSM06,
  author       = {Luis Zarza and
                  Josep Pegueroles and
                  Miguel Soriano and
                  Rafael Mart{\'{\i}}nez},
  editor       = {Manu Malek and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Javier Hernando},
  title        = {Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques},
  booktitle    = {{SECRYPT} 2006, Proceedings of the International Conference on Security
                  and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006,
                  {SECRYPT} is part of {ICETE} - The International Joint Conference
                  on e-Business and Telecommunications},
  pages        = {316--319},
  publisher    = {{INSTICC} Press},
  year         = {2006},
  timestamp    = {Thu, 28 Sep 2006 10:10:32 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ZarzaPSM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/SorianoFTBT05,
  author       = {Miguel Soriano and
                  Stephan Flake and
                  J{\"{u}}rgen Tacken and
                  Frank Bormann and
                  Joan Tom{\`{a}}s},
  title        = {Mobile Digital Rights Management: Security Requirements and Copy Detection
                  Mechanisms},
  booktitle    = {16th International Workshop on Database and Expert Systems Applications
                  {(DEXA} 2005), 22-26 August 2005, Copenhagen, Denmark},
  pages        = {251--256},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/DEXA.2005.135},
  doi          = {10.1109/DEXA.2005.135},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/SorianoFTBT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/FernandezSN05,
  author       = {Marcel Fernandez and
                  Miguel Soriano and
                  Josep Cotrina Navau},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Antonio Lagan{\`{a}} and
                  Heow Pueh Lee and
                  Youngsong Mun and
                  David Taniar and
                  Chih Jeng Kenneth Tan},
  title        = {Equidistant Binary Fingerprinting Codes Existence and Identification
                  Algorithms},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2005, International
                  Conference, Singapore, May 9-12, 2005, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3481},
  pages        = {527--536},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11424826\_56},
  doi          = {10.1007/11424826\_56},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/FernandezSN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/FernandezSN05a,
  author       = {Marcel Fernandez and
                  Miguel Soriano and
                  Josep Cotrina Navau},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Antonio Lagan{\`{a}} and
                  Heow Pueh Lee and
                  Youngsong Mun and
                  David Taniar and
                  Chih Jeng Kenneth Tan},
  title        = {Practical Scenarios for the Van Trung-Martirosyan Codes},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2005, International
                  Conference, Singapore, May 9-12, 2005, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3481},
  pages        = {624--633},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11424826\_66},
  doi          = {10.1007/11424826\_66},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/FernandezSN05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/NavauFS05,
  author       = {Josep Cotrina Navau and
                  Marcel Fernandez and
                  Miguel Soriano},
  editor       = {Mauro Barni and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Stefan Katzenbeisser and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Family of Collusion 2-Secure Codes},
  booktitle    = {Information Hiding, 7th International Workshop, {IH} 2005, Barcelona,
                  Spain, June 6-8, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3727},
  pages        = {387--397},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11558859\_28},
  doi          = {10.1007/11558859\_28},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/NavauFS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/FernandezSN05,
  author       = {Marcel Fernandez and
                  Miguel Soriano and
                  Josep Cotrina Navau},
  editor       = {Robert H. Deng and
                  Feng Bao and
                  HweeHwa Pang and
                  Jianying Zhou},
  title        = {Tracing Traitors by Guessing Secrets. The \emph{q}-Ary Case},
  booktitle    = {Information Security Practice and Experience, First International
                  Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3439},
  pages        = {61--73},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31979-5\_6},
  doi          = {10.1007/978-3-540-31979-5\_6},
  timestamp    = {Wed, 25 Sep 2019 18:12:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/FernandezSN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/FernandezSN05a,
  author       = {Marcel Fernandez and
                  Miguel Soriano and
                  Josep Cotrina Navau},
  editor       = {Robert H. Deng and
                  Feng Bao and
                  HweeHwa Pang and
                  Jianying Zhou},
  title        = {A New Class of Codes for Fingerprinting Schemes},
  booktitle    = {Information Security Practice and Experience, First International
                  Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3439},
  pages        = {398--409},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31979-5\_34},
  doi          = {10.1007/978-3-540-31979-5\_34},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/FernandezSN05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itrust/SorianoFSTCPH05,
  author       = {Miguel Soriano and
