default search action
Javier López 0001
Person information
- affiliation: University of Málaga, Spain
Other persons with the same name
- Javier López — disambiguation page
- Javier López 0002 (aka: Javier López Mato) — University of A Coruña, Department of Information and Communication Technologies, Spain
- Javier López 0003 (aka: Javier López López) — Hospital Universitario Infanta Sofía, Madrid, Spain
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j141]Cristina Alcaraz, Iman Hasnaouia Meskini, Javier López:
Digital twin communities: an approach for secure DT data sharing. Int. J. Inf. Sec. 24(1): 17 (2025) - 2024
- [j140]Jose Antonio Onieva, Pablo Pérez Jiménez, Javier López:
Malware similarity and a new fuzzy hash: Compound Code Block Hash (CCBHash). Comput. Secur. 142: 103856 (2024) - [j139]Cristina Alcaraz, Javier López:
Digital Twin-assisted anomaly detection for industrial scenarios. Int. J. Crit. Infrastructure Prot. 47: 100721 (2024) - [j138]M. Carmen Fernández Gago, Davide Ferraris, Rodrigo Roman, Javier López:
Trust interoperability in the Internet of Things. Internet Things 26: 101226 (2024) - [j137]Francesco Flammini, Cristina Alcaraz, Emanuele Bellini, Stefano Marrone, Javier López, Andrea Bondavalli:
Towards Trustworthy Autonomous Systems: Taxonomies and Future Perspectives. IEEE Trans. Emerg. Top. Comput. 12(2): 601-614 (2024) - [j136]Davide Ferraris, M. Carmen Fernández Gago, Rodrigo Roman, Javier López:
A survey on IoT trust model frameworks. J. Supercomput. 80(6): 8259-8296 (2024) - 2023
- [j135]Antonio Muñoz, Ruben Rios, Rodrigo Román, Javier López:
A survey on the (in)security of trusted execution environments. Comput. Secur. 129: 103180 (2023) - [j134]Daniel Morales Escalera, Isaac Agudo, Javier López:
Private set intersection: A systematic literature review. Comput. Sci. Rev. 49: 100567 (2023) - [j133]Rodrigo Roman, Cristina Alcaraz, Javier López, Kouichi Sakurai:
Current Perspectives on Securing Critical Infrastructures' Supply Chains. IEEE Secur. Priv. 21(4): 29-38 (2023) - [j132]Cristina Alcaraz, Javier López:
Protecting Digital Twin Networks for 6G-enabled Industry 5.0 Ecosystems. IEEE Netw. 37(2): 302-308 (2023) - [c129]Daniel Morales Escalera, Isaac Agudo, Javier López:
Integration of MPC into Besu through an extended private transaction model. MetaCom 2023: 266-273 - 2022
- [j131]Cristina Alcaraz, Javier López:
Digital Twin: A Comprehensive Survey of Security Threats. IEEE Commun. Surv. Tutorials 24(3): 1475-1503 (2022) - [j130]Ruben Rios, Jose Antonio Onieva, Rodrigo Roman, Javier López:
Personal IoT Privacy Control at the Edge. IEEE Secur. Priv. 20(1): 23-32 (2022) - [c128]Davide Ferraris, M. Carmen Fernández Gago, Javier López:
Verification and Validation Methods for a Trust-by-Design Framework for the IoT. DBSec 2022: 183-194 - [c127]Jesus Cumplido, Cristina Alcaraz, Javier López:
Collaborative Anomaly Detection System for Charging Stations. ESORICS (2) 2022: 716-736 - [c126]Davide Ferraris, M. Carmen Fernández Gago, Javier López:
Novel Approaches for the Development of Trusted IoT Entities. SEC 2022: 215-230 - [c125]Daniel Morales Escalera, Isaac Agudo, Javier López:
Real-time Crowd Counting based on Wearable Ephemeral IDs. SECRYPT 2022: 249-260 - 2021
- [j129]Simone Fischer-Hübner, Cristina Alcaraz, Afonso Ferreira, M. Carmen Fernández Gago, Javier López, Evangelos P. Markatos, Lejla Islami, Mahdi Akil:
Stakeholder perspectives and requirements on cybersecurity in Europe. J. Inf. Secur. Appl. 61: 102916 (2021) - [j128]Isaac Agudo, Manuel Montenegro, Javier López:
A Blockchain Approach for Decentralized V2X (D-V2X). IEEE Trans. Veh. Technol. 70(5): 4001-4010 (2021) - [j127]Javier López, Juan E. Rubio, Cristina Alcaraz:
Digital Twins for Intelligent Authorization in the B5G-Enabled Smart Grid. IEEE Wirel. Commun. 28(2): 48-55 (2021) - [p4]Steven Furnell, Paul S. Haskell-Dowland, Manish Agrawal, Richard L. Baskerville, Anirban Basu, Matt Bishop, Jorge Cuéllar, Sara Foresti, Lynn Futcher, Nurit Gal-Oz, Tejaswini (Teju) Herath, Christian Damsgaard Jensen, Allen C. Johnston, Wouter Joosen, Giovanni Livraga, Javier López, Stephen Marsh, Fabio Martinelli, Fabio Massacci, Aljosa Pasic, Stef Schinagl, Abbas Shahim, Kerry-Lynn Thomson, Jaideep Vaidya, Tony Vance, Merrill Warkentin:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401 - 2020
- [j126]Davide Ferraris, M. Carmen Fernández Gago, Javier López:
A model-driven approach to ensure trust in the IoT. Hum. centric Comput. Inf. Sci. 10: 50 (2020) - [j125]Cristina Alcaraz, Juan E. Rubio, Javier López:
Blockchain-assisted access for federated Smart Grid domains: Coupling and features. J. Parallel Distributed Comput. 144: 124-135 (2020) - [j124]Juan E. Rubio, Rodrigo Roman, Javier López:
Integration of a Threat Traceability Solution in the Industrial Internet of Things. IEEE Trans. Ind. Informatics 16(10): 6575-6583 (2020) - [c124]Juan E. Rubio, Cristina Alcaraz, Javier López:
Game Theory-Based Approach for Defense Against APTs. ACNS (2) 2020: 297-320 - [c123]Juan E. Rubio, Cristina Alcaraz, Ruben Rios, Rodrigo Roman, Javier López:
Distributed Detection of APTs: Consensus vs. Clustering. ESORICS (1) 2020: 174-192 - [c122]Martin Kolár, M. Carmen Fernández Gago, Javier López:
A Model Specification Implementation for Trust Negotiation. NSS 2020: 327-341
2010 – 2019
- 2019
- [j123]Martin Kolár, M. Carmen Fernández Gago, Javier López:
A model specification for the design of trust negotiations. Comput. Secur. 84: 288-300 (2019) - [j122]Juan Enrique Rubio, Cristina Alcaraz, Rodrigo Roman, Javier López:
Current cyber-defense trends in industrial control systems. Comput. Secur. 87 (2019) - [j121]David Nuñez, Isaac Agudo, Javier López:
Escrowed decryption protocols for lawful interception of encrypted data. IET Inf. Secur. 13(5): 498-507 (2019) - [j120]Rodrigo Roman, Ruben Rios, Jose Antonio Onieva, Javier López:
Immune System for the Internet of Things Using Edge Technologies. IEEE Internet Things J. 6(3): 4774-4781 (2019) - [j119]Jose Antonio Onieva, Ruben Rios, Rodrigo Roman, Javier López:
Edge-Assisted Vehicular Networks Security. IEEE Internet Things J. 6(5): 8038-8045 (2019) - [j118]José María de Fuentes, Lorena González-Manzano, Javier López, Pedro Peris-Lopez, Kim-Kwang Raymond Choo:
Editorial: Security and Privacy in Internet of Things. Mob. Networks Appl. 24(3): 878-880 (2019) - [j117]Sarita Agrawal, Manik Lal Das, Javier López:
Detection of Node Capture Attack in Wireless Sensor Networks. IEEE Syst. J. 13(1): 238-247 (2019) - [j116]Cristina Alcaraz, Giuseppe Bernieri, Federica Pascucci, Javier López, Roberto Setola:
