Follow
Miguel Soriano
Miguel Soriano
Verified email at upc.edu - Homepage
Title
Cited by
Cited by
Year
Securing cognitive radio networks
O Leon, J Hernandez-Serrano, M Soriano
International Journal of Communication Systems 23 (5), 633-652, 2010
1982010
Security and privacy in your smart city
A Bartoli, J Hernández-Serrano, M Soriano, M Dohler, A Kountouris, ...
Proceedings of the Barcelona smart cities congress 292, 1-6, 2011
1532011
Secure lossless aggregation for smart grid M2M networks
A Bartoli, J Hernández-Serrano, M Soriano, M Dohler, A Kountouris, ...
2010 first IEEE international conference on smart grid communications, 333-338, 2010
1022010
A security and usability proposal for mobile electronic commerce
M Soriano, D Ponce
Communications Magazine, IEEE 40 (8), 62-67, 2002
722002
Secure lossless aggregation over fading and shadowing channels for smart grid m2m networks
A Bartoli, J Hernández-Serrano, M Soriano, M Dohler, A Kountouris, ...
IEEE Transactions on Smart Grid 2 (4), 844-864, 2011
582011
A new cross-layer attack to TCP in cognitive radio networks
O Leon, J Hernandez-Serrano, M Soriano
2009 Second International Workshop on Cross Layer Design, 1-5, 2009
552009
Modeling the lion attack in cognitive radio networks
J Hernandez-Serrano, O León, M Soriano
EURASIP Journal on Wireless Communications and Networking 2011, 1-10, 2011
542011
Seguridad en redes y seguridad de la información
M Soriano
Obtenido de http://improvet. cvut. cz/project/download/C2ES …, 2014
532014
Providing k-anonymity and revocation in ubiquitous VANETs
C Caballero-Gil, J Molina-Gil, J Hernández-Serrano, O León, ...
Ad Hoc Networks 36, 482-494, 2016
482016
Certificate revocation system implementation based on the Merkle hash tree
JL Munoz, J Forne, O Esparza, M Soriano
International Journal of Information Security 2, 110-124, 2004
442004
Cooperative detection of primary user emulation attacks in CRNs
O León, J Hernández-Serrano, M Soriano
Computer networks 56 (14), 3374-3384, 2012
432012
Mobile agent watermarking and fingerprinting: tracing malicious hosts
O Esparza, M Fernandez, M Soriano, JL Munoz, J Forné
International Conference on Database and Expert Systems Applications, 927-936, 2003
402003
Host revocation authority: A way of protecting mobile agents from malicious hosts
O Esparza, M Soriano, JL Munoz, J Forné
International Conference on Web Engineering, 289-292, 2003
382003
An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers
D Rebollo-Monedero, J Forné, M Soriano
Data & Knowledge Engineering 70 (10), 892-921, 2011
362011
Secure brokerage mechanisms for mobile electronic commerce
O Esparza, JL Muñoz, M Soriano, J Forné
Computer Communications 29 (12), 2308-2321, 2006
332006
DocCloud: A document recommender system on cloud computing with plausible deniability
J Vera-del-Campo, J Pegueroles, J Hernández-Serrano, M Soriano
Information Sciences 258, 387-402, 2014
322014
Fingerprinting concatenated codes with efficient identification
M Fernández, M Soriano
International Conference on Information Security, 459-470, 2002
312002
Reconciling privacy and efficient utility management in smart cities
D Rebollo‐Monedero, A Bartoli, J Hernández‐Serrano, J Forné, ...
Transactions on Emerging Telecommunications Technologies 25 (1), 94-108, 2014
302014
A protocol for detecting malicious hosts based on limiting the execution time of mobile agents
O Esparza, M Soriano, JL Muñoz, J Forné
Proceedings of the Eighth IEEE Symposium on Computers and Communications …, 2003
302003
Identification of traitors in algebraic-geometric traceability codes
M Fernandez, M Soriano
IEEE Transactions on Signal Processing 52 (10), 3073-3077, 2004
292004
The system can't perform the operation now. Try again later.
Articles 1–20