                  Marcel Fernandez and
                  Elisa Sayrol and
                  Joan Tom{\`{a}}s and
                  Joan Casanellas and
                  Josep Pegueroles and
                  Juan Hern{\'{a}}ndez{-}Serrano},
  editor       = {Peter Herrmann and
                  Val{\'{e}}rie Issarny and
                  Simon Shiu},
  title        = {Multimedia Copyright Protection Platform Demonstrator},
  booktitle    = {Trust Management, Third International Conference, iTrust 2005, Paris,
                  France, May 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3477},
  pages        = {411--414},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11429760\_32},
  doi          = {10.1007/11429760\_32},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itrust/SorianoFSTCPH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SorianoFN05,
  author       = {Miguel Soriano and
                  Marcel Fernandez and
                  Josep Cotrina Navau},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Fingerprinting Schemes. Identifying the Guilty Sources Using Side
                  Information},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {231--243},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_18},
  doi          = {10.1007/11551492\_18},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SorianoFN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/Hernandez-SerranoPS05,
  author       = {Juan Hern{\'{a}}ndez{-}Serrano and
                  Josep Pegueroles and
                  Miguel Soriano},
  editor       = {Lawrence Chung and
                  Yeong{-}Tae Song},
  title        = {Energy Efficiency of Load Balancing in {MANET} Routing Protocols},
  booktitle    = {Proceedings of the 6th {ACIS} International Conference on Software
                  Engineering, Artificial Intelligence, Networking and Parallel/Distributed
                  Computing {(SNPD} 2005), May 23-25, 2005, Towson, Maryland, {USA}},
  pages        = {476--483},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SNPD-SAWN.2005.34},
  doi          = {10.1109/SNPD-SAWN.2005.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/Hernandez-SerranoPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sswmc/SayrolSFCT05,
  author       = {Elisa Sayrol and
                  Miguel Soriano and
                  Marcel Fernandez and
                  Joan Casanellas and
                  Joan Tom{\`{a}}s},
  editor       = {Edward J. Delp III and
                  Ping Wah Wong},
  title        = {Development of a platform offering video copyright protection and
                  security against illegal distribution},
  booktitle    = {Security, Steganography, and Watermarking of Multimedia Contents VII,
                  San Jose, California, USA, January 17-20, 2005, Proceedings},
  series       = {Proceedings of {SPIE}},
  volume       = {5681},
  pages        = {76--83},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.591742},
  doi          = {10.1117/12.591742},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sswmc/SayrolSFCT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeemm/FernandezS04,
  author       = {Marcel Fernandez and
                  Miguel Soriano},
  title        = {Soft-Decision Tracing in Fingerprinted Multimedia Content},
  journal      = {{IEEE} Multim.},
  volume       = {11},
  number       = {2},
  pages        = {38--46},
  year         = {2004},
  url          = {https://doi.org/10.1109/MMUL.2004.1289040},
  doi          = {10.1109/MMUL.2004.1289040},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeemm/FernandezS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MunozFES04,
  author       = {Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}} and
                  Oscar Esparza and
                  Miguel Soriano},
  title        = {Certificate revocation system implementation based on the Merkle hash
                  tree},
  journal      = {Int. J. Inf. Sec.},
  volume       = {2},
  number       = {2},
  pages        = {110--124},
  year         = {2004},
  url          = {https://doi.org/10.1007/s10207-003-0026-4},
  doi          = {10.1007/S10207-003-0026-4},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MunozFES04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/FernandezS04,
  author       = {Marcel Fernandez and
                  Miguel Soriano},
  title        = {Identification of traitors in algebraic-geometric traceability codes},
  journal      = {{IEEE} Trans. Signal Process.},
  volume       = {52},
  number       = {10},
  pages        = {3073--3077},
  year         = {2004},
  url          = {https://doi.org/10.1109/TSP.2004.833858},
  doi          = {10.1109/TSP.2004.833858},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsp/FernandezS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/MunozFES04,
  author       = {Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}} and
                  Oscar Esparza and
                  Miguel Soriano},
  editor       = {Sokratis K. Katsikas and
                  Stefanos Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {{CERVANTES} - {A} Certificate Validation Test-Bed},
  booktitle    = {Public Key Infrastructure, First European PKIWorkshop: Research and
                  Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3093},
  pages        = {28--42},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25980-0\_3},
  doi          = {10.1007/978-3-540-25980-0\_3},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/MunozFES04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/EsparzaSMF04,
  author       = {Oscar Esparza and
                  Miguel Soriano and
                  Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}}},