Covert Channels-Based Stealth Attacks in Industry 4.0. IEEE Syst. J. 13(4): 3980-3988 (2019) - [c121]Davide Ferraris, M. Carmen Fernández Gago, Joshua Daniel, Javier López:
A Segregated Architecture for a Trust-based Network of Internet of Things. CCNC 2019: 1-6 - [c120]Aristeidis Farao, Juan Enrique Rubio, Cristina Alcaraz, Christoforos Ntantogian, Christos Xenakis, Javier López:
SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications. CRITIS 2019: 169-175 - [c119]Juan E. Rubio, Mark Manulis, Cristina Alcaraz, Javier López:
Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics. ESORICS (2) 2019: 263-280 - [p3]Ana Nieto, Ruben Rios, Javier López, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Privacy-aware digital forensics. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 157-195 - [e40]Swee-Huay Heng, Javier López:
Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings. Lecture Notes in Computer Science 11879, Springer 2019, ISBN 978-3-030-34338-5 [contents] - 2018
- [j115]Javier López, Juan E. Rubio:
Access control for cyber-physical systems interconnected to the cloud. Comput. Networks 134: 46-54 (2018) - [j114]Ruben Rios, M. Carmen Fernández Gago, Javier López:
Modelling privacy-aware trust negotiations. Comput. Secur. 77: 773-789 (2018) - [j113]Rodrigo Roman Castro, Javier López, Stefanos Gritzalis:
Evolution and Trends in IoT Security. Computer 51(7): 16-25 (2018) - [j112]Ioannis Stellios, Panayiotis Kotzanikolaou, Mihalis Psarakis, Cristina Alcaraz, Javier López:
A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services. IEEE Commun. Surv. Tutorials 20(4): 3453-3495 (2018) - [j111]Rodrigo Roman, Javier López, Masahiro Mambo:
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78: 680-698 (2018) - [j110]Raja Naeem Akram, Hsiao-Hwa Chen, Javier López, Damien Sauveron, Laurence T. Yang:
Security, privacy and trust of user-centric solutions. Future Gener. Comput. Syst. 80: 417-420 (2018) - [j109]Hiroshi Tsunoda, Rodrigo Roman, Javier López, Glenn Mansfield Keeni:
Feasibility of Societal Model for Securing Internet of Things. KSII Trans. Internet Inf. Syst. 12(8): 3567-3588 (2018) - [j108]Ana Nieto, Ruben Rios, Javier López:
IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations. Sensors 18(2): 492 (2018) - [j107]Lorena Cazorla, Cristina Alcaraz, Javier López:
Cyber Stealth Attacks in Critical Information Infrastructures. IEEE Syst. J. 12(2): 1778-1792 (2018) - [j106]Cristina Alcaraz, Javier López:
A Cyber-Physical Systems-Based Checkpoint Model for Structural Controllability. IEEE Syst. J. 12(4): 3543-3554 (2018) - [j105]Javier López, Juan E. Rubio, Cristina Alcaraz:
A Resilient Architecture for the Smart Grid. IEEE Trans. Ind. Informatics 14(8): 3745-3753 (2018) - [j104]Yan Zhang, Javier López, Jian Tang, Ying-Chang Liang, Xing Zhang:
Wireless Big Data: Technologies and Applications. IEEE Wirel. Commun. 25(1): 10-11 (2018) - [c118]Ana Nieto, Antonio Acien, Javier López:
Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity Theory. DASC/PiCom/DataCom/CyberSciTech 2018: 520-527 - [c117]Antonio Acien, Ana Nieto, Javier López:
Analyzing Cross-Platform Attacks: Towards a Three-Actor Approach. DASC/PiCom/DataCom/CyberSciTech 2018: 536-543 - [c116]Martin Kolár, M. Carmen Fernández Gago, Javier López:
Policy Languages and Their Suitability for Trust Negotiation. DBSec 2018: 69-84 - [c115]Davide Ferraris, M. Carmen Fernández Gago, Javier López:
A Trust-by-Design Framework for the Internet of Things. NTMS 2018: 1-4 - [c114]Juan E. Rubio, Cristina Alcaraz, Javier López:
Addressing Security in OCPP: Protection Against Man-in-the-Middle Attacks. NTMS 2018: 1-5 - [c113]Antonio Acien, Ana Nieto, Gerardo Fernandez, Javier López:
A Comprehensive Methodology for Deploying IoT Honeypots. TrustBus 2018: 229-243 - [e39]Jong Kim, Gail-Joon Ahn, Seungjoo Kim, Yongdae Kim, Javier López, Taesoo Kim:
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018 [contents] - [e38]Javier López, Jianying Zhou, Miguel Soriano:
Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I. Lecture Notes in Computer Science 11098, Springer 2018, ISBN 978-3-319-99072-9 [contents] - [e37]Javier López, Jianying Zhou, Miguel Soriano:
Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II. Lecture Notes in Computer Science 11099, Springer 2018, ISBN 978-3-319-98988-4 [contents] - 2017
- [j103]Xinyi Huang, Joseph K. Liu, Javier López:
Editorial: Special issue on security data science and cyber threat management. Comput. Secur. 69: 1-2 (2017) - [j102]Cristina Alcaraz, Javier López, Kim-Kwang Raymond Choo:
Resilient interconnection in cyber-physical control systems. Comput. Secur. 71: 2-14 (2017) - [j101]Javier López, Ruben Rios, Feng Bao, Guilin Wang:
Evolving privacy: From sensors to the Internet of Things. Future Gener. Comput. Syst. 75: 46-57 (2017) - [j100]M. Carmen Fernández Gago, Francisco Moyano, Javier López:
Modelling trust dynamics in the Internet of Things. Inf. Sci. 396: 72-82 (2017) - [j99]David Nuñez, Isaac Agudo, Javier López:
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation. J. Netw. Comput. Appl. 87: 193-209 (2017) - [j98]Juan E. Rubio, Cristina Alcaraz, Javier López:
Recommender system for privacy-preserving solutions in smart metering. Pervasive Mob. Comput. 41: 205-218 (2017) - [j97]Ana Nieto, Nikolaos Nomikos, Javier López, Charalambos Skianis:
Dynamic Knowledge-Based Analysis in Nonsecure 5G Green Environments Using Contextual Data. IEEE Syst. J. 11(4): 2479-2489 (2017) - [j96]Cristina Alcaraz, Javier López, Stephen D. Wolthusen:
OCPP Protocol: Security Threats and Challenges. IEEE Trans. Smart Grid 8(5): 2452-2459 (2017) - [c112]Matteo Langone, Roberto Setola, Javier López:
Cybersecurity of Wearable Devices: An Experimental Analysis and a Vulnerability Assessment Method. COMPSAC (2) 2017: 304-309 - [c111]Juan E. Rubio, Rodrigo Roman, Javier López:
Analysis of Cybersecurity Threats in Industry 4.0: The Case of Intrusion Detection. CRITIS 2017: 119-130 - [c110]David Nuñez, Isaac Agudo, Javier López:
The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol. DBSec 2017: 453-472 - [c109]Juan E. Rubio, Cristina Alcaraz, Javier López:
Preventing Advanced Persistent Threats in Complex Control Networks. ESORICS (2) 2017: 402-418 - [c108]Ruben Rios, Rodrigo Roman, Jose Antonio Onieva, Javier López:
From SMOG to Fog: A security perspective. FMEC 2017: 56-61 - [c107]Giuseppe Bernieri, Federica Pascucci, Javier López:
Network Anomaly Detection in Critical Infrastructure Based on Mininet Network Simulator. ITASEC 2017: 116-125 - [c106]Ruben Rios, David Nuñez, Javier López:
Query Privacy in Sensing-as-a-Service Platforms. SEC 2017: 141-154 - [c105]Juan Enrique Rubio, Cristina Alcaraz, Rodrigo Roman, Javier López:
