Rolando Trujillo Rasúa
Rolando Trujillo Rasúa
Ramon i Cajal Researcher
Verified email at - Homepage
Cited by
Cited by
Microaggregation-and permutation-based anonymization of movement data
J Domingo-Ferrer, R Trujillo-Rasua
Information Sciences 208, 55-80, 2012
Attack trees with sequential conjunction
R Jhawar, B Kordy, S Mauw, S Radomirović, R Trujillo-Rasua
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015
Applications of distributed ledger technologies to the internet of things: A survey
Q Zhu, SW Loke, R Trujillo-Rasua, F Jiang, Y Xiang
ACM computing surveys (CSUR) 52 (6), 1-34, 2019
The Poulidor Distance-Bounding Protocol.
R Trujillo-Rasua, B Martin, G Avoine
RFIDSec 10, 239-257, 2010
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study
M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua
The Practice of Enterprise Modeling: 9th IFIP WG 8.1. Working Conference …, 2016
Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0
O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua
Quantitative Evaluation of Systems: 13th International Conference, QEST 2016 …, 2016
Distance-bounding protocols: Verification without time and location
S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua
2018 IEEE Symposium on Security and Privacy (SP), 549-566, 2018
On the privacy offered by (k, δ)-anonymity
R Trujillo-Rasua, J Domingo-Ferrer
Information Systems 38 (4), 491-494, 2013
k-metric antidimension: A privacy measure for social graphs
R Trujillo-Rasua, IG Yero
Information Sciences 328, 403-417, 2016
Privacy-preserving publication of trajectories using microaggregation
J Domingo-Ferrer, M Sramka, R Trujillo-Rasúa
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and …, 2010
A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation.
A Fernandez-Mir, R Trujillo-Rasua, J Castella-Roca, J Domingo-Ferrer
RFIDSec 7055, 147-162, 2011
Secure attribute-based search in RFID-based inventory control systems
R Doss, R Trujillo-Rasua, S Piramuthu
Decision Support Systems 132, 113270, 2020
Distance bounding facing both mafia and distance frauds
R Trujillo-Rasua, B Martin, G Avoine
IEEE Transactions on Wireless Communications 13 (10), 5690-5698, 2014
Attribute Evaluation on Attack Trees with Incomplete Information
A Buldas, O Gadyatskaya, A Lenin, S Mauw, R Trujillo-Rasua
Computers & Security, 101630, 2019
Refinement-aware generation of attack trees
O Gadyatskaya, R Jhawar, S Mauw, R Trujillo-Rasua, TAC Willemse
Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017
Hybrid routing for Man-in-the-Middle (MITM) attack detection in IoT networks
JJ Kang, K Fahd, S Venkatraman, R Trujillo-Rasua, P Haskell-Dowland
2019 29th International Telecommunication Networks and Applications …, 2019
Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers
R Trujillo-Rasua, A Solanas
Computer Networks 55 (15), 3211-3223, 2011
Predictive protocol for the scalable identification of RFID tags through collaborative readers
R Trujillo-Rasua, A Solanas, PA Pérez-Martínez, J Domingo-Ferrer
Computers in Industry 63 (6), 557-573, 2012
Traceability in supply chains: A Cyber security analysis
NF Syed, SW Shah, R Trujillo-Rasua, R Doss
Computers & Security 112, 102536, 2022
The system can't perform the operation now. Try again later.
Articles 1–20