  title        = {Punishing manipulation attacks in mobile agent systems},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM}
                  '04, Dallas, Texas, USA, 29 November - 3 December 2004},
  pages        = {2235--2239},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/GLOCOM.2004.1378406},
  doi          = {10.1109/GLOCOM.2004.1378406},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/EsparzaSMF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/MunozPFES04,
  author       = {Jose L. Mu{\~{n}}oz and
                  Josep Pegueroles and
                  Jordi Forn{\'{e}} and
                  Oscar Esparza and
                  Miguel Soriano},
  editor       = {Marian Bubak and
                  G. Dick van Albada and
                  Peter M. A. Sloot and
                  Jack J. Dongarra},
  title        = {Security Issues in Virtual Grid Environments},
  booktitle    = {Computational Science - {ICCS} 2004, 4th International Conference,
                  Krak{\'{o}}w, Poland, June 6-9, 2004, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3038},
  pages        = {174--178},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24688-6\_25},
  doi          = {10.1007/978-3-540-24688-6\_25},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccS/MunozPFES04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/FernandezS04,
  author       = {Marcel Fernandez and
                  Miguel Soriano},
  editor       = {Javier L{\'{o}}pez and
                  Sihan Qing and
                  Eiji Okamoto},
  title        = {Identification of Traitors Using a Trellis},
  booktitle    = {Information and Communications Security, 6th International Conference,
                  {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3269},
  pages        = {211--222},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30191-2\_17},
  doi          = {10.1007/978-3-540-30191-2\_17},
  timestamp    = {Thu, 29 Aug 2019 08:10:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/FernandezS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/FernandezS04,
  author       = {Marcel Fernandez and
                  Miguel Soriano},
  editor       = {Anne Canteaut and
                  Kapalee Viswanathan},
  title        = {Identification Algorithms for Sequential Traitor Tracing},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
                  on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3348},
  pages        = {414--430},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30556-9\_32},
  doi          = {10.1007/978-3-540-30556-9\_32},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/FernandezS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/FernandezS04,
  author       = {Marcel Fernandez and
                  Miguel Soriano},
  title        = {Efficient Recovery of Secrets},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {763--767},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286749},
  doi          = {10.1109/ITCC.2004.1286749},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/FernandezS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mata/EsparzaSMF04,
  author       = {Oscar Esparza and
                  Miguel Soriano and
                  Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}}},
  editor       = {Ahmed Karmouch and
                  Larry Korba and
                  Edmundo Roberto Mauro Madeira},
  title        = {Detecting and Proving Manipulation Attacks in Mobile Agent Systems},
  booktitle    = {Mobility Aware Technologies and Applications, First International
                  Workshop,MATA 2004, Florian{\'{o}}polis, Brazil, October 20-22,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3284},
  pages        = {224--233},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30178-3\_21},
  doi          = {10.1007/978-3-540-30178-3\_21},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mata/EsparzaSMF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MunozFES03,
  author       = {Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}} and
                  Oscar Esparza and
                  Miguel Soriano},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Yongfei Han},
  title        = {Using {OCSP} to Secure Certificate-Using Transactions in M-commerce},
  booktitle    = {Applied Cryptography and Network Security, First International Conference,
                  {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2846},
  pages        = {280--292},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45203-4\_22},
  doi          = {10.1007/978-3-540-45203-4\_22},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/MunozFES03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/EsparzaFSMF03,
  author       = {Oscar Esparza and
                  Marcel Fernandez and
                  Miguel Soriano and
                  Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}}},
  editor       = {Vladim{\'{\i}}r Mar{\'{\i}}k and
                  Werner Retschitzegger and
                  Olga Step{\'{a}}nkov{\'{a}}},
  title        = {Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts},
  booktitle    = {Database and Expert Systems Applications, 14th International Conference,
                  {DEXA} 2003, Prague, Czech Republic, September 1-5, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2736},
  pages        = {927--936},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45227-0\_90},
  doi          = {10.1007/978-3-540-45227-0\_90},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexa/EsparzaFSMF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/Martinez-BallesteSDS03,
  author       = {Antoni Mart{\'{\i}}nez{-}Ballest{\'{e}} and
                  Francesc Seb{\'{e}} and
                  Josep Domingo{-}Ferrer and
