Search the dblp DataBase
Miguel Soriano :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Juan Vera del Campo , Josep Pegueroles , Miguel Soriano Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:148-155 [Conf ] Jose L. Muñoz , Jordi Forné , Oscar Esparza , Miguel Soriano Using OCSP to Secure Certificate-Using Transactions in M-commerce. [Citation Graph (0, 0)][DBLP ] ACNS, 2003, pp:280-292 [Conf ] Miguel Soriano , Jordi Forné , Francisco Recacha , José L. Melús A Particular Solution to Provide Secure Communications in an Ethernet Environment. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:17-25 [Conf ] Oscar Esparza , Marcel Fernandez , Miguel Soriano , Jose L. Muñoz , Jordi Forné Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts. [Citation Graph (0, 0)][DBLP ] DEXA, 2003, pp:927-936 [Conf ] Marcel Fernandez , Miguel Soriano Efficient Identification of Traitors in Fingerprinted Multimedia Contents. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2002, pp:463-467 [Conf ] Antoni Martínez-Ballesté , Francesc Sebé , Josep Domingo-Ferrer , Miguel Soriano Practical Asymmetric Fingerprinting with a TTP. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2003, pp:352-356 [Conf ] Jose L. Muñoz , Jordi Forné , Oscar Esparza , Miguel Soriano , David Jodra Evaluation of Revocation Systems with a JAVA Test-bed. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2003, pp:450-454 [Conf ] Miguel Soriano , Stephan Flake , Jürgen Tacken , Frank Bormann , Joan Tomas Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2005, pp:251-256 [Conf ] Marcel Fernandez , Miguel Soriano Protecting Intellectual Property by Guessing Secrets. [Citation Graph (0, 0)][DBLP ] EC-Web, 2003, pp:196-205 [Conf ] Jose L. Muñoz , Jordi Forné , Oscar Esparza , Miguel Soriano CERVANTES - A Certificate Validation Test-Bed. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2004, pp:28-42 [Conf ] Josep Pegueroles , Wang Bin , Miguel Soriano , Francisco Rico-Novella Group Rekeying Algorithm Using Pseudo-random Functions and Modular Reduction. [Citation Graph (0, 0)][DBLP ] GCC (1), 2003, pp:875-882 [Conf ] Jose L. Muñoz , Josep Pegueroles , Jordi Forné , Oscar Esparza , Miguel Soriano Security Issues in Virtual Grid Environments. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science, 2004, pp:174-178 [Conf ] Marcel Fernandez , Miguel Soriano , Josep Cotrina Navau Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:527-536 [Conf ] Marcel Fernandez , Miguel Soriano , Josep Cotrina Navau Practical Scenarios for the Van Trung-Martirosyan Codes. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:624-633 [Conf ] Josep Pegueroles , Marcel Fernandez , Francisco Rico-Novella , Miguel Soriano A Practical Solution for Distribution Rights Protection in Multicast Environments. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:527-536 [Conf ] Oscar Esparza , Miguel Soriano , Jose L. Muñoz , Jordi Forné Protocols for Malicious Host Revocation. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:191-201 [Conf ] Marcel Fernandez , Miguel Soriano Identification of Traitors Using a Trellis. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:211-222 [Conf ] Oscar Esparza , Miguel Soriano , Jose L. Muñoz , Jordi Forné Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts. [Citation Graph (0, 0)][DBLP ] ICWE, 2003, pp:289-292 [Conf ] Josep Cotrina Navau , Marcel Fernandez , Miguel Soriano A Family of Collusion 2-Secure Codes. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2005, pp:387-397 [Conf ] Marcel Fernandez , Miguel Soriano Identification Algorithms for Sequential Traitor Tracing. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:414-430 [Conf ] Marcel Fernandez , Miguel Soriano Decoding codes with the identifiable parent property. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:1028-1033 [Conf ] Oscar Esparza , Miguel Soriano , Jose L. Muñoz , Jordi Forné A protocol for detecting malicious hosts based on limiting the execution time of mobile agents. [Citation Graph (0, 0)][DBLP ] ISCC, 2003, pp:251-256 [Conf ] Jose L. Muñoz , Jordi Forné , Oscar Esparza , Miguel Soriano Implementation of an Efficient Authenticated Dictionary for Certificate Revocation. [Citation Graph (0, 0)][DBLP ] ISCC, 2003, pp:238-243 [Conf ] Marcel Fernandez , Miguel Soriano , Josep Cotrina Navau Tracing Traitors by Guessing Secrets. The q -Ary Case. [Citation Graph (0, 0)][DBLP ] ISPEC, 2005, pp:61-73 [Conf ] Marcel Fernandez , Miguel Soriano , Josep Cotrina Navau A New Class of Codes for Fingerprinting Schemes. [Citation Graph (0, 0)][DBLP ] ISPEC, 2005, pp:398-409 [Conf ] Marcel Fernandez , Miguel Soriano Fingerprinting Concatenated Codes with Efficient Identification. [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:459-470 [Conf ] Marcel Fernandez , Miguel Soriano Efficient Recovery of Secrets. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:763-767 [Conf ] Miguel Soriano , Marcel Fernandez , Elisa Sayrol , Joan Tomas , Joan Casanellas , Josep Pegueroles , Juan Hernández-Serrano Multimedia Copyright Protection Platform Demonstrator. [Citation Graph (0, 0)][DBLP ] iTrust, 2005, pp:411-414 [Conf ] Miguel Soriano , Marcel Fernandez , Josep Cotrina Navau Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:231-243 [Conf ] Oscar Esparza , Miguel Soriano , Jose L. Muñoz , Jordi Forné Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts. [Citation Graph (0, 0)][DBLP ] MATA, 2003, pp:286-295 [Conf ] Oscar Esparza , Miguel Soriano , Jose L. Muñoz , Jordi Forné Detecting and Proving Manipulation Attacks in Mobile Agent Systems. [Citation Graph (0, 0)][DBLP ] MATA, 2004, pp:224-233 [Conf ] Jose L. Muñoz , Jordi Forné , Oscar Esparza , Miguel Soriano Efficient Offline Certificate Revocation. [Citation Graph (0, 0)][DBLP ] MIPS, 2003, pp:319-330 [Conf ] Jose L. Muñoz , Jordi Forné , Oscar Esparza , Miguel Soriano A Certificate Status Checking Protocol for the Authenticated Dictionary. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:255-266 [Conf ] Luis Zarza , Josep Pegueroles , Miguel Soriano , Rafael Martínez Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:316-319 [Conf ] Juan Hernández-Serrano , Josep Pegueroles , Miguel Soriano Energy Efficiency of Load Balancing in MANET Routing Protocols. [Citation Graph (0, 0)][DBLP ] SNPD, 2005, pp:476-483 [Conf ] Elisa Sayrol , Miguel Soriano , Marcel Fernandez , Joan Casanellas , Joan Tomas Development of a platform offering video copyright protection and security against illegal distribution. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:76-83 [Conf ] Jose L. Muñoz , Jordi Forné , Oscar Esparza , Miguel Soriano E-MHT. An Efficient Protocol for Certificate Status Checking. [Citation Graph (0, 0)][DBLP ] WISA, 2003, pp:410-424 [Conf ] Oscar Esparza , Jose L. Muñoz , Miguel Soriano , Jordi Forné Secure brokerage mechanisms for mobile electronic commerce. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:12, pp:2308-2321 [Journal ] Marcel Fernandez , Miguel Soriano Soft-Decision Tracing in Fingerprinted Multimedia Content. [Citation Graph (0, 0)][DBLP ] IEEE MultiMedia, 2004, v:11, n:2, pp:38-46 [Journal ] Jose L. Muñoz , Jordi Forné , Oscar Esparza , Miguel Soriano Certificate revocation system implementation based on the Merkle hash tree. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:2, n:2, pp:110-124 [Journal ] Francisco Recacha , José L. Melús , X. Simón , Miguel Soriano , Jordi Forné Secure Data Transmission in Extended Ethernet Environments. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:794-803 [Journal ] Luis Zarza , Josep Pegueroles , Miguel Soriano Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2007, pp:708-712 [Conf ] Juan Hernández-Serrano , Josep Pegueroles , Miguel Soriano Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2007, pp:526-539 [Conf ] Marcel Fernandez , Josep Cotrina Navau , Miguel Soriano , Neus Domingo A Note About the Traceability Properties of Linear Codes. [Citation Graph (0, 0)][DBLP ] ICISC, 2007, pp:251-258 [Conf ] Joan Tomàs-Buliart , Marcel Fernandez , Miguel Soriano Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems. [Citation Graph (0, 0)][DBLP ] KES (3), 2007, pp:992-999 [Conf ] Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms. [Citation Graph (, )][DBLP ] New Considerations about the Correct Design of Turbo Fingerprinting Codes. [Citation Graph (, )][DBLP ] On the IPP Properties of Reed-Solomon Codes. [Citation Graph (, )][DBLP ] MAIS: Mobile Agent Integrity System - A Security System to IDS based on Autonomous Agents. [Citation Graph (, )][DBLP ] Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel. [Citation Graph (, )][DBLP ] Securing Agents against Malicious Host in an Intrusion Detection System. [Citation Graph (, )][DBLP ] Secure Remote Voter Registration. [Citation Graph (, )][DBLP ] New voter verification scheme using pre-encrypted ballots. [Citation Graph (, )][DBLP ] A note about the identifier parent property in Reed-Solomon codes. [Citation Graph (, )][DBLP ] Search in 0.029secs, Finished in 0.032secs