Publications

photo

Peer-reviewed publications

Generated using php-bibHTML by Hugo Jonker, based on the BiblioPhile PHP BibTex parser.

  • 2016:
    1. Optimality results on the security of lookup-based protocols. S. Mauw, J. Pozo and R. Trujillo-Rasua. In At the 12th Workshop on RFID and IoT Security (RFIDSec 2016), Hong kong, November 29, December 2, 2016, 2016. bib | preprint ]
    2. Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study. M. Fraile, M. Ford, O. Gadyatskaya, R. Kumar, M. Stoelinga and R. Trujillo-Rasua. In At the 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling (PoEM) 8 - 10 November, 2016, Skövde, Sweden, Springer, Lecture Notes in Business Information Processing 267, pp. 326–334, 2016. bib | preprint ]
    3. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0. O. Gadyatskaya, R. Jhawar, P. Kordy, K. Lounis, S. Mauw and R. Trujillo-Rasua. In 13th International Conference on Quantitative Evaluation of SysTems (QEST’16), Québec, Canada, August 23-25, 2016, Springer, Lecture Notes in Computer Science 9826, pp. 159–162, 2016. bib | preprint ]
    4. The Fréchet⁄Manhattan distance and the trajectory anonymisation problem. C. Torres and R. Trujillo-Rasua. In 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec’16), Trento, Italy, July 18-21, 2016, Springer, Lecture Notes in Computer Science 9766, pp. 19–34, 2016. bib | preprint ]
    5. Counteracting active attacks in social network graphs. . Mauw, R. Trujillo-Rasua and B. Xuan. In 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec’16), Trento, Italy, July 18-21, 2016, Springer, Lecture Notes in Computer Science 9766, pp. 233–248, 2016. bib | preprint ]
    6. Man-in-the-middle attacks evolved… but our security models didn’t. H. Jonker, S. Mauw and R. Trujillo-Rasua. In 24th International Workshop on Security Protocols (SPW’16), Brno, Czech Republic, April 7-8, 2016, 2016. bib | preprint ]
    7. A class of precomputation-based distance-bounding protocols. S. Mauw, J. Pozo and R. Trujillo-Rasua. In 1st IEEE European Symposium on Security and Privacy (Euro S & P), Saarbrücken, Germany, March 21-24, 2016, IEEE, pp. 97–111, 2016. bib | preprint ]
    8. Characterizing 1-metric antidimensional trees and unicyclic graphs. R. Trujillo-Rasua and I.G. Yero. The Computer Journal, 59(8):1264–1273, 2016. (to appear) bib ]
  • 2015:
    1. k-Metric Antidimension: a Privacy Measure for Social Graphs. R. Trujillo-Rasua and I.G. Yero. Information Sciences, 328:403 – 417, 2015. bib | preprint | from publisher ]
    2. Attack Trees with Sequential Conjunction. R. Jhawar, B. Kordy, S. Mauw, S. Radomirovic and R. Trujillo-Rasua. In ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings, pp. 339–353, 2015. bib | preprint | from publisher ]
    3. Privacy in Spatio-Temporal Databases: A Microaggregation-Based Approach. R. Trujillo-Rasua and J. Domingo-Ferrer. In Advanced Research in Data Privacy, Springer International Publishing, Studies in Computational Intelligencepp. 197-214, 2015. bib | preprint | from publisher ]
    4. Comparing distance bounding protocols: A critical mission supported by decision theory. G. Avoine, S. Mauw and R. Trujillo-Rasua. Computer Communications, 67:92–102, 2015. bib | preprint | from publisher ]
  • 2014:
    1. Distance Bounding Facing Both Mafia and Distance Frauds. R. Trujillo-Rasua, B. Martin and G. Avoine. IEEE Transactions on Wireless Communications, 13(10):5690–5698, 2014. bib | preprint | from publisher ]
  • 2013:
    1. On the privacy offered by (k,δ)-anonymity. R. Trujillo-Rasua and J. Domingo-Ferrer. Inf. Syst., 38(4):491-494, 2013. bib | preprint | from publisher ]
    2. Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding. R. Trujillo-Rasua. In Mobile and Ubiquitous Systems: Computing, Networking, and Services - 10th International Conference, MOBIQUITOUS 2013, Tokyo, Japan, December 2-4, 2013, pp. 289–302, 2013. bib | preprint | from publisher ]
  • 2012:
    1. Microaggregation- and permutation-based anonymization of movement data. J. Domingo-Ferrer and R. Trujillo-Rasua. Inf. Sci., 208:55-80, 2012. bib | preprint | from publisher ]
    2. Predictive protocol for the scalable identification of RFID tags through collaborative readers. R. Trujillo-Rasua, A. Solanas, P.A. Pérez-Martínez and J. Domingo-Ferrer. Computers in Industry, 63(6):557-573, 2012. bib | preprint | from publisher ]
  • 2011:
    1. Scalable trajectory-based protocol for RFID tags identification. R. Trujillo-Rasua and A. Solanas. In RFID-TA, pp. 279-285, 2011. bib | preprint | from publisher ]
    2. A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation. A. Fernàndez-Mir, R. Trujillo-Rasua, J. Castellà-Roca and J. Domingo-Ferrer. In RFIDSec, pp. 147-162, 2011. bib | preprint | from publisher ]
    3. Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers. R. Trujillo-Rasua and A. Solanas. Computer Networks, 55(15):3211-3223, 2011. bib | preprint | from publisher ]
  • 2010:
    1. The Poulidor Distance-Bounding Protocol. R. Trujillo-Rasua, B. Martin and G. Avoine. In RFIDSec, pp. 239-257, 2010. bib | preprint | from publisher ]
    2. Privacy-preserving publication of trajectories using microaggregation. J. Domingo-Ferrer, M. Sramka and R. Trujillo-Rasua. In SPRINGL, pp. 26-33, 2010. bib | preprint | from publisher ]