                  Miguel Soriano},
  title        = {Practical Asymmetric Fingerprinting with a {TTP}},
  booktitle    = {14th International Workshop on Database and Expert Systems Applications
                  (DEXA'03), September 1-5, 2003, Prague, Czech Republic},
  pages        = {352--356},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DEXA.2003.1232047},
  doi          = {10.1109/DEXA.2003.1232047},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/Martinez-BallesteSDS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/MunozFESJ03,
  author       = {Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}} and
                  Oscar Esparza and
                  Miguel Soriano and
                  David Jodra},
  title        = {Evaluation of Revocation Systems with a {JAVA} Test-bed},
  booktitle    = {14th International Workshop on Database and Expert Systems Applications
                  (DEXA'03), September 1-5, 2003, Prague, Czech Republic},
  pages        = {450--454},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DEXA.2003.1232063},
  doi          = {10.1109/DEXA.2003.1232063},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/MunozFESJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/FernandezS03,
  author       = {Marcel Fernandez and
                  Miguel Soriano},
  editor       = {Kurt Bauknecht and
                  A Min Tjoa and
                  Gerald Quirchmayr},
  title        = {Protecting Intellectual Property by Guessing Secrets},
  booktitle    = {E-Commerce and Web Technologies, 4th International Conference, EC-Web,
                  Prague, Czech Republic, September 2-5, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2738},
  pages        = {196--205},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45229-4\_20},
  doi          = {10.1007/978-3-540-45229-4\_20},
  timestamp    = {Tue, 29 Dec 2020 18:30:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ecweb/FernandezS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/PeguerolesBSR03,
  author       = {Josep Pegueroles and
                  Wang Bin and
                  Miguel Soriano and
                  Francisco Rico{-}Novella},
  editor       = {Minglu Li and
                  Xian{-}He Sun and
                  Qianni Deng and
                  Jun Ni},
  title        = {Group Rekeying Algorithm Using Pseudo-random Functions and Modular
                  Reduction},
  booktitle    = {Grid and Cooperative Computing, Second International Workshop, {GCC}
                  2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3032},
  pages        = {875--882},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24679-4\_148},
  doi          = {10.1007/978-3-540-24679-4\_148},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/gcc/PeguerolesBSR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/EsparzaSMF03,
  author       = {Oscar Esparza and
                  Miguel Soriano and
                  Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}}},
  editor       = {Sihan Qing and
                  Dieter Gollmann and
                  Jianying Zhou},
  title        = {Protocols for Malicious Host Revocation},
  booktitle    = {Information and Communications Security, 5th International Conference,
                  {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2836},
  pages        = {191--201},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39927-8\_18},
  doi          = {10.1007/978-3-540-39927-8\_18},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/EsparzaSMF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwe/EsparzaSMF03,
  author       = {Oscar Esparza and
                  Miguel Soriano and
                  Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}}},
  editor       = {Juan Manuel Cueva Lovelle and
                  Bernardo Mart{\'{\i}}n Gonz{\'{a}}lez Rodr{\'{\i}}guez and
                  Luis Joyanes Aguilar and
                  Jos{\'{e}} Emilio Labra Gayo and
                  Mar{\'{\i}}a del Puerto Paule Ru{\'{\i}}z},
  title        = {Host Revocation Authority: {A} Way of Protecting Mobile Agents from
                  Malicious Hosts},
  booktitle    = {Web Engineering, International Conference, {ICWE} 2003, Oviedo, Spain,
                  July 14-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2722},
  pages        = {289--292},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45068-8\_54},
  doi          = {10.1007/3-540-45068-8\_54},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icwe/EsparzaSMF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/MunozFES03,
  author       = {Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}} and
                  Oscar Esparza and
                  Miguel Soriano},
  title        = {Implementation of an Efficient Authenticated Dictionary for Certificate
                  Revocation},
  booktitle    = {Proceedings of the Eighth {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey},
  pages        = {238--243},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ISCC.2003.1214128},
  doi          = {10.1109/ISCC.2003.1214128},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/MunozFES03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/EsparzaSMF03,
  author       = {Oscar Esparza and
                  Miguel Soriano and
                  Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}}},
  title        = {A protocol for detecting malicious hosts based on limiting the execution
                  time of mobile agents},
  booktitle    = {Proceedings of the Eighth {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey},
  pages        = {251--256},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ISCC.2003.1214130},