Analysis of Intrusion Detection Systems in Industrial Ecosystems. SECRYPT 2017: 116-128 - [c104]Gerardo Fernandez, Ana Nieto, Javier López:
Modeling Malware-driven Honeypots. TrustBus 2017: 130-144 - [c103]Ana Nieto, Ruben Rios, Javier López:
A Methodology for Privacy-Aware IoT-Forensics. TrustCom/BigDataSE/ICESS 2017: 626-633 - [c102]Ana Nieto, Ruben Rios, Javier López:
Digital Witness and Privacy in IoT: Anonymous Witnessing Approach. TrustCom/BigDataSE/ICESS 2017: 642-649 - [e36]Javier López, Simone Fischer-Hübner, Costas Lambrinoudakis:
Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings. Lecture Notes in Computer Science 10442, Springer 2017, ISBN 978-3-319-64482-0 [contents] - 2016
- [b2]Ruben Rios, Javier López, Jorge Cuéllar:
Location Privacy in Wireless Sensor Networks. CRC Press / Taylor & Francis 2016, ISBN 9781498776332 - [j95]Cristina Alcaraz, Javier López, Stephen D. Wolthusen:
Policy enforcement system for secure interoperable control in distributed Smart Grid systems. J. Netw. Comput. Appl. 59: 301-314 (2016) - [j94]Francisco Moyano, M. Carmen Fernández Gago, Javier López:
A model-driven approach for engineering trust and reputation into software services. J. Netw. Comput. Appl. 69: 134-151 (2016) - [j93]Ana Nieto, Rodrigo Roman, Javier López:
Digital Witness: Safeguarding Digital Evidence by Using Secure Architectures in Personal Devices. IEEE Netw. 30(6): 34-41 (2016) - [j92]David Nuñez, Isaac Agudo, Javier López:
On the application of generic CCA-secure transformations to proxy re-encryption. Secur. Commun. Networks 9(12): 1769-1785 (2016) - [c101]Juan E. Rubio, Cristina Alcaraz, Javier López:
Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems. CRITIS 2016: 176-188 - [c100]Cristina Alcaraz, Javier López:
Safeguarding Structural Controllability in Cyber-Physical Control Systems. ESORICS (2) 2016: 471-489 - [c99]Cristina Alcaraz, Javier López, Kim-Kwang Raymond Choo:
Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control Systems. SECRYPT 2016: 19-27 - [c98]Ruben Rios, M. Carmen Fernández Gago, Javier López:
Privacy-Aware Trust Negotiation. STM 2016: 98-105 - [e35]Jianying Zhou, Javier López:
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, CPSS@AsiaCCS, Xi'an, China, May 30, 2016. ACM 2016, ISBN 978-1-4503-4288-9 [contents] - [e34]Alessandro Aldini, Javier López, Fabio Martinelli:
Foundations of Security Analysis and Design VIII - FOSAD 2014/2015/2016 Tutorial Lectures. Lecture Notes in Computer Science 9808, Springer 2016, ISBN 978-3-319-43004-1 [contents] - [e33]Sara Foresti, Javier López:
Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Lecture Notes in Computer Science 9895, Springer 2016, ISBN 978-3-319-45930-1 [contents] - [i5]Rodrigo Roman, Javier López, Masahiro Mambo:
Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges. CoRR abs/1602.00484 (2016) - [i4]Ana Nieto, Rodrigo Roman, Javier López:
Digital Witness: Digital Evidence Management Framework for the Internet of Things. ERCIM News 2016(106) (2016) - [i3]David Nuñez, Isaac Agudo, Javier López:
A Parametric Family of Attack Models for Proxy Re-Encryption. IACR Cryptol. ePrint Arch. 2016: 293 (2016) - [i2]David Nuñez, Isaac Agudo, Javier López:
Attacks to a proxy-mediated key agreement protocol based on symmetric encryption. IACR Cryptol. ePrint Arch. 2016: 1081 (2016) - 2015
- [j91]Lorena Cazorla, Cristina Alcaraz, Javier López:
Awareness and reaction strategies for critical infrastructure protection. Comput. Electr. Eng. 47: 299-317 (2015) - [j90]Ana Nieto, Javier López:
Contextualising heterogeneous information in unified communications with security restrictions. Comput. Commun. 68: 33-46 (2015) - [j89]Lorena Cazorla, Cristina Alcaraz, Javier López:
A three-stage analysis of IDS for critical infrastructures. Comput. Secur. 55: 235-250 (2015) - [j88]Ruben Rios, Jorge Cuéllar, Javier López:
Probabilistic receiver-location privacy protection in wireless sensor networks. Inf. Sci. 321: 205-223 (2015) - [j87]Nikolaos Nomikos, Ana Nieto, Prodromos Makris, Dimitrios N. Skoutas, Demosthenes Vouyioukas, Panagiotis Rizomiliotis, Javier López, Charalambos Skianis:
Relay selection for secure 5G green communications. Telecommun. Syst. 59(1): 169-187 (2015) - [c97]David Nuñez, Isaac Agudo, Javier López:
NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU. AsiaCCS 2015: 179-189 - [c96]David Nuñez, Isaac Agudo, Javier López:
A Parametric Family of Attack Models for Proxy Re-encryption. CSF 2015: 290-301 - [e32]Javier López, Indrajit Ray, Bruno Crispo:
Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8924, Springer 2015, ISBN 978-3-319-17126-5 [contents] - [e31]Javier López, Yongdong Wu:
Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015. Proceedings. Lecture Notes in Computer Science 9065, Springer 2015, ISBN 978-3-319-17532-4 [contents] - [e30]Javier López, Chris J. Mitchell:
Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings. Lecture Notes in Computer Science 9290, Springer 2015, ISBN 978-3-319-23317-8 [contents] - [e29]Simone Fischer-Hübner, Costas Lambrinoudakis, Javier López:
Trust, Privacy and Security in Digital Business - 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings. Lecture Notes in Computer Science 9264, Springer 2015, ISBN 978-3-319-22905-8 [contents] - 2014
- [j86]José A. Montenegro, Javier López:
A practical solution for sealed bid and multi-currency auctions. Comput. Secur. 45: 186-198 (2014) - [j85]Cristina Alcaraz, Javier López:
Diagnosis mechanism for accurate monitoring in critical infrastructure protection. Comput. Stand. Interfaces 36(3): 501-512 (2014) - [j84]M. Carmen Fernández Gago, Isaac Agudo, Javier López:
Building trust from context similarity measures. Comput. Stand. Interfaces 36(4): 792-800 (2014) - [j83]Cristina Alcaraz, Javier López:
WASAM: A dynamic wide-area situational awareness model for critical domains in Smart Grids. Future Gener. Comput. Syst. 30: 146-154 (2014) - [j82]Ana Nieto, Javier López:
A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms. Mob. Networks Appl. 19(1): 64-78 (2014) - [j81]Ana Nieto, Javier López:
Analysis and taxonomy of security/QoS tradeoff solutions for the future internet. Secur. Commun. Networks 7(12): 2778-2803 (2014) - [j80]Barbora Buhnova, Antonio Vallecillo, Nenad Medvidovic, Magnus Larsson, Javier López, Jorge Cuéllar:
Guest editorial to the Special Issue on Component-Based Software Engineering and Software Architecture. Sci. Comput. Program. 90: 67-70 (2014) - [c95]David Nuñez, Isaac Agudo, Javier López:
Privacy-Preserving Identity Management as a Service. A4Cloud 2014: 114-125 - [c94]David Nuñez, Isaac Agudo, Javier López:
Delegated Access for Hadoop Clusters in the Cloud. CloudCom 2014: 374-379 - [c93]Ana Nieto, Javier López:
