|
Search the dblp DataBase
Rodrigo Roman:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Rodrigo Roman, Jianying Zhou, Javier Lopez
On the Security of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2005, pp:681-690 [Conf]
- Javier Lopez, José A. Montenegro, Rodrigo Roman, Jorge Davila
Design of a VPN Software Solution Integrating TCP and UDP Services. [Citation Graph (0, 0)][DBLP] InfraSec, 2002, pp:325-338 [Conf]
- Rodrigo Roman, Jianying Zhou, Javier Lopez
Protection Against Spam Using Pre-Challenges. [Citation Graph (0, 0)][DBLP] SEC, 2005, pp:281-294 [Conf]
- Javier Lopez, José A. Montenegro, Rodrigo Roman
Service-Oriented Security Architecture for CII based on Sensor Networks. [Citation Graph (0, 0)][DBLP] SecPerU, 2006, pp:1-6 [Conf]
- Cristina Alcaraz, Rodrigo Roman
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios. [Citation Graph (0, 0)][DBLP] CRITIS, 2006, pp:166-178 [Conf]
- Rodrigo Roman, Jianying Zhou, Javier Lopez
An anti-spam scheme using pre-challenges. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:15, pp:2739-2749 [Journal]
- Rodrigo Roman, Javier Lopez, Jianying Zhou
Casual virtual private network. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2005, v:20, n:3, pp:- [Journal]
- Rodrigo Roman, Cristina Alcaraz
Applicability of Public Key Infrastructures in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] EuroPKI, 2007, pp:313-320 [Conf]
- Javier Lopez, Cristina Alcaraz, Rodrigo Roman
On the Protection and Technologies of Critical Information Infrastructures. [Citation Graph (0, 0)][DBLP] FOSAD, 2007, pp:160-182 [Conf]
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems. [Citation Graph (, )][DBLP]
Featuring trust and reputation management systems for constrained hardware devices. [Citation Graph (, )][DBLP]
Trust management systems for wireless sensor networks: Best practices. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|