Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    A survey on IoT trust model frameworks

    Trust can be considered as a multidisciplinary concept, which is strongly related to the context and it falls in different fields such as Philosophy, Psychology or Computer Science. Trust is fundamental in eve...

    Davide Ferraris, Carmen Fernandez-Gago, Rodrigo Roman in The Journal of Supercomputing (2024)

  2. No Access

    Book and Conference Proceedings

    Security and Trust Management

    17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings

    Rodrigo Roman, Jianying Zhou in Lecture Notes in Computer Science (2021)

  3. No Access

    Chapter and Conference Paper

    Distributed Detection of APTs: Consensus vs. Clustering

    Advanced persistent threats (APTs) demand for sophisticated traceability solutions capable of providing deep insight into the movements of the attacker through the victim’s network at all times. However, tradi...

    Juan E. Rubio, Cristina Alcaraz, Ruben Rios in Computer Security – ESORICS 2020 (2020)

  4. Chapter and Conference Paper

    Tracking Advanced Persistent Threats in Critical Infrastructures Through Opinion Dynamics

    Advanced persistent threats pose a serious issue for modern industrial environments, due to their targeted and complex attack vectors that are difficult to detect. This is especially severe in critical infrast...

    Juan E. Rubio, Rodrigo Roman, Cristina Alcaraz, Yan Zhang in Computer Security (2018)

  5. No Access

    Chapter and Conference Paper

    Analysis of Cybersecurity Threats in Industry 4.0: The Case of Intrusion Detection

    Nowadays, industrial control systems are experiencing a new revolution with the interconnection of the operational equipment with the Internet, and the introduction of cutting-edge technologies such as Cloud C...

    Juan E. Rubio, Rodrigo Roman, Javier Lopez in Critical Information Infrastructures Security (2018)

  6. No Access

    Article

    Advanced secure multimedia services for digital homes

    Our society is becoming increasingly more IT-oriented, and the images and sounds that reflect our daily life are being stored mainly in a digital form. This digital personal life can be part of the home multim...

    Rodrigo Roman, Javier Lopez, Olivier Dugeon, Marc Lacoste in Information Systems Frontiers (2012)

  7. No Access

    Chapter and Conference Paper

    Security in the Distributed Internet of Things

    In the Internet of Things (IoT) [1], services can be provisioned using centralized architectures (central entities acquiring, processing, and providing information), but various types of distributed architectu...

    Rodrigo Roman, Javier Lopez in Trusted Systems (2012)

  8. No Access

    Chapter and Conference Paper

    A Novel Key Update Protocol in Mobile Sensor Networks

    Wireless Sensor Networks (WSN) have found applications in many areas including healthcare, military and behavior monitoring. However, due to various factors (e.g. use of a wireless channel, deployment in publi...

    Sarita Agrawal, Rodrigo Roman, Manik Lal Das in Information Systems Security (2012)

  9. No Access

    Chapter and Conference Paper

    Secure Architecure for the Integration of RFID and Sensors in Personal Networks

    The secure integration of RFID technology into the personal network paradigm, as a context-aware technology which complements body sensor networks, would provide notable benefits to applications and potential ...

    Pablo Najera, Rodrigo Roman, Javier Lopez in Security and Trust Management (2012)

  10. Chapter and Conference Paper

    Towards a Cooperative Intrusion Detection System for Cognitive Radio Networks

    Cognitive Radio Networks (CRNs) arise as a promising solution to the scarcity of spectrum. By means of cooperation and smart decisions influenced by previous knowledge, CRNs are able to detect and profit from ...

    Olga León, Rodrigo Román, Juan Hernández-Serrano in NETWORKING 2011 Workshops (2011)

  11. No Access

    Chapter and Conference Paper

    Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems

    SCADA systems represent a challenging scenario where the management of critical alarms is crucial. Their response to these alarms should be efficient and fast in order to mitigate or contain undesired effects....

    Cristina Alcaraz, Isaac Agudo in Trust, Privacy and Security in Digital Bus… (2009)

  12. No Access

    Chapter

    Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks

    As sensor networks are more and more being implemented in real world settings, it is necessary to analyze how the different requirements of these real-world applications can influence the security mechanisms. ...

    Javier Lopez, Rodrigo Roman in Foundations of Security Analysis and Desig… (2009)

  13. No Access

    Chapter and Conference Paper

    A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks

    Wireless sensors are low power devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is their main limitation, they require consid...

    David Galindo, Rodrigo Roman, Javier Lopez in Cryptology and Network Security (2008)

  14. No Access

    Article

    A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes

    In a wireless sensor network environment, a sensor node is extremely constrained in terms of hardware due to factors such as maximizing lifetime and minimizing physical size and overall cost. Nevertheless, the...

    Rodrigo Roman, Cristina Alcaraz, Javier Lopez in Mobile Networks and Applications (2007)

  15. No Access

    Article

    Integration of non-repudiation services in mobile DRM scenarios

    In any kind of electronic transaction, it is extremely important to assure that any of the parties involved can not deny their participation in the information exchange. This security property, which is calle...

    Jose A. Onieva, Javier Lopez, Rodrigo Roman, Jianying Zhou in Telecommunication Systems (2007)

  16. No Access

    Chapter and Conference Paper

    Applicability of Public Key Infrastructures in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) are becoming a key technology in the support of pervasive and ubiquitous services. The previous notion of “PKC is too expensive for WSN” has changed partially due to the existenc...

    Rodrigo Roman, Cristina Alcaraz in Public Key Infrastructure (2007)

  17. No Access

    Chapter and Conference Paper

    On the Protection and Technologies of Critical Information Infrastructures

    Critical Infrastructures are complex and highly interconnected systems that are crucial for the well-being of the society. Any type of failure can cause significant damage, affecting one or more sectors due to...

    Javier Lopez, Cristina Alcaraz in Foundations of Security Analysis and Desig… (2007)

  18. No Access

    Chapter and Conference Paper

    Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios

    It is commonly agreed that Wireless Sensor Networks (WSN) is one of the technologies that better fulfills features like the ones required by Critical (Information) Infrastructures. However, a sensor network is...

    Cristina Alcaraz, Rodrigo Roman in Critical Information Infrastructures Security (2006)

  19. Chapter and Conference Paper

    Protection Against Spam Using Pre-Challenges

    Spam turns out to be an increasingly serious problem to email users. A number of anti-spam schemes have been proposed and deployed, but the problem has yet been well addressed. One of those schem...

    Rodrigo Roman, Jianying Zhou, Javier Lopez in Security and Privacy in the Age of Ubiquit… (2005)

  20. No Access

    Chapter and Conference Paper

    On the Security of Wireless Sensor Networks

    Wireless Sensor Networks are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource-constrained nodes and lack of tamper-resistant packages. As a result,...

    Rodrigo Roman, Jianying Zhou, Javier Lopez in Computational Science and Its Applications… (2005)

previous disabled Page of 2