  doi          = {10.1109/ISCC.2003.1214130},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/EsparzaSMF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/FernandezS03,
  author       = {Marcel Fernandez and
                  Miguel Soriano},
  title        = {A generalization of traceability codes using ideal-based codes},
  booktitle    = {Proceedings 2003 {IEEE} Information Theory Workshop, {ITW} 2003, La
                  Sorbonne, Paris, France, 31 March - 4 April, 2003},
  pages        = {66--69},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ITW.2003.1216696},
  doi          = {10.1109/ITW.2003.1216696},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/FernandezS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mata/EsparzaSMF03,
  author       = {Oscar Esparza and
                  Miguel Soriano and
                  Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}}},
  editor       = {Eric Horlait and
                  Thomas Magedanz and
                  Roch H. Glitho},
  title        = {Implementation and Performance Evaluation of a Protocol for Detecting
                  Suspicious Hosts},
  booktitle    = {Mobile Agents for Telecommunication Applications, 5th International
                  Workshop, {MATA} 2003, Marakech, Morocco, October 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2881},
  pages        = {286--295},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39646-8\_27},
  doi          = {10.1007/978-3-540-39646-8\_27},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mata/EsparzaSMF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mips/MunozFES03,
  author       = {Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}} and
                  Oscar Esparza and
                  Miguel Soriano},
  editor       = {Giorgio Ventre and
                  Roberto Canonico},
  title        = {Efficient Offline Certificate Revocation},
  booktitle    = {Interactive Multimedia on Next Generation Networks, First International
                  Workshop on Multimedia Interactive Protocols and Systems, {MIPS} 2003,
                  Napoli, Italy, November 18-21, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2899},
  pages        = {319--330},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40012-7\_26},
  doi          = {10.1007/978-3-540-40012-7\_26},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mips/MunozFES03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/MunozFES03,
  author       = {Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}} and
                  Oscar Esparza and
                  Miguel Soriano},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {A Certificate Status Checking Protocol for the Authenticated Dictionary},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {255--266},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_21},
  doi          = {10.1007/978-3-540-45215-7\_21},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/MunozFES03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MunozFES03,
  author       = {Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}} and
                  Oscar Esparza and
                  Miguel Soriano},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {{E-MHT.} An Efficient Protocol for Certificate Status Checking},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {410--424},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_31},
  doi          = {10.1007/978-3-540-24591-9\_31},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/MunozFES03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/SorianoP02,
  author       = {Miguel Soriano and
                  Diego Ponce},
  title        = {A security and usability proposal for mobile electronic commerce},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {40},
  number       = {8},
  pages        = {62--67},
  year         = {2002},
  url          = {https://doi.org/10.1109/MCOM.2002.1024416},
  doi          = {10.1109/MCOM.2002.1024416},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/SorianoP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cgiv/Sanchez-MaranonSMOM02,
  author       = {Manuel S{\'{a}}nchez{-}Mara{\~{n}}{\'{o}}n and
                  Miguel Soriano and
                  Isabel Miralles and
                  Ra{\'{u}}l Ortega and
                  Manuel Melgosa},
  title        = {Testing Color-Mixing Laws In Soil Mineral Mixtures},
  booktitle    = {First European Conference on Colour in Graphics, Imaging, and Vision,
                  {CGIV} 2002, Poitiers, France, April 2-5, 2002},
  pages        = {202--205},
  publisher    = {IS{\&}T - The Society for Imaging Science and Technology},
  year         = {2002},
  url          = {http://www.ingentaconnect.com/content/ist/cgiv/2002/00002002/00000001/art00044},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cgiv/Sanchez-MaranonSMOM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/FernandezS02,
  author       = {Marcel Fernandez and
                  Miguel Soriano},
  title        = {Efficient Identification of Traitors in Fingerprinted Multimedia Contents},
  booktitle    = {13th International Workshop on Database and Expert Systems Applications
                  {(DEXA} 2002), 2-6 September 2002, Aix-en-Provence, France},
  pages        = {463--467},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/DEXA.2002.1045941},
  doi          = {10.1109/DEXA.2002.1045941},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/FernandezS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/FernandezS02,
  author       = {Marcel Fernandez and
                  Miguel Soriano},
  title        = {Soft-decision decoding of traceability codes},
  booktitle    = {Proceedings of the 2002 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2002, Lausanne, Switzerland. August 26-29, 2002.
