The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Miguel Soriano: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Juan Vera del Campo, Josep Pegueroles, Miguel Soriano
    Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:148-155 [Conf]
  2. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
    Using OCSP to Secure Certificate-Using Transactions in M-commerce. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:280-292 [Conf]
  3. Miguel Soriano, Jordi Forné, Francisco Recacha, José L. Melús
    A Particular Solution to Provide Secure Communications in an Ethernet Environment. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:17-25 [Conf]
  4. Oscar Esparza, Marcel Fernandez, Miguel Soriano, Jose L. Muñoz, Jordi Forné
    Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts. [Citation Graph (0, 0)][DBLP]
    DEXA, 2003, pp:927-936 [Conf]
  5. Marcel Fernandez, Miguel Soriano
    Efficient Identification of Traitors in Fingerprinted Multimedia Contents. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:463-467 [Conf]
  6. Antoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer, Miguel Soriano
    Practical Asymmetric Fingerprinting with a TTP. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:352-356 [Conf]
  7. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano, David Jodra
    Evaluation of Revocation Systems with a JAVA Test-bed. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:450-454 [Conf]
  8. Miguel Soriano, Stephan Flake, Jürgen Tacken, Frank Bormann, Joan Tomas
    Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2005, pp:251-256 [Conf]
  9. Marcel Fernandez, Miguel Soriano
    Protecting Intellectual Property by Guessing Secrets. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2003, pp:196-205 [Conf]
  10. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
    CERVANTES - A Certificate Validation Test-Bed. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:28-42 [Conf]
  11. Josep Pegueroles, Wang Bin, Miguel Soriano, Francisco Rico-Novella
    Group Rekeying Algorithm Using Pseudo-random Functions and Modular Reduction. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:875-882 [Conf]
  12. Jose L. Muñoz, Josep Pegueroles, Jordi Forné, Oscar Esparza, Miguel Soriano
    Security Issues in Virtual Grid Environments. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:174-178 [Conf]
  13. Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau
    Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:527-536 [Conf]
  14. Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau
    Practical Scenarios for the Van Trung-Martirosyan Codes. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:624-633 [Conf]
  15. Josep Pegueroles, Marcel Fernandez, Francisco Rico-Novella, Miguel Soriano
    A Practical Solution for Distribution Rights Protection in Multicast Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:527-536 [Conf]
  16. Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné
    Protocols for Malicious Host Revocation. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:191-201 [Conf]
  17. Marcel Fernandez, Miguel Soriano
    Identification of Traitors Using a Trellis. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:211-222 [Conf]
  18. Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné
    Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts. [Citation Graph (0, 0)][DBLP]
    ICWE, 2003, pp:289-292 [Conf]
  19. Josep Cotrina Navau, Marcel Fernandez, Miguel Soriano
    A Family of Collusion 2-Secure Codes. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:387-397 [Conf]
  20. Marcel Fernandez, Miguel Soriano
    Identification Algorithms for Sequential Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:414-430 [Conf]
  21. Marcel Fernandez, Miguel Soriano
    Decoding codes with the identifiable parent property. [Citation Graph (0, 0)][DBLP]
    ISCC, 2002, pp:1028-1033 [Conf]
  22. Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné
    A protocol for detecting malicious hosts based on limiting the execution time of mobile agents. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:251-256 [Conf]
  23. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
    Implementation of an Efficient Authenticated Dictionary for Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:238-243 [Conf]
  24. Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau
    Tracing Traitors by Guessing Secrets. The q-Ary Case. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:61-73 [Conf]
  25. Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau
    A New Class of Codes for Fingerprinting Schemes. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:398-409 [Conf]
  26. Marcel Fernandez, Miguel Soriano
    Fingerprinting Concatenated Codes with Efficient Identification. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:459-470 [Conf]
  27. Marcel Fernandez, Miguel Soriano
    Efficient Recovery of Secrets. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:763-767 [Conf]
  28. Miguel Soriano, Marcel Fernandez, Elisa Sayrol, Joan Tomas, Joan Casanellas, Josep Pegueroles, Juan Hernández-Serrano
    Multimedia Copyright Protection Platform Demonstrator. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:411-414 [Conf]
  29. Miguel Soriano, Marcel Fernandez, Josep Cotrina Navau
    Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:231-243 [Conf]
  30. Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné
    Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts. [Citation Graph (0, 0)][DBLP]
    MATA, 2003, pp:286-295 [Conf]
  31. Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné
    Detecting and Proving Manipulation Attacks in Mobile Agent Systems. [Citation Graph (0, 0)][DBLP]
    MATA, 2004, pp:224-233 [Conf]
  32. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
    Efficient Offline Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    MIPS, 2003, pp:319-330 [Conf]
  33. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
    A Certificate Status Checking Protocol for the Authenticated Dictionary. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:255-266 [Conf]
  34. Luis Zarza, Josep Pegueroles, Miguel Soriano, Rafael Martínez
    Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:316-319 [Conf]
  35. Juan Hernández-Serrano, Josep Pegueroles, Miguel Soriano
    Energy Efficiency of Load Balancing in MANET Routing Protocols. [Citation Graph (0, 0)][DBLP]
    SNPD, 2005, pp:476-483 [Conf]
  36. Elisa Sayrol, Miguel Soriano, Marcel Fernandez, Joan Casanellas, Joan Tomas
    Development of a platform offering video copyright protection and security against illegal distribution. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:76-83 [Conf]
  37. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
    E-MHT. An Efficient Protocol for Certificate Status Checking. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:410-424 [Conf]
  38. Oscar Esparza, Jose L. Muñoz, Miguel Soriano, Jordi Forné
    Secure brokerage mechanisms for mobile electronic commerce. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:12, pp:2308-2321 [Journal]
  39. Marcel Fernandez, Miguel Soriano
    Soft-Decision Tracing in Fingerprinted Multimedia Content. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2004, v:11, n:2, pp:38-46 [Journal]
  40. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
    Certificate revocation system implementation based on the Merkle hash tree. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:2, n:2, pp:110-124 [Journal]
  41. Francisco Recacha, José L. Melús, X. Simón, Miguel Soriano, Jordi Forné
    Secure Data Transmission in Extended Ethernet Environments. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:794-803 [Journal]
  42. Luis Zarza, Josep Pegueroles, Miguel Soriano
    Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:708-712 [Conf]
  43. Juan Hernández-Serrano, Josep Pegueroles, Miguel Soriano
    Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:526-539 [Conf]
  44. Marcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo
    A Note About the Traceability Properties of Linear Codes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:251-258 [Conf]
  45. Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano
    Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:992-999 [Conf]

  46. Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms. [Citation Graph (, )][DBLP]


  47. New Considerations about the Correct Design of Turbo Fingerprinting Codes. [Citation Graph (, )][DBLP]


  48. On the IPP Properties of Reed-Solomon Codes. [Citation Graph (, )][DBLP]


  49. MAIS: Mobile Agent Integrity System - A Security System to IDS based on Autonomous Agents. [Citation Graph (, )][DBLP]


  50. Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel. [Citation Graph (, )][DBLP]


  51. Securing Agents against Malicious Host in an Intrusion Detection System. [Citation Graph (, )][DBLP]


  52. Secure Remote Voter Registration. [Citation Graph (, )][DBLP]


  53. New voter verification scheme using pre-encrypted ballots. [Citation Graph (, )][DBLP]


  54. A note about the identifier parent property in Reed-Solomon codes. [Citation Graph (, )][DBLP]


Search in 0.052secs, Finished in 0.054secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002