A Context-based Parametric Relationship Model (CPRM) to measure the Security and QoS tradeoff in configurable environments. ICC 2014: 755-760 - [c92]Javier López, Ruben Rios, Jorge Cuéllar:
Preserving Receiver-Location Privacy in Wireless Sensor Networks. ISPEC 2014: 15-27 - [c91]Ana Nieto, Javier López:
Security and QoS tradeoff recommendation system (SQT-RS) for dynamic assessing CPRM-based systems. Q2SWinet 2014: 25-32 - [p2]Francisco Moyano, M. Carmen Fernández Gago, Benoit Baudry, Javier López:
Engineering Trust-Awareness and Self-adaptability in Services and Systems. Engineering Secure Future Internet Services and Systems 2014: 180-209 - [e28]Alessandro Aldini, Javier López, Fabio Martinelli:
Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures. Lecture Notes in Computer Science 8604, Springer 2014, ISBN 978-3-319-10081-4 [contents] - [e27]Maritta Heisel, Wouter Joosen, Javier López, Fabio Martinelli:
Engineering Secure Future Internet Services and Systems - Current Research. Lecture Notes in Computer Science 8431, Springer 2014, ISBN 978-3-319-07451-1 [contents] - 2013
- [j79]Cristina Alcaraz, Rodrigo Roman, Pablo Najera, Javier López:
Security of industrial sensor network-based remote substations in the context of the Internet of Things. Ad Hoc Networks 11(3): 1091-1104 (2013) - [j78]Javier López, Svetla Nikova, Andreas Pashalidis, Günther Pernul, Bart Preneel:
Preface. Comput. Math. Appl. 65(5): 747 (2013) - [j77]Rodrigo Roman, Jianying Zhou, Javier López:
On the features and challenges of security and privacy in distributed internet of things. Comput. Networks 57(10): 2266-2279 (2013) - [j76]Javier López, Cristina Alcaraz, Rodrigo Roman:
Smart control of operational threats in control substations. Comput. Secur. 38: 14-27 (2013) - [j75]Ruben Rios, Jose Antonio Onieva, Javier López:
Covert communications through network configuration messages. Comput. Secur. 39: 34-46 (2013) - [j74]Isaac Agudo, Ruben Rios, Javier López:
A privacy-aware continuous authentication scheme for proximity-based access control. Comput. Secur. 39: 117-126 (2013) - [j73]Cristina Alcaraz, Javier López:
Wide-Area Situational Awareness for Critical Infrastructure Protection. Computer 46(4): 30-37 (2013) - [j72]José A. Montenegro, Michael J. Fischer, Javier López, René Peralta:
Secure sealed-bid online auctions using discreet cryptographic proofs. Math. Comput. Model. 57(11-12): 2583-2595 (2013) - [j71]Francisco Moyano, M. Carmen Fernández Gago, Javier López:
A framework for enabling trust requirements in social cloud applications. Requir. Eng. 18(4): 321-341 (2013) - [j70]Pablo Najera, Rodrigo Roman, Javier López:
User-centric secure integration of personal RFID tags and sensor networks. Secur. Commun. Networks 6(10): 1177-1197 (2013) - [j69]Ruben Rios, Javier López:
(Un)Suitability of Anonymous Communication Systems to WSN. IEEE Syst. J. 7(2): 298-310 (2013) - [c90]Francisco Moyano, M. Carmen Fernández Gago, Javier López:
Towards Engineering Trust-Aware Future Internet Systems. CAiSE Workshops 2013: 490-501 - [c89]Lorena Cazorla, Cristina Alcaraz, Javier López:
Towards Automatic Critical Infrastructure Protection through Machine Learning. CRITIS 2013: 197-203 - [c88]Ruben Rios, Javier López, Jorge Cuéllar:
Location Privacy in WSNs: Solutions, Challenges, and Future Trends. FOSAD 2013: 244-282 - [c87]Francisco Moyano, Benoit Baudry, Javier López:
Towards Trust-Aware and Self-adaptive Systems. IFIPTM 2013: 255-262 - [e26]Bernhard M. Hämmerli, Nils Kalstad Svendsen, Javier López:
Critical Information Infrastructures Security - 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7722, Springer 2013, ISBN 978-3-642-41484-8 [contents] - [e25]Javier López, Xinyi Huang, Ravi S. Sandhu:
Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lecture Notes in Computer Science 7873, Springer 2013, ISBN 978-3-642-38630-5 [contents] - [e24]Steven Furnell, Costas Lambrinoudakis, Javier López:
Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings. Lecture Notes in Computer Science 8058, Springer 2013, ISBN 978-3-642-40342-2 [contents] - 2012
- [j68]Cristina Alcaraz, Javier López, Rodrigo Roman, Hsiao-Hwa Chen:
Selecting key management schemes for WSN applications. Comput. Secur. 31(8): 956-966 (2012) - [j67]Cristina Alcaraz, Javier López:
Analysis of requirements for critical control systems. Int. J. Crit. Infrastructure Prot. 5(3-4): 137-145 (2012) - [j66]Rodrigo Roman, Javier López, Olivier Dugeon, Marc Lacoste, Pierre Yves Plaza, Marta Bel:
Advanced secure multimedia services for digital homes. Inf. Syst. Frontiers 14(3): 527-540 (2012) - [j65]Gilles Barthe, Jorge Cuéllar, Javier López, Alexander Pretschner:
Preface. J. Comput. Secur. 20(4): 307-308 (2012) - [j64]David Galindo, Rodrigo Roman, Javier López:
On the energy cost of authenticated key agreement in wireless sensor networks. Wirel. Commun. Mob. Comput. 12(1): 133-143 (2012) - [c86]Ana Nieto, Javier López:
Traffic Classifier for Heterogeneous and Cooperative Routing through Wireless Sensor Networks. AINA Workshops 2012: 607-612 - [c85]Ana Nieto, Javier López:
Security and QoS Tradeoffs: Towards a FI Perspective. AINA Workshops 2012: 745-750 - [c84]David Nuñez, Isaac Agudo, Javier López:
Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services. CloudCom 2012: 241-248 - [c83]Siani Pearson, Vasilios Tountopoulos, Daniele Catteddu, Mario Südholt, Refik Molva, Christoph Reich, Simone Fischer-Hübner, Christopher Millard, Volkmar Lotz, Martin Gilje Jaatun, Ronald Leenes, Chunming Rong, Javier López:
Accountability for cloud and other future Internet services. CloudCom 2012: 629-632 - [c82]Ruben Rios, Jorge Cuéllar, Javier López:
Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN. ESORICS 2012: 163-180 - [c81]Francisco Moyano, M. Carmen Fernández Gago, Isaac Agudo, Javier López:
A Task Ordering Approach for Automatic Trust Establishment. ESSoS 2012: 75-88 - [c80]Sarita Agrawal, Rodrigo Roman, Manik Lal Das, Anish Mathuria, Javier López:
A Novel Key Update Protocol in Mobile Sensor Networks. ICISS 2012: 194-207 - [c79]Rodrigo Roman, Javier López:
Security in the Distributed Internet of Things. INTRUST 2012: 65-66 - [c78]Cristina Alcaraz, Javier López:
Addressing Situational Awareness in Critical Domains of a Smart Grid. NSS 2012: 58-71 - [c77]Ruben Rios, Jose Antonio Onieva, Javier López:
HIDE_DHCP: Covert Communications through Network Configuration Messages. SEC 2012: 162-173 - [c76]James Clarke, Rodrigo Roman Castro, Abhishek Sharma, Javier López, Neeraj Suri:
Trust & security RTD in the internet of things: opportunities for international cooperation. SECURIT 2012: 172-178 - [c75]Francisco Moyano, M. Carmen Fernández Gago, Javier López:
