|
Search the dblp DataBase
Arturo Ribagorda:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ana I. González-Tablas, Benjamín Ramos, Arturo Ribagorda
Path-Stamps: A Proposal for Enhancing Security of Location Tracking Applications. [Citation Graph (0, 0)][DBLP] CAiSE Workshops, 2003, pp:- [Conf]
- Javier Carbo Rubiera, Agustín Orfila, Arturo Ribagorda
Adaptive Agents Applied to Intrusion Detection. [Citation Graph (0, 0)][DBLP] CEEMAS, 2003, pp:445-453 [Conf]
- Ana I. González-Tablas, L. M. Salas, Benjamín Ramos, Arturo Ribagorda
Providing Personalization and Automation to Spatial-Temporal Stamping Services. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2005, pp:219-225 [Conf]
- Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
A Protocol for Secure Content Distribution in Pure P2P Networks. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2006, pp:712-716 [Conf]
- Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information. [Citation Graph (0, 0)][DBLP] ETRICS, 2006, pp:396-408 [Conf]
- Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
A P2P Content Authentication Protocol Based on Byzantine Agreement. [Citation Graph (0, 0)][DBLP] ETRICS, 2006, pp:60-72 [Conf]
- Ana I. González-Tablas, K. Kursawe, Benjamín Ramos, Arturo Ribagorda
Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:797-806 [Conf]
- Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
Security in P2P Networks: Survey and Research Directions. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2006, pp:183-192 [Conf]
- César Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi
Evolving hash functions by means of genetic programming. [Citation Graph (0, 0)][DBLP] GECCO, 2006, pp:1861-1862 [Conf]
- Ana I. González-Tablas, Elena Castro, Arturo Ribagorda, Manuel Velasco
A Secure Perspective of Data. Including Authentication in the NewsML DTD. [Citation Graph (0, 0)][DBLP] ICWI, 2002, pp:791-794 [Conf]
- Julio César Hernández Castro, José María Sierra, Pedro Isasi, Arturo Ribagorda
Genetic Cryptoanalysis of Two Rounds TEA. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (3), 2002, pp:1024-1031 [Conf]
- Antonio Izquierdo, José María Sierra, Julio César Hernández Castro, Arturo Ribagorda
Security Issues in Network File Systems. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:812-820 [Conf]
- José María Sierra, Julio César Hernández Castro, Eva Ponce, Arturo Ribagorda
Protection of Multiagent Systems. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2003, pp:123-128 [Conf]
- Joaquín Torres Márquez, Antonio Izquierdo, Arturo Ribagorda, Almudena Alcaide
Secure Electronic Payments in Heterogeneous Networking: New Authentication Protocols Approach. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2005, pp:729-738 [Conf]
- Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
RFID Systems: A Survey on Security Threats and Proposed Solutions. [Citation Graph (0, 0)][DBLP] PWC, 2006, pp:159-170 [Conf]
- Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos, J. Carlos Mex-Perera
Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers. [Citation Graph (0, 0)][DBLP] IMA Int. Conf., 2001, pp:374-377 [Conf]
- Agustín Orfila, Javier Carbó, Arturo Ribagorda
Effectiveness Evaluation of Data Mining Based IDS. [Citation Graph (0, 0)][DBLP] Industrial Conference on Data Mining, 2006, pp:377-388 [Conf]
- Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. [Citation Graph (0, 0)][DBLP] OTM Workshops (1), 2006, pp:352-361 [Conf]
- Hugo A. Mitre, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda
A Legal Ontology to Support Privacy Preservation in Location-Based Services. [Citation Graph (0, 0)][DBLP] OTM Workshops (2), 2006, pp:1755-1764 [Conf]
- Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
Certificate-based Access Control in Pure P2P Networks. [Citation Graph (0, 0)][DBLP] Peer-to-Peer Computing, 2006, pp:177-184 [Conf]
- César Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi Viñuela
Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming. [Citation Graph (0, 0)][DBLP] PPSN, 2006, pp:818-827 [Conf]
- Carlos Lamenca-Martinez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
Lamar: A New Pseudorandom Number Generator Evolved by Means of Genetic Programming. [Citation Graph (0, 0)][DBLP] PPSN, 2006, pp:850-859 [Conf]
- José María Sierra, Julio César Hernández Castro, Antonio Izquierdo, Arturo Ribagorda
Secure Communications in Multi-Agent Systems Protecting KQML. [Citation Graph (0, 0)][DBLP] WOSIS, 2004, pp:305-313 [Conf]
- Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. [Citation Graph (0, 0)][DBLP] UIC, 2006, pp:912-923 [Conf]
- Julio César Hernández Castro, Eva María Cebrián, José María Sierra, Arturo Ribagorda, Benjamín Ramos
Project WebOracle: Developing an advanced web server security assesment tool. [Citation Graph (0, 0)][DBLP] WebNet, 2001, pp:526-529 [Conf]
- Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos
Search Engines as a security thread. [Citation Graph (0, 0)][DBLP] WebNet, 2001, pp:530-533 [Conf]
- Joaquín Torres Márquez, Antonio Izquierdo, José María Sierra, Arturo Ribagorda
Towards self-authenticable smart cards. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:15, pp:2781-2787 [Journal]
- J. Fernández-González, Gordon B. Agnew, Arturo Ribagorda
Encryption and error correction codes for reliable file storage. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:5, pp:501-510 [Journal]
- Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos
Search Engines as a Security Threat. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:10, pp:25-30 [Journal]
- José María Sierra, Julio César Hernández Castro, Narayana Jayaram, Arturo Ribagorda
Low computational cost integrity for block ciphers. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2004, v:20, n:5, pp:857-863 [Journal]
- Julio César Hernández Castro, José María Sierra, André Seznec, Antonio Izquierdo, Arturo Ribagorda
The strict avalanche criterion randomness test. [Citation Graph (0, 0)][DBLP] Mathematics and Computers in Simulation, 2005, v:68, n:1, pp:1-7 [Journal]
- Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2007, pp:779-783 [Conf]
- Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
A Multi-party Rational Exchange Protocol. [Citation Graph (0, 0)][DBLP] OTM Workshops (1), 2007, pp:42-43 [Conf]
- Agustín Orfila, Javier Carbó, Arturo Ribagorda
Intrusion Detection Effectiveness Improvement by a Multiagent System. [Citation Graph (0, 0)][DBLP] IJCSA, 2005, v:2, n:1, pp:1-6 [Journal]
CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies. [Citation Graph (, )][DBLP]
Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming. [Citation Graph (, )][DBLP]
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. [Citation Graph (, )][DBLP]
Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming. [Citation Graph (, )][DBLP]
Towards Automated Design of Multi-party Rational Exchange Security Protocols. [Citation Graph (, )][DBLP]
Nature-Inspired Synthesis of Rational Protocols. [Citation Graph (, )][DBLP]
Steganalysis of Hydan. [Citation Graph (, )][DBLP]
On the Need to Divide the Signature Creation Environment. [Citation Graph (, )][DBLP]
Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol. [Citation Graph (, )][DBLP]
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. [Citation Graph (, )][DBLP]
Towards an XML format for time-stamps. [Citation Graph (, )][DBLP]
Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol. [Citation Graph (, )][DBLP]
Extended electronic signature policies. [Citation Graph (, )][DBLP]
Secure content access and replication in pure P2P networks. [Citation Graph (, )][DBLP]
Autonomous decision on intrusion detection with trained BDI agents. [Citation Graph (, )][DBLP]
Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study. [Citation Graph (, )][DBLP]
Cryptanalysis of the RSA-CEGD protocol [Citation Graph (, )][DBLP]
Side-channel attack on labeling CAPTCHAs [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.009secs
|