The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Rodrigo Roman: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Rodrigo Roman, Jianying Zhou, Javier Lopez
    On the Security of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2005, pp:681-690 [Conf]
  2. Javier Lopez, José A. Montenegro, Rodrigo Roman, Jorge Davila
    Design of a VPN Software Solution Integrating TCP and UDP Services. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:325-338 [Conf]
  3. Rodrigo Roman, Jianying Zhou, Javier Lopez
    Protection Against Spam Using Pre-Challenges. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:281-294 [Conf]
  4. Javier Lopez, José A. Montenegro, Rodrigo Roman
    Service-Oriented Security Architecture for CII based on Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SecPerU, 2006, pp:1-6 [Conf]
  5. Cristina Alcaraz, Rodrigo Roman
    Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:166-178 [Conf]
  6. Rodrigo Roman, Jianying Zhou, Javier Lopez
    An anti-spam scheme using pre-challenges. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2739-2749 [Journal]
  7. Rodrigo Roman, Javier Lopez, Jianying Zhou
    Casual virtual private network. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2005, v:20, n:3, pp:- [Journal]
  8. Rodrigo Roman, Cristina Alcaraz
    Applicability of Public Key Infrastructures in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:313-320 [Conf]
  9. Javier Lopez, Cristina Alcaraz, Rodrigo Roman
    On the Protection and Technologies of Critical Information Infrastructures. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:160-182 [Conf]

  10. A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  11. Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  12. Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems. [Citation Graph (, )][DBLP]


  13. Featuring trust and reputation management systems for constrained hardware devices. [Citation Graph (, )][DBLP]


  14. Trust management systems for wireless sensor networks: Best practices. [Citation Graph (, )][DBLP]


Search in 0.748secs, Finished in 0.748secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002