                  Volume {I}},
  pages        = {605--608},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICME.2002.1035854},
  doi          = {10.1109/ICME.2002.1035854},
  timestamp    = {Mon, 09 Aug 2021 17:01:45 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs/FernandezS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/FernandezS02,
  author       = {Marcel Fernandez and
                  Miguel Soriano},
  title        = {Decoding codes with the identifiable parent property},
  booktitle    = {Proceedings of the Seventh {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2002), 1-4 July 2002, Taormina, Italy},
  pages        = {1028--1033},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ISCC.2002.1021798},
  doi          = {10.1109/ISCC.2002.1021798},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/FernandezS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/FernandezS02,
  author       = {Marcel Fernandez and
                  Miguel Soriano},
  editor       = {Agnes Hui Chan and
                  Virgil D. Gligor},
  title        = {Fingerprinting Concatenated Codes with Efficient Identification},
  booktitle    = {Information Security, 5th International Conference, {ISC} 2002 Sao
                  Paulo, Brazil, September 30 - October 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2433},
  pages        = {459--470},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45811-5\_36},
  doi          = {10.1007/3-540-45811-5\_36},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/FernandezS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/CrusellesSM98,
  author       = {Ernesto J. Cruselles and
                  Miguel Soriano and
                  Jos{\'{e}} Luis Mel{\'{u}}s{-}Moreno},
  title        = {Spreading Codes Generator for Wireless {CDMA} Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {69--88},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1008860715309},
  doi          = {10.1023/A:1008860715309},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/CrusellesSM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/CrusellesSM95,
  author       = {Ernesto J. Cruselles and
                  Miguel Soriano and
                  Jos{\'{e}} Luis Mel{\'{u}}s{-}Moreno},
  title        = {Uncorrelated {PN} sequences generator for spreading codes in {CDMA}
                  systems},
  booktitle    = {The 6th {IEEE} International Symposium on Personal, Indoor and Mobile
                  Radio Communications, {PIMRC} 1995, Toronto, ON, Canada, September
                  27-29, 1995},
  pages        = {1335},
  year         = {1995},
  url          = {https://doi.org/10.1109/PIMRC.1995.477380},
  doi          = {10.1109/PIMRC.1995.477380},
  timestamp    = {Thu, 04 Jun 2020 15:17:53 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/CrusellesSM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/RecachaMSSF93,
  author       = {Francisco Recacha and
                  Jos{\'{e}} L. Mel{\'{u}}s and
                  X. Sim{\'{o}}n and
                  Miguel Soriano and
                  Jordi Forn{\'{e}}},
  title        = {Secure Data Transmission in Extended Ethernet Environments},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {11},
  number       = {5},
  pages        = {794--803},
  year         = {1993},
  url          = {https://doi.org/10.1109/49.223882},
  doi          = {10.1109/49.223882},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/RecachaMSSF93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SorianoFRM93,
  author       = {Miguel Soriano and
                  Jordi Forn{\'{e}} and
                  Francisco Recacha and
                  Jos{\'{e}} L. Mel{\'{u}}s},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu and
                  Victoria Ashby},
  title        = {A Particular Solution to Provide Secure Communications in an Ethernet
                  Environment},
  booktitle    = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
  pages        = {17--25},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/168588.168591},
  doi          = {10.1145/168588.168591},
  timestamp    = {Tue, 10 Nov 2020 20:00:40 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SorianoFRM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/SorianoFMR93,
  author       = {Miguel Soriano and
                  Jordi Forn{\'{e}} and
                  Jos{\'{e}} L. Mel{\'{u}}s and
                  Francisco Recacha},
  title        = {Implementation of a security system in a local area network environment},
  booktitle    = {18th Conference on Local Computer Networks, September 19-22, 1993,
                  Minneapolis, Minnesota, USA, Proceedings},
  pages        = {230--236},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/LCN.1993.591229},
  doi          = {10.1109/LCN.1993.591229},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/SorianoFMR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics