Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Miguel Soriano
@proceedings{DBLP:conf/esorics/2021dpm, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jose Luis Mu{\~{n}}oz{-}Tapia and Guillermo Navarro{-}Arribas and Miguel Soriano}, title = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2021 International Workshops, {DPM} 2021 and {CBT} 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13140}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-93944-1}, doi = {10.1007/978-3-030-93944-1}, isbn = {978-3-030-93943-4}, timestamp = {Sun, 30 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2021dpm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Rebollo-Monedero19, author = {David Rebollo{-}Monedero and Ahmad Mohamad Mezher and Xavier Casanova Colom{\'{e}} and Jordi Forn{\'{e}} and Miguel Soriano}, title = {Efficient \emph{k}-anonymous microaggregation of multivariate numerical data via principal component analysis}, journal = {Inf. Sci.}, volume = {503}, pages = {417--443}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.07.042}, doi = {10.1016/J.INS.2019.07.042}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Rebollo-Monedero19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Rebollo-Monedero18, author = {David Rebollo{-}Monedero and Cesar Hernandez{-}Baigorri and Jordi Forn{\'{e}} and Miguel Soriano}, title = {Incremental k-Anonymous Microaggregation in Large-Scale Electronic Surveys With Optimized Scheduling}, journal = {{IEEE} Access}, volume = {6}, pages = {60016--60044}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2875949}, doi = {10.1109/ACCESS.2018.2875949}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/Rebollo-Monedero18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2018-1, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6}, doi = {10.1007/978-3-319-99073-6}, isbn = {978-3-319-99072-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2018-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2018-2, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1}, doi = {10.1007/978-3-319-98989-1}, isbn = {978-3-319-98988-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2018-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Rebollo-Monedero17, author = {David Rebollo{-}Monedero and Jordi Forn{\'{e}} and Miguel Soriano and Jordi Puiggal{\'{\i}} Allepuz}, title = {p-Probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation}, journal = {Inf. Sci.}, volume = {382-383}, pages = {388--414}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2016.12.002}, doi = {10.1016/J.INS.2016.12.002}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/Rebollo-Monedero17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/Caballero-GilMH16, author = {C{\'{a}}ndido Caballero{-}Gil and Jezabel Molina{-}Gil and Juan Hern{\'{a}}ndez{-}Serrano and Olga Le{\'{o}}n and Miguel Soriano{-}Iba{\~{n}}ez}, title = {Providing k-anonymity and revocation in ubiquitous VANETs}, journal = {Ad Hoc Networks}, volume = {36}, pages = {482--494}, year = {2016}, url = {https://doi.org/10.1016/j.adhoc.2015.05.016}, doi = {10.1016/J.ADHOC.2015.05.016}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/Caballero-GilMH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Rebollo-Monedero16, author = {David Rebollo{-}Monedero and Jordi Forn{\'{e}} and Miguel Soriano and Jordi Puiggal{\'{\i}} Allepuz}, title = {k-Anonymous microaggregation with preservation of statistical dependence}, journal = {Inf. Sci.}, volume = {342}, pages = {1--23}, year = {2016}, url = {https://doi.org/10.1016/j.ins.2016.01.012}, doi = {10.1016/J.INS.2016.01.012}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/Rebollo-Monedero16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/CampoGPS15, author = {Juan Vera del Campo and Sandra Guasch and Josep Pegueroles and Miguel Soriano}, title = {Private surveys on VoIP}, journal = {Comput. Commun.}, volume = {68}, pages = {25--32}, year = {2015}, url = {https://doi.org/10.1016/j.comcom.2015.06.014}, doi = {10.1016/J.COMCOM.2015.06.014}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/CampoGPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ToucedaCZS15, author = {Diego Suarez Touceda and Jos{\'{e}} Mar{\'{\i}}a Sierra Camara and Sherali Zeadally and Miguel Soriano}, title = {Attribute-based authorization for structured Peer-to-Peer {(P2P)} networks}, journal = {Comput. Stand. Interfaces}, volume = {42}, pages = {71--83}, year = {2015}, url = {https://doi.org/10.1016/j.csi.2015.04.007}, doi = {10.1016/J.CSI.2015.04.007}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/ToucedaCZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/CampoPHS15, author = {Juan Vera del Campo and Josep Pegueroles and Juan Hern{\'{a}}ndez{-}Serrano and Miguel Soriano}, editor = {Guillermo Navarro{-}Arribas and Vicen{\c{c}} Torra}, title = {Managing Privacy in the Internet of Things: DocCloud, a Use Case}, booktitle = {Advanced Research in Data Privacy}, series = {Studies in Computational Intelligence}, volume = {567}, pages = {443--463}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-09885-2\_24}, doi = {10.1007/978-3-319-09885-2\_24}, timestamp = {Fri, 09 Jun 2017 11:04:39 +0200}, biburl = {https://dblp.org/rec/series/sci/CampoPHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/Rebollo-MonederoBHFS14, author = {David Rebollo{-}Monedero and Andrea Bartoli and Juan Hern{\'{a}}ndez{-}Serrano and Jordi Forn{\'{e}} and Miguel Soriano}, title = {Reconciling privacy and efficient utility management in smart cities}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {25}, number = {1}, pages = {94--108}, year = {2014}, url = {https://doi.org/10.1002/ett.2708}, doi = {10.1002/ETT.2708}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/Rebollo-MonederoBHFS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/CampoPHS14, author = {Juan Vera del Campo and Josep Pegueroles and Juan Hern{\'{a}}ndez{-}Serrano and Miguel Soriano}, title = {DocCloud: {A} document recommender system on cloud computing with plausible deniability}, journal = {Inf. Sci.}, volume = {258}, pages = {387--402}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2013.04.007}, doi = {10.1016/J.INS.2013.04.007}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/CampoPHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/Hernandez-SerranoLS13, author = {Juan Hern{\'{a}}ndez{-}Serrano and Olga Le{\'{o}}n and Miguel Soriano}, title = {WiMAX-based robust localization in the presence of misbehaving and/or malicious base stations}, journal = {Comput. Electr. Eng.}, volume = {39}, number = {7}, pages = {2318--2329}, year = {2013}, url = {https://doi.org/10.1016/j.compeleceng.2013.03.006}, doi = {10.1016/J.COMPELECENG.2013.03.006}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/Hernandez-SerranoLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/CaubetEAMS13, author = {Juan Caubet and Oscar Esparza and Juanjo Alins and Jorge Mata{-}D{\'{\i}}az and Miguel Soriano}, editor = {M. Carmen Fern{\'{a}}ndez Gago and Fabio Martinelli and Siani Pearson and Isaac Agudo}, title = {Securing Identity Assignment Using Implicit Certificates in {P2P} Overlays}, booktitle = {Trust Management {VII} - 7th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2013, Malaga, Spain, June 3-7, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {401}, pages = {151--165}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38323-6\_11}, doi = {10.1007/978-3-642-38323-6\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/CaubetEAMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/MoreiraFS12, author = {Jos{\'{e}} Moreira and Marcel Fernandez and Miguel Soriano}, title = {On the relationship between the traceability properties of Reed-Solomon codes}, journal = {Adv. Math. Commun.}, volume = {6}, number = {4}, pages = {467--478}, year = {2012}, url = {https://doi.org/10.3934/amc.2012.6.467}, doi = {10.3934/AMC.2012.6.467}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/MoreiraFS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LeonHS12, author = {Olga Le{\'{o}}n and Juan Hern{\'{a}}ndez{-}Serrano and Miguel Soriano}, title = {Cooperative detection of primary user emulation attacks in CRNs}, journal = {Comput. Networks}, volume = {56}, number = {14}, pages = {3374--3384}, year = {2012}, url = {https://doi.org/10.1016/j.comnet.2012.05.008}, doi = {10.1016/J.COMNET.2012.05.008}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LeonHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/CampoPHS12, author = {Juan Vera del Campo and Josep Pegueroles and Juan Hern{\'{a}}ndez{-}Serrano and Miguel Soriano}, title = {Design of a {P2P} content recommendation system using affinity networks}, journal = {Comput. Commun.}, volume = {36}, number = {1}, pages = {90--104}, year = {2012}, url = {https://doi.org/10.1016/j.comcom.2012.07.018}, doi = {10.1016/J.COMCOM.2012.07.018}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/CampoPHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/ToucedaCS12, author = {Diego Suarez Touceda and Jos{\'{e}} Sierra Camara and Miguel Soriano}, title = {Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems}, journal = {Peer-to-Peer Netw. Appl.}, volume = {5}, number = {2}, pages = {105--124}, year = {2012}, url = {https://doi.org/10.1007/s12083-011-0113-7}, doi = {10.1007/S12083-011-0113-7}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/ToucedaCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/BartoliHSDKB12, author = {Andrea Bartoli and Juan Hern{\'{a}}ndez{-}Serrano and Miguel Soriano and Mischa Dohler and Apostolos A. Kountouris and Dominique Barthel}, title = {Optimizing energy-efficiency of PHY-Layer authentication in machine-to-machine networks}, booktitle = {Workshops Proceedings of the Global Communications Conference, {GLOBECOM} 2012, 3-7 December 2012, Anaheim, California, {USA}}, pages = {1663--1668}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GLOCOMW.2012.6477835}, doi = {10.1109/GLOCOMW.2012.6477835}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/BartoliHSDKB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/Rebollo-MonederoFS11, author = {David Rebollo{-}Monedero and Jordi Forn{\'{e}} and Miguel Soriano}, title = {An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers}, journal = {Data Knowl. Eng.}, volume = {70}, number = {10}, pages = {892--921}, year = {2011}, url = {https://doi.org/10.1016/j.datak.2011.06.005}, doi = {10.1016/J.DATAK.2011.06.005}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dke/Rebollo-MonederoFS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/Hernandez-SerranoLS11, author = {Juan Hern{\'{a}}ndez{-}Serrano and Olga Le{\'{o}}n and Miguel Soriano}, title = {Modeling the Lion Attack in Cognitive Radio Networks}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2011}, year = {2011}, url = {https://doi.org/10.1155/2011/242304}, doi = {10.1155/2011/242304}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejwcn/Hernandez-SerranoLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/FernandezMS11, author = {Marcel Fernandez and Jos{\'{e}} Moreira and Miguel Soriano}, title = {Identifying Traitors Using the Koetter-Vardy Algorithm}, journal = {{IEEE} Trans. Inf. Theory}, volume = {57}, number = {2}, pages = {692--704}, year = {2011}, url = {https://doi.org/10.1109/TIT.2010.2095194}, doi = {10.1109/TIT.2010.2095194}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/FernandezMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/BartoliHSDKB11, author = {Andrea Bartoli and Juan Hern{\'{a}}ndez{-}Serrano and Miguel Soriano and Mischa Dohler and Apostolos A. Kountouris and Dominique Barthel}, title = {Secure Lossless Aggregation Over Fading and Shadowing Channels for Smart Grid {M2M} Networks}, journal = {{IEEE} Trans. Smart Grid}, volume = {2}, number = {4}, pages = {844--864}, year = {2011}, url = {https://doi.org/10.1109/TSG.2011.2162431}, doi = {10.1109/TSG.2011.2162431}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/BartoliHSDKB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/EsparzaMTS11, author = {Oscar Esparza and Jose L. Mu{\~{n}}oz and Joan Tom{\`{a}}s{-}Buliart and Miguel Soriano}, title = {An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking}, journal = {Wirel. Commun. Mob. Comput.}, volume = {11}, number = {11}, pages = {1446--1462}, year = {2011}, url = {https://doi.org/10.1002/wcm.941}, doi = {10.1002/WCM.941}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/EsparzaMTS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/CampoGS11, author = {Juan Vera del Campo and Ana Gomez{-}Muro and Miguel Soriano}, editor = {Fatos Xhafa and Leonard Barolli and Joanna Kolodziej and Samee Ullah Khan}, title = {Private Audio Streaming for an Automated Phone Assistance System}, booktitle = {2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2011, Barcelona, Catalonia, Spain, October 26-28, 2011}, pages = {128--133}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/3PGCIC.2011.62}, doi = {10.1109/3PGCIC.2011.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/3pgcic/CampoGS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cogart/LeonHS11, author = {Olga Le{\'{o}}n and Juan Hern{\'{a}}ndez{-}Serrano and Miguel Soriano}, editor = {Simone Frattasi and Nicola Marchetti}, title = {Robust detection of primary user emulation attacks in {IEEE} 802.22 networks}, booktitle = {CogART 2011, International Conference on Cognitive Radio and Advanced Spectrum Management, Barcelona, Spain, October 26-29, 2011}, pages = {51}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2093256.2093307}, doi = {10.1145/2093256.2093307}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cogart/LeonHS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Tomas-BuliartGFS11, author = {Joan Tom{\`{a}}s{-}Buliart and Ana Gomez{-}Muro and Marcel Fernandez and Miguel Soriano}, title = {Use of turbo codes with low-rate convolutional constituent codes in fingerprinting scenarios}, booktitle = {2011 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WIFS.2011.6123142}, doi = {10.1109/WIFS.2011.6123142}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/Tomas-BuliartGFS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FernandezCSD10, author = {Marcel Fernandez and Josep Cotrina and Miguel Soriano and Neus Domingo}, title = {A note about the identifier parent property in Reed-Solomon codes}, journal = {Comput. Secur.}, volume = {29}, number = {5}, pages = {628--635}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.12.012}, doi = {10.1016/J.COSE.2009.12.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FernandezCSD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/LeonHS10, author = {Olga Le{\'{o}}n and Juan Hern{\'{a}}ndez{-}Serrano and Miguel Soriano}, title = {Securing cognitive radio networks}, journal = {Int. J. Commun. Syst.}, volume = {23}, number = {5}, pages = {633--652}, year = {2010}, url = {https://doi.org/10.1002/dac.1102}, doi = {10.1002/DAC.1102}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/LeonHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/Tomas-BuliartFS10, author = {Joan Tom{\`{a}}s{-}Buliart and Marcel Fernandez and Miguel Soriano}, title = {Traitor tracing over YouTube video service - proof of concept}, journal = {Telecommun. Syst.}, volume = {45}, number = {1}, pages = {47--60}, year = {2010}, url = {https://doi.org/10.1007/s11235-009-9236-z}, doi = {10.1007/S11235-009-9236-Z}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/telsys/Tomas-BuliartFS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2010, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0}, doi = {10.1007/978-3-642-17650-0}, isbn = {978-3-642-17649-4}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2010, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Miguel Soriano}, title = {Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6264}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15152-1}, doi = {10.1007/978-3-642-15152-1}, isbn = {978-3-642-15151-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Morales-RochaSP09, author = {Victor Morales{-}Rocha and Miguel Soriano and Jordi Puiggali}, title = {New voter verification scheme using pre-encrypted ballots}, journal = {Comput. Commun.}, volume = {32}, number = {7-10}, pages = {1219--1227}, year = {2009}, url = {https://doi.org/10.1016/j.comcom.2009.03.007}, doi = {10.1016/J.COMCOM.2009.03.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/Morales-RochaSP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/FernandezNSD09, author = {Marcel Fernandez and Josep Cotrina Navau and Miguel Soriano and Neus Domingo}, editor = {Dimitris Gritzalis and Javier L{\'{o}}pez}, title = {On the {IPP} Properties of Reed-Solomon Codes}, booktitle = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {297}, pages = {87--97}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01244-0\_8}, doi = {10.1007/978-3-642-01244-0\_8}, timestamp = {Thu, 29 Aug 2019 08:10:01 +0200}, biburl = {https://dblp.org/rec/conf/sec/FernandezNSD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/MoreiraFS09, author = {Jos{\'{e}} Moreira and Marcel Fernandez and Miguel Soriano}, title = {A note on the equivalence of the traceability properties of Reed-Solomon codes for certain coalition sizes}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {36--40}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386488}, doi = {10.1109/WIFS.2009.5386488}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/MoreiraFS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/Hernandez-SerranoPS08, author = {Juan Hern{\'{a}}ndez{-}Serrano and Josep Pegueroles and Miguel Soriano}, title = {Shared Self-Organized {GKM} Protocol for MANETs}, journal = {J. Inf. Sci. Eng.}, volume = {24}, number = {6}, pages = {1629--1646}, year = {2008}, url = {http://www.iis.sinica.edu.tw/page/jise/2008/200811\_02.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/Hernandez-SerranoPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/Tomas-BuliartFS08, author = {Joan Tom{\`{a}}s{-}Buliart and Marcel Fernandez and Miguel Soriano}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {287--294}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_26}, doi = {10.1007/978-3-642-03552-4\_26}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/critis/Tomas-BuliartFS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Tomas-BuliartFS08, author = {Joan Tom{\`{a}}s{-}Buliart and Marcel Fernandez and Miguel Soriano}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {New Considerations about the Correct Design of Turbo Fingerprinting Codes}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {501--516}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_32}, doi = {10.1007/978-3-540-88313-5\_32}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Tomas-BuliartFS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ev/Morales-RochaPS08, author = {Victor Morales{-}Rocha and Jordi Puiggali and Miguel Soriano}, editor = {Robert Krimmer and R{\"{u}}diger Grimm}, title = {Secure Remote Voter Registration}, booktitle = {3rd International Conference, Co-organized by Council of Europe, Gesellschaft f{\"{u}}r Informatik and E-Voting.CC, August 6th-9th, 2008 in Castle Hofen, Bregenz, Austria}, series = {{LNI}}, volume = {{P-131}}, pages = {95--108}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/29193}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ev/Morales-RochaPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/FernandezSC07, author = {Marcel Fernandez and Miguel Soriano and Josep Cotrina}, title = {Tracing illegal redistribution using errors-anderasures and side information decoding algorithms}, journal = {{IET} Inf. Secur.}, volume = {1}, number = {2}, pages = {83--90}, year = {2007}, url = {https://doi.org/10.1049/iet-ifs:20055145}, doi = {10.1049/IET-IFS:20055145}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/FernandezSC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/CampoPS07, author = {Juan Vera del Campo and Josep Pegueroles and Miguel Soriano}, title = {Providing Security Services in a Resource Discovery System}, journal = {J. Networks}, volume = {2}, number = {1}, pages = {48--59}, year = {2007}, url = {https://doi.org/10.4304/jnw.2.1.48-59}, doi = {10.4304/JNW.2.1.48-59}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/CampoPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/oir/FernandezNS07, author = {Marcel Fernandez and Josep Cotrina Navau and Miguel Soriano}, title = {?-error."{\textgreater}A class of non-linear asymptotic fingerprinting codes with ?-error}, journal = {Online Inf. Rev.}, volume = {31}, number = {1}, pages = {22--37}, year = {2007}, url = {https://doi.org/10.1108/14684520710731010}, doi = {10.1108/14684520710731010}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/oir/FernandezNS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ZarzaPS07, author = {Luis Zarza and Josep Pegueroles and Miguel Soriano}, title = {Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms}, booktitle = {Proceedings of the The Second International Conference on Availability, Reliability and Security, {ARES} 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria}, pages = {1207--1213}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARES.2007.83}, doi = {10.1109/ARES.2007.83}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ZarzaPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/PaezTFS07, author = {Rafael P{\'{a}}ez and Joan Tom{\`{a}}s{-}Buliart and Jordi Forn{\'{e}} and Miguel Soriano}, editor = {Javier L{\'{o}}pez and Bernhard M. H{\"{a}}mmerli}, title = {Securing Agents against Malicious Host in an Intrusion Detection System}, booktitle = {Critical Information Infrastructures Security, Second International Workshop, {CRITIS} 2007, M{\'{a}}laga, Spain, October 3-5, 2007. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5141}, pages = {94--105}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-89173-4\_9}, doi = {10.1007/978-3-540-89173-4\_9}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/PaezTFS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/ZarzaPS07, author = {Luis Zarza and Josep Pegueroles and Miguel Soriano}, title = {Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms}, booktitle = {18th International Workshop on Database and Expert Systems Applications {(DEXA} 2007), 3-7 September 2007, Regensburg, Germany}, pages = {708--712}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/DEXA.2007.79}, doi = {10.1109/DEXA.2007.79}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/ZarzaPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/Hernandez-SerranoPS07, author = {Juan Hern{\'{a}}ndez{-}Serrano and Josep Pegueroles and Miguel Soriano}, editor = {Osvaldo Gervasi and Marina L. Gavrilova}, title = {Supporting Mobility in {GKM} over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm}, booktitle = {Computational Science and Its Applications - {ICCSA} 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4706}, pages = {526--539}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74477-1\_49}, doi = {10.1007/978-3-540-74477-1\_49}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsa/Hernandez-SerranoPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/FernandezNSD07, author = {Marcel Fernandez and Josep Cotrina Navau and Miguel Soriano and Neus Domingo}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {A Note About the Traceability Properties of Linear Codes}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {251--258}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_20}, doi = {10.1007/978-3-540-76788-6\_20}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/FernandezNSD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Tomas-BuliartFS07, author = {Joan Tom{\`{a}}s{-}Buliart and Marcel Fernandez and Miguel Soriano}, editor = {Yvo Desmedt}, title = {Improvement of Collusion Secure Convolutional Fingerprinting Information Codes}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {76--88}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_6}, doi = {10.1007/978-3-642-10230-1\_6}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/Tomas-BuliartFS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/Tomas-BuliartFS07, author = {Joan Tom{\`{a}}s{-}Buliart and Marcel Fernandez and Miguel Soriano}, editor = {Bruno Apolloni and Robert J. Howlett and Lakhmi C. Jain}, title = {Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems}, booktitle = {Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, {KES} 2007, {XVII} Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {4694}, pages = {992--999}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74829-8\_121}, doi = {10.1007/978-3-540-74829-8\_121}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/kes/Tomas-BuliartFS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PaezTFS07, author = {Rafael P{\'{a}}ez and Joan Tom{\`{a}}s and Jordi Forn{\'{e}} and Miguel Soriano}, editor = {Javier Hernando and Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek}, title = {{MAIS:} Mobile Agent Integrity System - {A} Security System to {IDS} based on Autonomous Agents}, booktitle = {{SECRYPT} 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {41--47}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Fri, 04 Sep 2009 13:27:09 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PaezTFS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/EsparzaMSF06, author = {Oscar Esparza and Jose L. Mu{\~{n}}oz and Miguel Soriano and Jordi Forn{\'{e}}}, title = {Secure brokerage mechanisms for mobile electronic commerce}, journal = {Comput. Commun.}, volume = {29}, number = {12}, pages = {2308--2321}, year = {2006}, url = {https://doi.org/10.1016/j.comcom.2006.03.005}, doi = {10.1016/J.COMCOM.2006.03.005}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/EsparzaMSF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FernandezSN06, author = {Marcel Fernandez and Miguel Soriano and Josep Cotrina Navau}, title = {Obtaining Traceability Codes from Chinese Reminder Theorem Codes}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {1}, pages = {227--230}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.1.227}, doi = {10.1093/IETFEC/E89-A.1.227}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/FernandezSN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbdcn/PeguerolesFRS06, author = {Josep Pegueroles and Marcel Fernandez and Francisco Rico{-}Novella and Miguel Soriano}, title = {Multicast Copyright Protection System Based on a Trusted Soft-Engine}, journal = {Int. J. Bus. Data Commun. Netw.}, volume = {2}, number = {2}, pages = {55--67}, year = {2006}, url = {https://doi.org/10.4018/jbdcn.2006040104}, doi = {10.4018/JBDCN.2006040104}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbdcn/PeguerolesFRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ngc/EsparzaMSF06, author = {Oscar Esparza and Jose L. Mu{\~{n}}oz and Miguel Soriano and Jordi Forn{\'{e}}}, title = {Punishing Malicious Hosts with the Cryptographic Traces Approach}, journal = {New Gener. Comput.}, volume = {24}, number = {4}, pages = {351--376}, year = {2006}, url = {https://doi.org/10.1007/BF03037399}, doi = {10.1007/BF03037399}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ngc/EsparzaMSF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CampoPS06, author = {Juan Vera del Campo and Josep Pegueroles and Miguel Soriano}, title = {Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks}, booktitle = {Proceedings of the The First International Conference on Availability, Reliability and Security, {ARES} 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria}, pages = {148--155}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ARES.2006.100}, doi = {10.1109/ARES.2006.100}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/CampoPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/PeguerolesFRS06, author = {Josep Pegueroles and Marcel Fernandez and Francisco Rico{-}Novella and Miguel Soriano}, editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`{a}} and Youngsong Mun and Hyunseung Choo}, title = {A Practical Solution for Distribution Rights Protection in Multicast Environments}, booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3982}, pages = {527--536}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11751595\_56}, doi = {10.1007/11751595\_56}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/PeguerolesFRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ZarzaPSM06, author = {Luis Zarza and Josep Pegueroles and Miguel Soriano and Rafael Mart{\'{\i}}nez}, editor = {Manu Malek and Eduardo Fern{\'{a}}ndez{-}Medina and Javier Hernando}, title = {Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques}, booktitle = {{SECRYPT} 2006, Proceedings of the International Conference on Security and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {316--319}, publisher = {{INSTICC} Press}, year = {2006}, timestamp = {Thu, 28 Sep 2006 10:10:32 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ZarzaPSM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/SorianoFTBT05, author = {Miguel Soriano and Stephan Flake and J{\"{u}}rgen Tacken and Frank Bormann and Joan Tom{\`{a}}s}, title = {Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms}, booktitle = {16th International Workshop on Database and Expert Systems Applications {(DEXA} 2005), 22-26 August 2005, Copenhagen, Denmark}, pages = {251--256}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/DEXA.2005.135}, doi = {10.1109/DEXA.2005.135}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/SorianoFTBT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/FernandezSN05, author = {Marcel Fernandez and Miguel Soriano and Josep Cotrina Navau}, editor = {Osvaldo Gervasi and Marina L. Gavrilova and Vipin Kumar and Antonio Lagan{\`{a}} and Heow Pueh Lee and Youngsong Mun and David Taniar and Chih Jeng Kenneth Tan}, title = {Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms}, booktitle = {Computational Science and Its Applications - {ICCSA} 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3481}, pages = {527--536}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11424826\_56}, doi = {10.1007/11424826\_56}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/FernandezSN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/FernandezSN05a, author = {Marcel Fernandez and Miguel Soriano and Josep Cotrina Navau}, editor = {Osvaldo Gervasi and Marina L. Gavrilova and Vipin Kumar and Antonio Lagan{\`{a}} and Heow Pueh Lee and Youngsong Mun and David Taniar and Chih Jeng Kenneth Tan}, title = {Practical Scenarios for the Van Trung-Martirosyan Codes}, booktitle = {Computational Science and Its Applications - {ICCSA} 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3481}, pages = {624--633}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11424826\_66}, doi = {10.1007/11424826\_66}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/FernandezSN05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/NavauFS05, author = {Josep Cotrina Navau and Marcel Fernandez and Miguel Soriano}, editor = {Mauro Barni and Jordi Herrera{-}Joancomart{\'{\i}} and Stefan Katzenbeisser and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {A Family of Collusion 2-Secure Codes}, booktitle = {Information Hiding, 7th International Workshop, {IH} 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3727}, pages = {387--397}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11558859\_28}, doi = {10.1007/11558859\_28}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/NavauFS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/FernandezSN05, author = {Marcel Fernandez and Miguel Soriano and Josep Cotrina Navau}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Tracing Traitors by Guessing Secrets. The \emph{q}-Ary Case}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {61--73}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_6}, doi = {10.1007/978-3-540-31979-5\_6}, timestamp = {Wed, 25 Sep 2019 18:12:57 +0200}, biburl = {https://dblp.org/rec/conf/ispec/FernandezSN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/FernandezSN05a, author = {Marcel Fernandez and Miguel Soriano and Josep Cotrina Navau}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {A New Class of Codes for Fingerprinting Schemes}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {398--409}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_34}, doi = {10.1007/978-3-540-31979-5\_34}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/FernandezSN05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itrust/SorianoFSTCPH05, author = {Miguel Soriano and Marcel Fernandez and Elisa Sayrol and Joan Tom{\`{a}}s and Joan Casanellas and Josep Pegueroles and Juan Hern{\'{a}}ndez{-}Serrano}, editor = {Peter Herrmann and Val{\'{e}}rie Issarny and Simon Shiu}, title = {Multimedia Copyright Protection Platform Demonstrator}, booktitle = {Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3477}, pages = {411--414}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11429760\_32}, doi = {10.1007/11429760\_32}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itrust/SorianoFSTCPH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/SorianoFN05, author = {Miguel Soriano and Marcel Fernandez and Josep Cotrina Navau}, editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and Hyoung Joong Kim}, title = {Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information}, booktitle = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena, Italy, September 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3710}, pages = {231--243}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11551492\_18}, doi = {10.1007/11551492\_18}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/SorianoFN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/Hernandez-SerranoPS05, author = {Juan Hern{\'{a}}ndez{-}Serrano and Josep Pegueroles and Miguel Soriano}, editor = {Lawrence Chung and Yeong{-}Tae Song}, title = {Energy Efficiency of Load Balancing in {MANET} Routing Protocols}, booktitle = {Proceedings of the 6th {ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing {(SNPD} 2005), May 23-25, 2005, Towson, Maryland, {USA}}, pages = {476--483}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SNPD-SAWN.2005.34}, doi = {10.1109/SNPD-SAWN.2005.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/Hernandez-SerranoPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sswmc/SayrolSFCT05, author = {Elisa Sayrol and Miguel Soriano and Marcel Fernandez and Joan Casanellas and Joan Tom{\`{a}}s}, editor = {Edward J. Delp III and Ping Wah Wong}, title = {Development of a platform offering video copyright protection and security against illegal distribution}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, January 17-20, 2005, Proceedings}, series = {Proceedings of {SPIE}}, volume = {5681}, pages = {76--83}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.591742}, doi = {10.1117/12.591742}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sswmc/SayrolSFCT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeemm/FernandezS04, author = {Marcel Fernandez and Miguel Soriano}, title = {Soft-Decision Tracing in Fingerprinted Multimedia Content}, journal = {{IEEE} Multim.}, volume = {11}, number = {2}, pages = {38--46}, year = {2004}, url = {https://doi.org/10.1109/MMUL.2004.1289040}, doi = {10.1109/MMUL.2004.1289040}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeemm/FernandezS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MunozFES04, author = {Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}} and Oscar Esparza and Miguel Soriano}, title = {Certificate revocation system implementation based on the Merkle hash tree}, journal = {Int. J. Inf. Sec.}, volume = {2}, number = {2}, pages = {110--124}, year = {2004}, url = {https://doi.org/10.1007/s10207-003-0026-4}, doi = {10.1007/S10207-003-0026-4}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MunozFES04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsp/FernandezS04, author = {Marcel Fernandez and Miguel Soriano}, title = {Identification of traitors in algebraic-geometric traceability codes}, journal = {{IEEE} Trans. Signal Process.}, volume = {52}, number = {10}, pages = {3073--3077}, year = {2004}, url = {https://doi.org/10.1109/TSP.2004.833858}, doi = {10.1109/TSP.2004.833858}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsp/FernandezS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/MunozFES04, author = {Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}} and Oscar Esparza and Miguel Soriano}, editor = {Sokratis K. Katsikas and Stefanos Gritzalis and Javier L{\'{o}}pez}, title = {{CERVANTES} - {A} Certificate Validation Test-Bed}, booktitle = {Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3093}, pages = {28--42}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25980-0\_3}, doi = {10.1007/978-3-540-25980-0\_3}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/europki/MunozFES04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/EsparzaSMF04, author = {Oscar Esparza and Miguel Soriano and Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}}}, title = {Punishing manipulation attacks in mobile agent systems}, booktitle = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM} '04, Dallas, Texas, USA, 29 November - 3 December 2004}, pages = {2235--2239}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/GLOCOM.2004.1378406}, doi = {10.1109/GLOCOM.2004.1378406}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/EsparzaSMF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/MunozPFES04, author = {Jose L. Mu{\~{n}}oz and Josep Pegueroles and Jordi Forn{\'{e}} and Oscar Esparza and Miguel Soriano}, editor = {Marian Bubak and G. Dick van Albada and Peter M. A. Sloot and Jack J. Dongarra}, title = {Security Issues in Virtual Grid Environments}, booktitle = {Computational Science - {ICCS} 2004, 4th International Conference, Krak{\'{o}}w, Poland, June 6-9, 2004, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3038}, pages = {174--178}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24688-6\_25}, doi = {10.1007/978-3-540-24688-6\_25}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccS/MunozPFES04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/FernandezS04, author = {Marcel Fernandez and Miguel Soriano}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Identification of Traitors Using a Trellis}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {211--222}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_17}, doi = {10.1007/978-3-540-30191-2\_17}, timestamp = {Thu, 29 Aug 2019 08:10:01 +0200}, biburl = {https://dblp.org/rec/conf/icics/FernandezS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/FernandezS04, author = {Marcel Fernandez and Miguel Soriano}, editor = {Anne Canteaut and Kapalee Viswanathan}, title = {Identification Algorithms for Sequential Traitor Tracing}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3348}, pages = {414--430}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30556-9\_32}, doi = {10.1007/978-3-540-30556-9\_32}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/FernandezS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/FernandezS04, author = {Marcel Fernandez and Miguel Soriano}, title = {Efficient Recovery of Secrets}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {763--767}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286749}, doi = {10.1109/ITCC.2004.1286749}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/FernandezS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mata/EsparzaSMF04, author = {Oscar Esparza and Miguel Soriano and Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}}}, editor = {Ahmed Karmouch and Larry Korba and Edmundo Roberto Mauro Madeira}, title = {Detecting and Proving Manipulation Attacks in Mobile Agent Systems}, booktitle = {Mobility Aware Technologies and Applications, First International Workshop,MATA 2004, Florian{\'{o}}polis, Brazil, October 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3284}, pages = {224--233}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30178-3\_21}, doi = {10.1007/978-3-540-30178-3\_21}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mata/EsparzaSMF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MunozFES03, author = {Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}} and Oscar Esparza and Miguel Soriano}, editor = {Jianying Zhou and Moti Yung and Yongfei Han}, title = {Using {OCSP} to Secure Certificate-Using Transactions in M-commerce}, booktitle = {Applied Cryptography and Network Security, First International Conference, {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2846}, pages = {280--292}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45203-4\_22}, doi = {10.1007/978-3-540-45203-4\_22}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/MunozFES03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/EsparzaFSMF03, author = {Oscar Esparza and Marcel Fernandez and Miguel Soriano and Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}}}, editor = {Vladim{\'{\i}}r Mar{\'{\i}}k and Werner Retschitzegger and Olga Step{\'{a}}nkov{\'{a}}}, title = {Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts}, booktitle = {Database and Expert Systems Applications, 14th International Conference, {DEXA} 2003, Prague, Czech Republic, September 1-5, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2736}, pages = {927--936}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45227-0\_90}, doi = {10.1007/978-3-540-45227-0\_90}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexa/EsparzaFSMF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/Martinez-BallesteSDS03, author = {Antoni Mart{\'{\i}}nez{-}Ballest{\'{e}} and Francesc Seb{\'{e}} and Josep Domingo{-}Ferrer and Miguel Soriano}, title = {Practical Asymmetric Fingerprinting with a {TTP}}, booktitle = {14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic}, pages = {352--356}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/DEXA.2003.1232047}, doi = {10.1109/DEXA.2003.1232047}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/Martinez-BallesteSDS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/MunozFESJ03, author = {Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}} and Oscar Esparza and Miguel Soriano and David Jodra}, title = {Evaluation of Revocation Systems with a {JAVA} Test-bed}, booktitle = {14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic}, pages = {450--454}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/DEXA.2003.1232063}, doi = {10.1109/DEXA.2003.1232063}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/MunozFESJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/FernandezS03, author = {Marcel Fernandez and Miguel Soriano}, editor = {Kurt Bauknecht and A Min Tjoa and Gerald Quirchmayr}, title = {Protecting Intellectual Property by Guessing Secrets}, booktitle = {E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2738}, pages = {196--205}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45229-4\_20}, doi = {10.1007/978-3-540-45229-4\_20}, timestamp = {Tue, 29 Dec 2020 18:30:42 +0100}, biburl = {https://dblp.org/rec/conf/ecweb/FernandezS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/PeguerolesBSR03, author = {Josep Pegueroles and Wang Bin and Miguel Soriano and Francisco Rico{-}Novella}, editor = {Minglu Li and Xian{-}He Sun and Qianni Deng and Jun Ni}, title = {Group Rekeying Algorithm Using Pseudo-random Functions and Modular Reduction}, booktitle = {Grid and Cooperative Computing, Second International Workshop, {GCC} 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3032}, pages = {875--882}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24679-4\_148}, doi = {10.1007/978-3-540-24679-4\_148}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/gcc/PeguerolesBSR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/EsparzaSMF03, author = {Oscar Esparza and Miguel Soriano and Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}}}, editor = {Sihan Qing and Dieter Gollmann and Jianying Zhou}, title = {Protocols for Malicious Host Revocation}, booktitle = {Information and Communications Security, 5th International Conference, {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2836}, pages = {191--201}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39927-8\_18}, doi = {10.1007/978-3-540-39927-8\_18}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/EsparzaSMF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwe/EsparzaSMF03, author = {Oscar Esparza and Miguel Soriano and Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}}}, editor = {Juan Manuel Cueva Lovelle and Bernardo Mart{\'{\i}}n Gonz{\'{a}}lez Rodr{\'{\i}}guez and Luis Joyanes Aguilar and Jos{\'{e}} Emilio Labra Gayo and Mar{\'{\i}}a del Puerto Paule Ru{\'{\i}}z}, title = {Host Revocation Authority: {A} Way of Protecting Mobile Agents from Malicious Hosts}, booktitle = {Web Engineering, International Conference, {ICWE} 2003, Oviedo, Spain, July 14-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2722}, pages = {289--292}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45068-8\_54}, doi = {10.1007/3-540-45068-8\_54}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icwe/EsparzaSMF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/MunozFES03, author = {Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}} and Oscar Esparza and Miguel Soriano}, title = {Implementation of an Efficient Authenticated Dictionary for Certificate Revocation}, booktitle = {Proceedings of the Eighth {IEEE} Symposium on Computers and Communications {(ISCC} 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey}, pages = {238--243}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ISCC.2003.1214128}, doi = {10.1109/ISCC.2003.1214128}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/MunozFES03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/EsparzaSMF03, author = {Oscar Esparza and Miguel Soriano and Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}}}, title = {A protocol for detecting malicious hosts based on limiting the execution time of mobile agents}, booktitle = {Proceedings of the Eighth {IEEE} Symposium on Computers and Communications {(ISCC} 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey}, pages = {251--256}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ISCC.2003.1214130}, doi = {10.1109/ISCC.2003.1214130}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/EsparzaSMF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/FernandezS03, author = {Marcel Fernandez and Miguel Soriano}, title = {A generalization of traceability codes using ideal-based codes}, booktitle = {Proceedings 2003 {IEEE} Information Theory Workshop, {ITW} 2003, La Sorbonne, Paris, France, 31 March - 4 April, 2003}, pages = {66--69}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ITW.2003.1216696}, doi = {10.1109/ITW.2003.1216696}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/FernandezS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mata/EsparzaSMF03, author = {Oscar Esparza and Miguel Soriano and Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}}}, editor = {Eric Horlait and Thomas Magedanz and Roch H. Glitho}, title = {Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts}, booktitle = {Mobile Agents for Telecommunication Applications, 5th International Workshop, {MATA} 2003, Marakech, Morocco, October 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2881}, pages = {286--295}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39646-8\_27}, doi = {10.1007/978-3-540-39646-8\_27}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mata/EsparzaSMF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mips/MunozFES03, author = {Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}} and Oscar Esparza and Miguel Soriano}, editor = {Giorgio Ventre and Roberto Canonico}, title = {Efficient Offline Certificate Revocation}, booktitle = {Interactive Multimedia on Next Generation Networks, First International Workshop on Multimedia Interactive Protocols and Systems, {MIPS} 2003, Napoli, Italy, November 18-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2899}, pages = {319--330}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40012-7\_26}, doi = {10.1007/978-3-540-40012-7\_26}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mips/MunozFES03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/MunozFES03, author = {Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}} and Oscar Esparza and Miguel Soriano}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {A Certificate Status Checking Protocol for the Authenticated Dictionary}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {255--266}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_21}, doi = {10.1007/978-3-540-45215-7\_21}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/MunozFES03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MunozFES03, author = {Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}} and Oscar Esparza and Miguel Soriano}, editor = {Kijoon Chae and Moti Yung}, title = {{E-MHT.} An Efficient Protocol for Certificate Status Checking}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {410--424}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_31}, doi = {10.1007/978-3-540-24591-9\_31}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/MunozFES03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/SorianoP02, author = {Miguel Soriano and Diego Ponce}, title = {A security and usability proposal for mobile electronic commerce}, journal = {{IEEE} Commun. Mag.}, volume = {40}, number = {8}, pages = {62--67}, year = {2002}, url = {https://doi.org/10.1109/MCOM.2002.1024416}, doi = {10.1109/MCOM.2002.1024416}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/SorianoP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cgiv/Sanchez-MaranonSMOM02, author = {Manuel S{\'{a}}nchez{-}Mara{\~{n}}{\'{o}}n and Miguel Soriano and Isabel Miralles and Ra{\'{u}}l Ortega and Manuel Melgosa}, title = {Testing Color-Mixing Laws In Soil Mineral Mixtures}, booktitle = {First European Conference on Colour in Graphics, Imaging, and Vision, {CGIV} 2002, Poitiers, France, April 2-5, 2002}, pages = {202--205}, publisher = {IS{\&}T - The Society for Imaging Science and Technology}, year = {2002}, url = {http://www.ingentaconnect.com/content/ist/cgiv/2002/00002002/00000001/art00044}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cgiv/Sanchez-MaranonSMOM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/FernandezS02, author = {Marcel Fernandez and Miguel Soriano}, title = {Efficient Identification of Traitors in Fingerprinted Multimedia Contents}, booktitle = {13th International Workshop on Database and Expert Systems Applications {(DEXA} 2002), 2-6 September 2002, Aix-en-Provence, France}, pages = {463--467}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/DEXA.2002.1045941}, doi = {10.1109/DEXA.2002.1045941}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/FernandezS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/FernandezS02, author = {Marcel Fernandez and Miguel Soriano}, title = {Soft-decision decoding of traceability codes}, booktitle = {Proceedings of the 2002 {IEEE} International Conference on Multimedia and Expo, {ICME} 2002, Lausanne, Switzerland. August 26-29, 2002. Volume {I}}, pages = {605--608}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ICME.2002.1035854}, doi = {10.1109/ICME.2002.1035854}, timestamp = {Mon, 09 Aug 2021 17:01:45 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/FernandezS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/FernandezS02, author = {Marcel Fernandez and Miguel Soriano}, title = {Decoding codes with the identifiable parent property}, booktitle = {Proceedings of the Seventh {IEEE} Symposium on Computers and Communications {(ISCC} 2002), 1-4 July 2002, Taormina, Italy}, pages = {1028--1033}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ISCC.2002.1021798}, doi = {10.1109/ISCC.2002.1021798}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/FernandezS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/FernandezS02, author = {Marcel Fernandez and Miguel Soriano}, editor = {Agnes Hui Chan and Virgil D. Gligor}, title = {Fingerprinting Concatenated Codes with Efficient Identification}, booktitle = {Information Security, 5th International Conference, {ISC} 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2433}, pages = {459--470}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45811-5\_36}, doi = {10.1007/3-540-45811-5\_36}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/FernandezS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/CrusellesSM98, author = {Ernesto J. Cruselles and Miguel Soriano and Jos{\'{e}} Luis Mel{\'{u}}s{-}Moreno}, title = {Spreading Codes Generator for Wireless {CDMA} Networks}, journal = {Wirel. Pers. Commun.}, volume = {7}, number = {1}, pages = {69--88}, year = {1998}, url = {https://doi.org/10.1023/A:1008860715309}, doi = {10.1023/A:1008860715309}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/CrusellesSM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/CrusellesSM95, author = {Ernesto J. Cruselles and Miguel Soriano and Jos{\'{e}} Luis Mel{\'{u}}s{-}Moreno}, title = {Uncorrelated {PN} sequences generator for spreading codes in {CDMA} systems}, booktitle = {The 6th {IEEE} International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 1995, Toronto, ON, Canada, September 27-29, 1995}, pages = {1335}, year = {1995}, url = {https://doi.org/10.1109/PIMRC.1995.477380}, doi = {10.1109/PIMRC.1995.477380}, timestamp = {Thu, 04 Jun 2020 15:17:53 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/CrusellesSM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/RecachaMSSF93, author = {Francisco Recacha and Jos{\'{e}} L. Mel{\'{u}}s and X. Sim{\'{o}}n and Miguel Soriano and Jordi Forn{\'{e}}}, title = {Secure Data Transmission in Extended Ethernet Environments}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {11}, number = {5}, pages = {794--803}, year = {1993}, url = {https://doi.org/10.1109/49.223882}, doi = {10.1109/49.223882}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/RecachaMSSF93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SorianoFRM93, author = {Miguel Soriano and Jordi Forn{\'{e}} and Francisco Recacha and Jos{\'{e}} L. Mel{\'{u}}s}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu and Victoria Ashby}, title = {A Particular Solution to Provide Secure Communications in an Ethernet Environment}, booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993}, pages = {17--25}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/168588.168591}, doi = {10.1145/168588.168591}, timestamp = {Tue, 10 Nov 2020 20:00:40 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SorianoFRM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/SorianoFMR93, author = {Miguel Soriano and Jordi Forn{\'{e}} and Jos{\'{e}} L. Mel{\'{u}}s and Francisco Recacha}, title = {Implementation of a security system in a local area network environment}, booktitle = {18th Conference on Local Computer Networks, September 19-22, 1993, Minneapolis, Minnesota, USA, Proceedings}, pages = {230--236}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/LCN.1993.591229}, doi = {10.1109/LCN.1993.591229}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/SorianoFMR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.