Building Trust and Reputation In: A Development Framework for Trust Models Implementation. STM 2012: 113-128 - [c74]Francisco Moyano, M. Carmen Fernández Gago, Javier López:
A Conceptual Framework for Trust Models. TrustBus 2012: 93-104 - [p1]Javier López, Roberto Setola, Stephen D. Wolthusen:
Overview of Critical Information Infrastructure Protection. Critical Infrastructure Protection 2012: 1-14 - [e23]Yang Xiang, Javier López, C.-C. Jay Kuo, Wanlei Zhou:
Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings. Lecture Notes in Computer Science 7672, Springer 2012, ISBN 978-3-642-35361-1 [contents] - [e22]Vincenzo Grassi, Raffaela Mirandola, Jorge Cuéllar, Javier López:
Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems, ISARCS 2012, part of Comparch '12 Federated Events on Component-Based Software Engineering and Software Architecture, Bertinoro, Italy, June 25-28, 2012. ACM 2012, ISBN 978-1-4503-1347-6 [contents] - [e21]Javier López, Roberto Setola, Stephen D. Wolthusen:
Critical Infrastructure Protection - Information Infrastructure Models, Analysis, and Defense. Lecture Notes in Computer Science 7130, Springer 2012, ISBN 978-3-642-28919-4 [contents] - 2011
- [j63]Rodrigo Roman, Cristina Alcaraz, Javier López, Nicolas Sklavos:
Key management systems for sensor networks in the context of the Internet of Things. Comput. Electr. Eng. 37(2): 147-159 (2011) - [j62]Ruben Rios, Javier López:
Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks. Comput. J. 54(10): 1603-1615 (2011) - [j61]Rodrigo Roman, Pablo Najera, Javier López:
Securing the Internet of Things. Computer 44(9): 51-58 (2011) - [j60]Yang Xiang, Javier López, Haining Wang, Wanlei Zhou:
Special Issue: Securing Distributed Networks and Systems. Concurr. Comput. Pract. Exp. 23(12): 1311-1312 (2011) - [j59]Cristina Alcaraz, Javier López, Jianying Zhou, Rodrigo Roman:
Secure SCADA framework for the protection of energy control systems. Concurr. Comput. Pract. Exp. 23(12): 1431-1442 (2011) - [j58]David Garcia Rosado, Eduardo Fernández-Medina, Javier López:
Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid Systems. IEICE Trans. Inf. Syst. 94-D(2): 243-254 (2011) - [j57]Ruben Rios, Javier López:
Analysis of location privacy solutions in wireless sensor networks. IET Commun. 5(17): 2518-2532 (2011) - [j56]Pablo Najera, Javier López, Rodrigo Roman:
Real-time location and inpatient care systems based on passive RFID. J. Netw. Comput. Appl. 34(3): 980-989 (2011) - [j55]David Garcia Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini:
Systematic design of secure Mobile Grid systems. J. Netw. Comput. Appl. 34(4): 1168-1183 (2011) - [j54]David Garcia Rosado, Eduardo Fernández-Medina, Javier López:
Security services architecture for Secure Mobile Grid Systems. J. Syst. Archit. 57(3): 240-258 (2011) - [j53]José Luis Vivas, Isaac Agudo, Javier López:
A methodology for security assurance-driven system development. Requir. Eng. 16(1): 55-73 (2011) - [j52]Cristina Alcaraz, M. Carmen Fernández Gago, Javier López:
An Early Warning System Based on Reputation for Energy Control Systems. IEEE Trans. Smart Grid 2(4): 827-834 (2011) - [j51]Rodrigo Roman, Javier López, Pablo Najera:
A cross-layer approach for integrating security mechanisms in sensor networks architectures. Wirel. Commun. Mob. Comput. 11(2): 267-276 (2011) - [c73]Rodrigo Roman, Javier López, Cristina Alcaraz, Hsiao-Hwa Chen:
SenseKey - Simplifying the Selection of Key Management Schemes for Sensor Networks. AINA Workshops 2011: 789-794 - [c72]Cristina Alcaraz, Isaac Agudo, David Nuñez, Javier López:
Managing Incidents in Smart Grids à la Cloud. CloudCom 2011: 527-531 - [c71]Wouter Joosen, Javier López, Fabio Martinelli, Fabio Massacci:
Engineering Secure Future Internet Services. Future Internet Assembly 2011: 177-192 - [c70]Pablo Najera, Rodrigo Roman, Javier López:
Secure Architecure for the Integration of RFID and Sensors in Personal Networks. STM 2011: 207-222 - [e20]Javier López, Gene Tsudik:
Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings. Lecture Notes in Computer Science 6715, 2011, ISBN 978-3-642-21553-7 [contents] - [e19]Javier López, Pierangela Samarati:
SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. SciTePress 2011, ISBN 978-989-8425-71-3 [contents] - [e18]James J. Park, Javier López, Sang-Soo Yeo, Taeshik Shon, David Taniar:
Secure and Trust Computing, Data Management and Applications - 8th FTRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings. Communications in Computer and Information Science 186, Springer 2011, ISBN 978-3-642-22338-9 [contents] - [e17]Jorge Cuéllar, Gilles Barthe, Alexander Pretschner, Javier López:
Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6710, Springer 2011, ISBN 978-3-642-22443-0 [contents] - 2010
- [j50]Isaac Agudo, M. Carmen Fernández Gago, Javier López:
A scale based trust model for multi-context environments. Comput. Math. Appl. 60(2): 209-216 (2010) - [j49]Javier López, Rodrigo Roman, Isaac Agudo, M. Carmen Fernández Gago:
Trust management systems for wireless sensor networks: Best practices. Comput. Commun. 33(9): 1086-1093 (2010) - [j48]Josep Lluís Ferrer-Gomila, Jose Antonio Onieva, Magdalena Payeras-Capellà, Javier López:
Certified electronic mail: Properties revisited. Comput. Secur. 29(2): 167-179 (2010) - [j47]Jordi Forné, M. Francisca Hinarejos, Andrés Marín, Florina Almenárez, Javier López, José A. Montenegro, Marc Lacoste, Daniel Díaz Sánchez:
Pervasive authentication and authorization infrastructures for mobile users. Comput. Secur. 29(4): 501-514 (2010) - [j46]Dimitris Gritzalis, Javier López:
Editorial. Comput. Secur. 29(5): 521-522 (2010) - [j45]José Luis Vivas, M. Carmen Fernández Gago, Javier López, Andrés Benjumea:
A security framework for a workflow-based grid development platform. Comput. Stand. Interfaces 32(5-6): 230-245 (2010) - [j44]David Garcia Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini:
Analysis of Secure Mobile Grid Systems: A systematic approach. Inf. Softw. Technol. 52(5): 517-536 (2010) - [j43]Jan Camenisch, Javier López, Fabio Massacci, Massimo Ciscato, Thomas Skordas:
JCS special issue on EU-funded ICT research on Trust and Security. J. Comput. Secur. 18(1): 1-5 (2010) - [j42]Jong Hyuk Park, Deqing Zou, Tai-Hoon Kim, Javier López, Hangbae Chang:
Editorial. J. Intell. Manuf. 21(5): 593-594 (2010) - [j41]David Garcia Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini:
Developing a Secure Mobile Grid System through a UML Extension. J. Univers. Comput. Sci. 16(17): 2333-2352 (2010) - [j40]Ying Qiu, Jianying Zhou, Joonsang Baek, Javier López:
Authentication and Key Establishment in Dynamic Wireless Sensor Networks. Sensors 10(4): 3718-3731 (2010) - [j39]Joachim Biskup, Javier López:
Editorial ESORICS 2007. ACM Trans. Inf. Syst. Secur. 13(3): 19:1-19:2 (2010) - [j38]Cristina Alcaraz, Javier López:
A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems. IEEE Trans. Syst. Man Cybern. Part C 40(4): 419-428 (2010) - [c69]Cristina Alcaraz, Angel Balastegui, Javier López:
Early Warning System for Cascading Effect Control in Energy Control Systems. CRITIS 2010: 55-66 - [c68]David Garcia Rosado, Eduardo Fernández-Medina, Javier López:
A Study of Security Approaches for the Development of Mobile Grid Systems. ICSOFT (1) 2010: 133-138 - [e16]Miguel Soriano, Sihan Qing, Javier López:
Information and Communications Security - 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings. Lecture Notes in Computer Science 6476, Springer 2010, ISBN 978-3-642-17649-4 [contents] - [e15]Sokratis K. Katsikas, Javier López, Miguel Soriano:
Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings. Lecture Notes in Computer Science 6264, Springer 2010, ISBN 978-3-642-15151-4 [contents]
2000 – 2009
- 2009
- [b1]Jose Antonio Onieva, Javier López, Jianying Zhou:
Secure Multi-Party Non-Repudiation Protocols and Applications. Advances in Information Security 43, Springer 2009, ISBN 978-0-387-75629-5, pp. 1-47 - [j37]Mildrey Carbonell, José María Sierra, Javier López:
Secure multiparty payment with an intermediary entity. Comput. Secur. 28(5): 289-300 (2009) - [j36]Dimitris Gritzalis, Javier López:
Editorial. Comput. Secur. 28(6): 325-326 (2009) - [j35]Isaac Agudo, M. Carmen Fernández Gago, Javier López:
Concurrent access control for multi-user and multi-processor systems based on trust relationships. Concurr. Comput. Pract. Exp. 21(10): 1389-1403 (2009) - [j34]David Garcia Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini:
Obtaining Security Requirements for a Mobile Grid System. Int. J. Grid High Perform. Comput. 1(3): 1-17 (2009) - [j33]Rodrigo Roman, Javier López:
Integrating wireless sensor networks and the internet: a security analysis. Internet Res. 19(2): 246-259 (2009) - [j32]Pablo Najera, Francisco Moyano, Javier López:
Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents. J. Univers. Comput. Sci. 15(5): 970-991 (2009) - [j31]Tarik Taleb, Javier López:
Next generation wireless communications and mobile computing/networking technologies. Wirel. Commun. Mob. Comput. 9(4): 441-443 (2009) - [c67]David Garcia Rosado, Eduardo Fernández-Medina, Javier López:
Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros. CIbSE 2009: 388-393 - [c66]Isaac Agudo, José Luis Vivas, Javier López:
Security assurance during the software development cycle. CompSysTech 2009: 20 - [c65]David Garcia Rosado, Eduardo Fernández-Medina, Javier López:
Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application. ER Workshops 2009: 126-136 - [c64]Isaac Agudo, M. Carmen Fernández Gago, Javier López:
A Multidimensional Reputation Scheme for Identity Federations. EuroPKI 2009: 225-238 - [c63]Javier López, Rodrigo Roman, Cristina Alcaraz:
Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks. FOSAD 2009: 289-338 - [c62]David Garcia Rosado, Eduardo Fernández-Medina, Javier López:
Reusable security use cases for mobile grid environments. SESS@ICSE 2009: 1-8 - [c61]David Garcia Rosado, Eduardo Fernández-Medina, Javier López:
Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros. JISBD 2009: 331-342 - [c60]Cristina Alcaraz, Isaac Agudo, M. Carmen Fernández Gago, Rodrigo Roman, Gerardo Fernandez, Javier López:
Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems. TrustBus 2009: 86-94 - [e14]Yang Xiang, Javier López, Haining Wang, Wanlei Zhou:
Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3838-9 [contents] - [e13]Dimitris Gritzalis, Javier López:
Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings. IFIP Advances in Information and Communication Technology 297, Springer 2009, ISBN 978-3-642-01243-3 [contents] - 2008
- [j30]Rodrigo Roman, Javier López, Stefanos Gritzalis:
Situation awareness mechanisms for wireless sensor networks. IEEE Commun. Mag. 46(4): 102-107 (2008) - [j29]Vicente Benjumea, Javier López, José M. Troya:
Anonymity analysis in credentials-based systems: A formal framework. Comput. Stand. Interfaces 30(4): 253-261 (2008) - [j28]Jose Antonio Onieva, Jianying Zhou, Javier López:
Multiparty nonrepudiation: A survey. ACM Comput. Surv. 41(1): 5:1-5:43 (2008) - [j27]Isaac Agudo, Javier López, José A. Montenegro:
Enabling Attribute Delegation in Ubiquitous Environments. Mob. Networks Appl. 13(3-4): 398-410 (2008) - [c59]David Garcia Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini:
PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices. ARES 2008: 136-143 - [c58]David Galindo, Rodrigo Roman, Javier López:
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. CANS 2008: 120-132 - [c57]Vicente Benjumea, Seung Geol Choi, Javier López, Moti Yung:
Fair Traceable Multi-Group Signatures. Financial Cryptography 2008: 231-246 - [c56]David Garcia Rosado, Eduardo Fernández-Medina, Mario Piattini, Javier López:
Engineering Process Based on Grid Use Cases for Mobile Grid Systems. ICSOFT (SE/MUSE/GSDCA) 2008: 146-151 - [c55]Isaac Agudo, M. Carmen Fernández Gago, Javier López:
Delegating Privileges over Finite Resources: A Quota Based Delegation Approach. Formal Aspects in Security and Trust 2008: 302-315 - [c54]Rodrigo Roman, Javier López:
KeyLED - transmitting sensitive data over out-of-band channels in wireless sensor networks. MASS 2008: 796-801 - [c53]Jianying Zhou, Tanmoy Kanti Das, Javier López:
An Asynchronous Node Replication Attack in Wireless Sensor Networks. SEC 2008: 125-139 - [c52]Isaac Agudo, M. Carmen Fernández Gago, Javier López:
A Model for Trust Metrics Analysis. TrustBus 2008: 28-37 - [c51]Isaac Agudo, M. Carmen Fernández Gago, Javier López:
An Evolutionary Trust and Distrust Model. STM@IFIPTM 2008: 3-12 - [e12]Javier López, Bernhard M. Hämmerli:
Critical Information Infrastructures Security, Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papers. Lecture Notes in Computer Science 5141, Springer 2008, ISBN 978-3-540-89095-9 [contents] - [e11]Sushil Jajodia, Javier López:
Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings. Lecture Notes in Computer Science 5283, Springer 2008, ISBN 978-3-540-88312-8 [contents] - [i1]Vicente Benjumea, Seung Geol Choi, Javier López, Moti Yung:
Fair Traceable Multi-Group Signatures. IACR Cryptol. ePrint Arch. 2008: 47 (2008) - 2007
- [j26]Rodrigo Roman, Cristina Alcaraz, Javier López:
The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection. Inf. Secur. Tech. Rep. 12(1): 24-31 (2007) - [j25]Javier López, Isaac Agudo, José A. Montenegro:
