Jose Maria de Fuentes
Jose Maria de Fuentes
Associate Professor, Universidad Carlos III de Madrid (Spain)
Bestätigte E-Mail-Adresse bei inf.uc3m.es - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Overview of security issues in vehicular ad-hoc networks
JM De Fuentes, AI González-Tablas, A Ribagorda
Handbook of research on mobility and computing: Evolving technologies and …, 2011
1652011
Appcaulk: Data leak prevention by injecting targeted taint tracking into android apps
J Schütte, D Titze, JM De Fuentes
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
312014
PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing
JM de Fuentes, L González-Manzano, J Tapiador, P Peris-Lopez
computers & security 69, 127-141, 2017
272017
Security models in vehicular ad-hoc networks: A survey
JM De Fuentes, L González-Manzano, AI González-Tablas, J Blasco
IETE Technical Review 31 (1), 47-64, 2014
262014
Hindering false event dissemination in VANETs with proof-of-work mechanisms
E Palomar, JM de Fuentes, AI González-Tablas, A Alcaide
Transportation Research Part C: Emerging Technologies 23, 85-97, 2012
262012
PAgIoT–Privacy-preserving aggregation protocol for Internet of Things
L González-Manzano, JM de Fuentes, S Pastrana, P Peris-Lopez, ...
Journal of Network and Computer Applications 71, 59-71, 2016
202016
A taxonomy and survey of attacks on digital signatures
JL Hernandez-Ardieta, AI Gonzalez-Tablas, JM De Fuentes, B Ramos
Computers & security 34, 67-112, 2013
202013
A framework for avoiding steganography usage over HTTP
J Blasco, JC Hernandez-Castro, JM de Fuentes, B Ramos
Journal of Network and Computer Applications 35 (1), 491-501, 2012
192012
Automatic rule generation based on genetic programming for event correlation
G Suarez-Tangil, E Palomar, JM de Fuentes, J Blasco, A Ribagorda
Computational Intelligence in Security for Information Systems, 127-134, 2009
182009
Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things
P Peris-Lopez, L González-Manzano, C Camara, JM de Fuentes
Future Generation Computer Systems 81, 67-77, 2018
152018
Probabilistic yoking proofs for large scale IoT systems
JM de Fuentes, P Peris-Lopez, JE Tapiador, S Pastrana
Ad Hoc Networks 32, 43-52, 2015
142015
Cooped: Co-owned personal data management
L González-Manzano, AI González-Tablas, JM de Fuentes, A Ribagorda
Computers & Security 47, 41-65, 2014
142014
AndrODet: An adaptive Android obfuscation detector
O Mirzaei, JM de Fuentes, J Tapiador, L Gonzalez-Manzano
Future Generation Computer Systems 90, 240-261, 2019
132019
Triflow: Triaging android applications using speculative information flows
O Mirzaei, G Suarez-Tangil, J Tapiador, JM de Fuentes
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
132017
Applying information hiding in VANETs to covertly report misbehaving vehicles
JM de Fuentes, J Blasco, AI González-Tablas, L González-Manzano
International Journal of Distributed Sensor Networks 10 (2), 120626, 2014
132014
Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations
AI González-Tablas, A Alcaide, JM de Fuentes, J Montero
Ad hoc networks 11 (8), 2693-2709, 2013
132013
Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities
JM de Fuentes, L González-Manzano, J Serna-Olvera, F Veseli
Personal and Ubiquitous Computing 21 (5), 869-891, 2017
112017
WEVAN–A mechanism for evidence creation and verification in VANETs
JM de Fuentes, L González-Manzano, AI González-Tablas, J Blasco
Journal of Systems Architecture 59 (10), 985-995, 2013
112013
Encryption by Heart (EbH)—Using ECG for time-invariant symmetric key generation
L González-Manzano, JM de Fuentes, P Peris-Lopez, C Camara
Future Generation Computer Systems 77, 136-148, 2017
102017
Attribute-based credentials for privacy-aware smart health services in iot-based smart cities
JM de Fuentes, L Gonzalez-Manzano, A Solanas, F Veseli
Computer 51 (7), 44-53, 2018
82018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20