The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Joaquín García-Alfaro: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia
    Analysis of Policy Anomalies on Distributed Network Security Setups. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:496-511 [Conf]
  2. Joaquín García-Alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro, Joan Borrell
    SMARTCOP - A Smart Card Based Access Control for the Protection of Network Security Components. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:415-424 [Conf]
  3. Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia
    Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2006, pp:182-194 [Conf]
  4. Joaquín García-Alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro, Joan Borrell
    Protection of Components Based on a Smart-Card Enhanced Security Module. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:128-139 [Conf]
  5. Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas
    Prevention of Cross-Site Scripting Attacks on Current Web Applications. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1770-1784 [Conf]

  6. Aggregating and Deploying Network Access Control Policies. [Citation Graph (, )][DBLP]


  7. Semantic context aware security policy deployment. [Citation Graph (, )][DBLP]


  8. Analysis of Threats to the Security of EPC Networks. [Citation Graph (, )][DBLP]


  9. Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks. [Citation Graph (, )][DBLP]


  10. Distributed Exchange of Alerts for the Detection of Coordinated Attacks. [Citation Graph (, )][DBLP]


  11. Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers. [Citation Graph (, )][DBLP]


  12. Security Threat Mitigation Trends in Low-Cost RFID Systems. [Citation Graph (, )][DBLP]


  13. Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags. [Citation Graph (, )][DBLP]


  14. Security Threats on EPC Based RFID Systems. [Citation Graph (, )][DBLP]


  15. Evaluation of Two Privacy-Preserving Protocols for the DNS. [Citation Graph (, )][DBLP]


  16. Anonymous Resolution of DNS Queries. [Citation Graph (, )][DBLP]


  17. Management of Exceptions on Access Control Policies. [Citation Graph (, )][DBLP]


  18. A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor. [Citation Graph (, )][DBLP]


  19. Reliable Process for Security Policy Deployment. [Citation Graph (, )][DBLP]


  20. A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications. [Citation Graph (, )][DBLP]


  21. Model-Driven Security Policy Deployment: Property Oriented Approach. [Citation Graph (, )][DBLP]


  22. Preventing Coordinated Attacks Via Distributed Alert Exchange [Citation Graph (, )][DBLP]


  23. Aggregating and Deploying Network Access Control Policies [Citation Graph (, )][DBLP]


  24. Reliable Process for Security Policy Deployment [Citation Graph (, )][DBLP]


  25. A Survey on Cross-Site Scripting Attacks [Citation Graph (, )][DBLP]


  26. Evaluation of Anonymized ONS Queries [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002