On the deployment of a real scalable delegation service. Inf. Secur. Tech. Rep. 12(3): 139-146 (2007) - [j24]Jianying Zhou, Wee-Yung Chin, Rodrigo Roman, Javier López:
An effective multi-layered defense framework against spam. Inf. Secur. Tech. Rep. 12(3): 179-185 (2007) - [j23]Rodrigo Roman, Cristina Alcaraz, Javier López:
A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes. Mob. Networks Appl. 12(4): 231-244 (2007) - [j22]Jose Antonio Onieva, Javier López, Rodrigo Roman, Jianying Zhou, Stefanos Gritzalis:
Integration of non-repudiation services in mobile DRM scenarios. Telecommun. Syst. 35(3-4): 161-176 (2007) - [c50]Rodrigo Roman, M. Carmen Fernández Gago, Javier López:
Featuring trust and reputation management systems for constrained hardware devices. Autonomics 2007: 6 - [c49]Vicente Benjumea, Seung Geol Choi, Javier López, Moti Yung:
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication. CANS 2007: 265-281 - [c48]Javier López, Cristina Alcaraz, Rodrigo Roman:
On the Protection and Technologies of Critical Information Infrastructures. FOSAD 2007: 160-182 - [c47]Mildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier López, Jianying Zhou:
Estimation of TTP Features in Non-repudiation Service. ICCSA (2) 2007: 549-558 - [c46]Isaac Agudo, Javier López, José A. Montenegro:
Attribute delegation in ubiquitous environments. MobiMedia 2007: 43 - [c45]Isaac Agudo, Javier López, José A. Montenegro:
Implementation aspects of a delegation system. MobiMedia 2007: 50 - [c44]M. Carmen Fernández Gago, Rodrigo Roman, Javier López:
A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks. SECPerU 2007: 25-30 - [e10]Joachim Biskup, Javier López:
Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings. Lecture Notes in Computer Science 4734, Springer 2007, ISBN 978-3-540-74834-2 [contents] - [e9]Javier López, Pierangela Samarati, Josep L. Ferrer:
Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings. Lecture Notes in Computer Science 4582, Springer 2007, ISBN 978-3-540-73407-9 [contents] - [e8]Panagiotis Georgiadis, Javier López, Stefanos Gritzalis, Giannis F. Marias:
Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007. IEEE Computer Society 2007, ISBN 0-7695-2863-5 [contents] - 2006
- [j21]Rodrigo Roman, Jianying Zhou, Javier López:
An anti-spam scheme using pre-challenges. Comput. Commun. 29(15): 2739-2749 (2006) - [j20]Jianying Zhou, Javier López:
Preface. Int. J. Inf. Sec. 5(2): 65-66 (2006) - [j19]Vicente Benjumea, Javier López, José M. Troya:
Anonymous attribute certificates based on traceable signatures. Internet Res. 16(2): 120-139 (2006) - [j18]Vicente Benjumea, Javier López, José María Troya Linero:
Specification of a framework for the anonymous use of privileges. Telematics Informatics 23(3): 179-195 (2006) - [c43]Isaac Agudo, Javier López, José A. Montenegro:
Graphical Representation of Authorization Policies for Weighted Credentials. ACISP 2006: 383-394 - [c42]Rodrigo Roman, Jianying Zhou, Javier López:
Applying intrusion detection systems to wireless sensor networks. CCNC 2006: 640-644 - [c41]Isaac Agudo, Javier López, José A. Montenegro:
Attribute Delegation Based on Ontologies and Context Information. Communications and Multimedia Security 2006: 54-66 - [c40]Jianying Zhou, Jose Antonio Onieva, Javier López:
A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. SEC 2006: 221-232 - [c39]Javier López, José A. Montenegro, Rodrigo Roman:
Service-Oriented Security Architecture for CII based on Sensor Networks. SecPerU 2006: 1-6 - [c38]Javier López, Antonio Maña, Antonio Muñoz:
A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios. UIC 2006: 977-987 - [e7]Sokratis K. Katsikas, Javier López, Michael Backes, Stefanos Gritzalis, Bart Preneel:
Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings. Lecture Notes in Computer Science 4176, Springer 2006, ISBN 3-540-38341-7 [contents] - 2005
- [j17]Javier López, José A. Montenegro, José Luis Vivas, Eiji Okamoto, Ed Dawson:
Specification and design of advanced authentication and authorization services. Comput. Stand. Interfaces 27(5): 467-478 (2005) - [j16]Javier López, Juan J. Ortega, José M. Troya:
Security protocols analysis: A SDL-based approach. Comput. Stand. Interfaces 27(5): 489-499 (2005) - [j15]Rodrigo Roman, Javier López, Jianying Zhou:
Casual virtual private network. Comput. Syst. Sci. Eng. 20(3) (2005) - [j14]Sokratis K. Katsikas, Javier López, Günther Pernul:
Editorial. Comput. Syst. Sci. Eng. 20(6) (2005) - [j13]Sokratis K. Katsikas, Javier López, Günther Pernul:
Trust, privacy and security in digital business. Comput. Syst. Sci. Eng. 20(6) (2005) - [j12]Jianying Zhou, Jose Antonio Onieva, Javier López:
Optimized multi-party certified email protocols. Inf. Manag. Comput. Security 13(5): 350-366 (2005) - [j11]Mariemma Inmaculada Yagüe del Valle, Antonio Maña, Javier López:
A metadata-based access control model for web services. Internet Res. 15(1): 99-116 (2005) - [j10]Javier López, Rolf Oppliger, Günther Pernul:
Why have public key infrastructures failed so far? Internet Res. 15(5): 544-556 (2005) - [c37]Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier López:
A Novel Method to Maintain Privacy in Mobile Agent Applications. CANS 2005: 247-260 - [c36]Antonio Muñoz, Jose Antonio Onieva, Javier López:
On Secure Profiling. DEXA Workshops 2005: 214-218 - [c35]Javier López, Rolf Oppliger, Günther Pernul:
Classifying Public Key Certificates. EuroPKI 2005: 135-143 - [c34]Rodrigo Roman, Jianying Zhou, Javier López:
On the Security of Wireless Sensor Networks. ICCSA (3) 2005: 681-690 - [c33]Jose Antonio Onieva, Jianying Zhou, Javier López:
Attacking an Asynchronous Multi-party Contract Signing Protocol. INDOCRYPT 2005: 311-321 - [c32]Isaac Agudo, Javier López, José A. Montenegro:
A Representation Model of Trust Relationships with Delegation Extensions. iTrust 2005: 116-130 - [c31]Sokratis K. Katsikas, Javier López, Günther Pernul:
Trust, Privacy and Security in E-Business: Requirements and Solutions. Panhellenic Conference on Informatics 2005: 548-558 - [c30]Rodrigo Roman, Jianying Zhou, Javier López:
Protection Against Spam Using Pre-Challenges. SEC 2005: 281-294 - [e6]Sihan Qing, Wenbo Mao, Javier López, Guilin Wang:
Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings. Lecture Notes in Computer Science 3783, Springer 2005, ISBN 3-540-30934-9 [contents] - [e5]Jianying Zhou, Javier López, Robert H. Deng, Feng Bao:
Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings. Lecture Notes in Computer Science 3650, Springer 2005, ISBN 3-540-29001-X [contents] - [e4]Sokratis K. Katsikas, Javier López, Günther Pernul:
Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings. Lecture Notes in Computer Science 3592, Springer 2005, ISBN 3-540-28224-6 [contents] - 2004
- [j9]Jose Antonio Onieva, Jianying Zhou, Javier López:
Non-repudiation protocols for multiple entities. Comput. Commun. 27(16): 1608-1616 (2004) - [j8]Javier López, Rolf Oppliger, Günther Pernul:
Authentication and authorization infrastructures (AAIs): a comparative survey. Comput. Secur. 23(7): 578-590 (2004) - [j7]Jose Antonio Onieva, Jianying Zhou, Javier López, Mildrey Carbonell:
Agent-mediated non-repudiation protocols. Electron. Commer. Res. Appl. 3(2): 152-162 (2004) - [j6]Javier López, Antonio Mana, José A. Montenegro, Juan J. Ortega:
PKI design based on the use of on-line certification authorities. Int. J. Inf. Sec. 2(2): 91-102 (2004) - [j5]Antonio Mana, Javier López, Juan J. Ortega, Ernesto Pimentel, José M. Troya:
A framework for secure execution of software. Int. J. Inf. Sec. 3(2): 99-112 (2004) - [c29]Javier López, Niko Myller, Erkki Sutinen:
Sorting out sorting through concretization with robotics. AVI 2004: 377-380 - [c28]Isaac Agudo, Javier López:
Specification and formal verification of security requirements. CompSysTech 2004: 1-6 - [c27]Mildrey Carbonell, Jose Antonio Onieva, Javier López, Deborah Galpert, Jianying Zhou:
Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. ICCSA (1) 2004: 903-914 - [c26]Vicente Benjumea, Javier López, José A. Montenegro, José M. Troya:
A First Approach to Provide Anonymity in Attribute Certificates. Public Key Cryptography 2004: 402-415 - [c25]Jianying Zhou, Jose Antonio Onieva, Javier López:
Analysis of a Free Roaming Agent Result-Truncation Defense Scheme. CEC 2004: 221-226 - [e3]Sokratis K. Katsikas, Stefanos Gritzalis, Javier López:
Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Lecture Notes in Computer Science 3093, Springer 2004, ISBN 3-540-22216-2 [contents] - [e2]Javier López, Sihan Qing, Eiji Okamoto:
Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings. Lecture Notes in Computer Science 3269, Springer 2004, ISBN 3-540-23563-9 [contents] - [e1]Sokratis K. Katsikas, Javier López, Günther Pernul:
Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings. Lecture Notes in Computer Science 3184, Springer 2004, ISBN 3-540-22919-1 [contents] - 2003
- [j4]Selwyn Russell, Ed Dawson, Eiji Okamoto, Javier López:
Virtual certificates and synthetic certificates: new paradigms for improving public key validation. Comput. Commun. 26(16): 1826-1838 (2003) - [j3]Javier López, Antonio Maña, Juan J. Ortega, José M. Troya, Mariemma Inmaculada Yagüe del Valle:
Integrating PMI services in CORBA applications. Comput. Stand. Interfaces 25(4): 391-409 (2003) - [j2]Sigrid Gürgens, Javier López, René Peralta:
Analysis of e-commerce protocols: Adapting a traditional technique. Int. J. Inf. Sec. 2(1): 21-36 (2003) - [j1]Mariemma Inmaculada Yagüe del Valle, Antonio Maña, Javier López, Ernesto Pimentel, José M. Troya:
A secure solution for commercial digital libraries. Online Inf. Rev. 27(3): 147-159 (2003) - [c24]Javier López, Juan J. Ortega, José Luis Vivas, José M. Troya:
How to Specify Security Services: A Practical Approach. Communications and Multimedia Security 2003: 158-171 - [c23]Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Javier López, José M. Troya:
Applying the Semantic Web Layers to Access Control. DEXA Workshops 2003: 622-626 - [c22]Javier López, Juan J. Ortega, José M. Troya, José Luis Vivas:
High-level specification of security systems. GLOBECOM 2003: 1506-1510 - [c21]Jose Antonio Onieva, Jianying Zhou, Javier López:
Practical Service Charge for P2P Content Distribution. ICICS 2003: 112-123 - [c20]José Luis Vivas, José A. Montenegro, Javier López:
Towards a Business Process-Driven Framework for Security Engineering with the UML. ISC 2003: 381-395 - [c19]Javier López, Juan J. Ortega, José M. Troya:
Applying SDL to Formal Analysis of Security Systems. SDL Forum 2003: 300-316 - [c18]Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier López:
A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. SEC 2003: 37-48 - [c17]Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier López:
Intermediary Non-repudiation Protocols. CEC 2003: 207-214 - 2002
- [c16]Javier López, Günther Pernul:
Message from the TrustBus Workshop Chairs. DEXA Workshops 2002: 409-412 - [c15]Javier López, Antonio Mana, Mariemma Inmaculada Yagüe del Valle:
XML-Based Distributed Access Control System. EC-Web 2002: 203-213 - [c14]Javier López, Antonio Mana, José A. Montenegro, Juan J. Ortega, José M. Troya:
Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations. EGOV 2002: 211-214 - [c13]Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Javier López, Ernesto Pimentel, José M. Troya:
Secure Content Distribution for Digital Libraries. ICADL 2002: 483-494 - [c12]Javier López, Antonio Mana, Ernesto Pimentel, José M. Troya, Mariemma Inmaculada Yagüe del Valle:
Access Control Infrastructure for Digital Objects. ICICS 2002: 399-410 - [c11]Javier López, Juan J. Ortega, José M. Troya:
Protocol Engineering Applied to Formal Analysis of Security Systems. InfraSec 2002: 246-259 - [c10]Javier López, José A. Montenegro, Rodrigo Roman, Jorge Dávila:
Design of a VPN Software Solution Integrating TCP and UDP Services. InfraSec 2002: 325-338 - [c9]Ed Dawson, Javier López, José A. Montenegro, Eiji Okamoto:
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. ISC 2002: 136-149 - [c8]Javier López, Juan J. Ortega, José M. Troya:
Verification of Authentication Protocols using SDL-method. SIS 2002: 61-71 - 2001
- [c7]Sigrid Gürgens, Javier López:
Suitability of a Classical Analysis Method for E-commerce Protocols. ISC 2001: 46-62 - 2000
- [c6]Javier López, Antonio Mana, Juan J. Ortega, José M. Troya:
Distributed Storage and Revocation in Digital Certificate Databases. DEXA 2000: 929-938 - [c5]Jorge Dávila, Javier López, Antonio Mana, Juan J. Ortega, José M. Troya:
Development of Secure Internet Applications for Governmental Environments. DEXA Workshop 2000: 362-368
1990 – 1999
- 1999
- [c4]Javier López, Antonio Mana, Juan J. Ortega:
Cert'eM: Certification System Based on Electronic Mail Service Structure. CQRE 1999: 109-118 - [c3]Sigrid Gürgens, Javier López, René Peralta:
Efficient Detection of Failure Modes in Electronic Commerce Protocols. DEXA Workshop 1999: 850-857 - [c2]Jorge Dávila, Javier López, René Peralta:
Implementation of Virtual Private Networks at the Transport Layer. ISW 1999: 85-102 - 1998
- [c1]Antonio Maña Gómez, F. Villalba-Sánchez, Javier López:
Secure Examinations through the Internet. Teleteaching 1998: 695-704
Coauthor Index
aka: Juan Enrique Rubio
aka: José María Troya Linero
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint