The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Arturo Ribagorda: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ana I. González-Tablas, Benjamín Ramos, Arturo Ribagorda
    Path-Stamps: A Proposal for Enhancing Security of Location Tracking Applications. [Citation Graph (0, 0)][DBLP]
    CAiSE Workshops, 2003, pp:- [Conf]
  2. Javier Carbo Rubiera, Agustín Orfila, Arturo Ribagorda
    Adaptive Agents Applied to Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    CEEMAS, 2003, pp:445-453 [Conf]
  3. Ana I. González-Tablas, L. M. Salas, Benjamín Ramos, Arturo Ribagorda
    Providing Personalization and Automation to Spatial-Temporal Stamping Services. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2005, pp:219-225 [Conf]
  4. Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    A Protocol for Secure Content Distribution in Pure P2P Networks. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2006, pp:712-716 [Conf]
  5. Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:396-408 [Conf]
  6. Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    A P2P Content Authentication Protocol Based on Byzantine Agreement. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:60-72 [Conf]
  7. Ana I. González-Tablas, K. Kursawe, Benjamín Ramos, Arturo Ribagorda
    Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:797-806 [Conf]
  8. Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    Security in P2P Networks: Survey and Research Directions. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:183-192 [Conf]
  9. César Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi
    Evolving hash functions by means of genetic programming. [Citation Graph (0, 0)][DBLP]
    GECCO, 2006, pp:1861-1862 [Conf]
  10. Ana I. González-Tablas, Elena Castro, Arturo Ribagorda, Manuel Velasco
    A Secure Perspective of Data. Including Authentication in the NewsML DTD. [Citation Graph (0, 0)][DBLP]
    ICWI, 2002, pp:791-794 [Conf]
  11. Julio César Hernández Castro, José María Sierra, Pedro Isasi, Arturo Ribagorda
    Genetic Cryptoanalysis of Two Rounds TEA. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2002, pp:1024-1031 [Conf]
  12. Antonio Izquierdo, José María Sierra, Julio César Hernández Castro, Arturo Ribagorda
    Security Issues in Network File Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:812-820 [Conf]
  13. José María Sierra, Julio César Hernández Castro, Eva Ponce, Arturo Ribagorda
    Protection of Multiagent Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2003, pp:123-128 [Conf]
  14. Joaquín Torres Márquez, Antonio Izquierdo, Arturo Ribagorda, Almudena Alcaide
    Secure Electronic Payments in Heterogeneous Networking: New Authentication Protocols Approach. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2005, pp:729-738 [Conf]
  15. Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
    RFID Systems: A Survey on Security Threats and Proposed Solutions. [Citation Graph (0, 0)][DBLP]
    PWC, 2006, pp:159-170 [Conf]
  16. Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos, J. Carlos Mex-Perera
    Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:374-377 [Conf]
  17. Agustín Orfila, Javier Carbó, Arturo Ribagorda
    Effectiveness Evaluation of Data Mining Based IDS. [Citation Graph (0, 0)][DBLP]
    Industrial Conference on Data Mining, 2006, pp:377-388 [Conf]
  18. Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
    EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:352-361 [Conf]
  19. Hugo A. Mitre, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda
    A Legal Ontology to Support Privacy Preservation in Location-Based Services. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (2), 2006, pp:1755-1764 [Conf]
  20. Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    Certificate-based Access Control in Pure P2P Networks. [Citation Graph (0, 0)][DBLP]
    Peer-to-Peer Computing, 2006, pp:177-184 [Conf]
  21. César Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi Viñuela
    Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming. [Citation Graph (0, 0)][DBLP]
    PPSN, 2006, pp:818-827 [Conf]
  22. Carlos Lamenca-Martinez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
    Lamar: A New Pseudorandom Number Generator Evolved by Means of Genetic Programming. [Citation Graph (0, 0)][DBLP]
    PPSN, 2006, pp:850-859 [Conf]
  23. José María Sierra, Julio César Hernández Castro, Antonio Izquierdo, Arturo Ribagorda
    Secure Communications in Multi-Agent Systems Protecting KQML. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:305-313 [Conf]
  24. Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
    M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:912-923 [Conf]
  25. Julio César Hernández Castro, Eva María Cebrián, José María Sierra, Arturo Ribagorda, Benjamín Ramos
    Project WebOracle: Developing an advanced web server security assesment tool. [Citation Graph (0, 0)][DBLP]
    WebNet, 2001, pp:526-529 [Conf]
  26. Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos
    Search Engines as a security thread. [Citation Graph (0, 0)][DBLP]
    WebNet, 2001, pp:530-533 [Conf]
  27. Joaquín Torres Márquez, Antonio Izquierdo, José María Sierra, Arturo Ribagorda
    Towards self-authenticable smart cards. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2781-2787 [Journal]
  28. J. Fernández-González, Gordon B. Agnew, Arturo Ribagorda
    Encryption and error correction codes for reliable file storage. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:5, pp:501-510 [Journal]
  29. Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos
    Search Engines as a Security Threat. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:10, pp:25-30 [Journal]
  30. José María Sierra, Julio César Hernández Castro, Narayana Jayaram, Arturo Ribagorda
    Low computational cost integrity for block ciphers. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2004, v:20, n:5, pp:857-863 [Journal]
  31. Julio César Hernández Castro, José María Sierra, André Seznec, Antonio Izquierdo, Arturo Ribagorda
    The strict avalanche criterion randomness test. [Citation Graph (0, 0)][DBLP]
    Mathematics and Computers in Simulation, 2005, v:68, n:1, pp:1-7 [Journal]
  32. Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:779-783 [Conf]
  33. Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    A Multi-party Rational Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2007, pp:42-43 [Conf]
  34. Agustín Orfila, Javier Carbó, Arturo Ribagorda
    Intrusion Detection Effectiveness Improvement by a Multiagent System. [Citation Graph (0, 0)][DBLP]
    IJCSA, 2005, v:2, n:1, pp:1-6 [Journal]

  35. CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies. [Citation Graph (, )][DBLP]


  36. Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming. [Citation Graph (, )][DBLP]


  37. An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. [Citation Graph (, )][DBLP]


  38. Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming. [Citation Graph (, )][DBLP]


  39. Towards Automated Design of Multi-party Rational Exchange Security Protocols. [Citation Graph (, )][DBLP]


  40. Nature-Inspired Synthesis of Rational Protocols. [Citation Graph (, )][DBLP]


  41. Steganalysis of Hydan. [Citation Graph (, )][DBLP]


  42. On the Need to Divide the Signature Creation Environment. [Citation Graph (, )][DBLP]


  43. Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol. [Citation Graph (, )][DBLP]


  44. Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. [Citation Graph (, )][DBLP]


  45. Towards an XML format for time-stamps. [Citation Graph (, )][DBLP]


  46. Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol. [Citation Graph (, )][DBLP]


  47. Extended electronic signature policies. [Citation Graph (, )][DBLP]


  48. Secure content access and replication in pure P2P networks. [Citation Graph (, )][DBLP]


  49. Autonomous decision on intrusion detection with trained BDI agents. [Citation Graph (, )][DBLP]


  50. Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study. [Citation Graph (, )][DBLP]


  51. Cryptanalysis of the RSA-CEGD protocol [Citation Graph (, )][DBLP]


  52. Side-channel attack on labeling CAPTCHAs [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.481secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002