Distance-Bounding Protocols: Verification without Time and Location.
S. Mauw, Z. Smith, J. Toro-Pozo and R. Trujillo-Rasua.
In IEEE Symposium on Security and Privacy (Oackland), S&P’18, May 21–23, 2018, San Francisco, California, USA,
2018.
[ bib | preprint ]
2017:
New Directions in Attack Tree Research: Catching up with Industrial Needs.
O. Gadyatskaya and R. Trujillo-Rasua.
In The Fourth International Workshop on Graphical Models for Security, GraMSec’17, Santa Barbara, CA, USA, August 21, 2017,
2017.
[ bib | preprint ]
Refinement-Aware Generation of Attack Trees.
O. Gadyatskaya, R. Jhawar, S. Mauw, R. Trujillo-Rasua and T.A.C. Willemse.
In Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings,
pp. 164–179, 2017.
[ bib | preprint ]
Security of Distance-Bounding: A Survey.
G. Avoine, M. Bingöl, I. Boureanu, S. Čapkun, G. Hancke, S. Kardaş, C. Kim, C. Lauradoux, B. Martin, J. Munilla, A. Peinado, K. Rasmussen, D. Singelée, A. Tchamkerten, R. Trujillo-Rasua and S. Vaudenay.
ACM Computing Survey,
2017. (to appear)
[ bib ]
Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph.
M. Lemanska, J. Rodríguez-Velázquez and R. Trujillo-Rasua.
Fundam. Inform.,
152(3):273–287, 2017.
[ bib | preprint ]
2016:
Optimality results on the security of lookup-based protocols.
S. Mauw, J. Pozo and R. Trujillo-Rasua.
In At the 12th Workshop on RFID and IoT Security (RFIDSec 2016), Hong kong, November 29, December 2, 2016,
2016.
[ bib | preprint ]
Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study.
M. Fraile, M. Ford, O. Gadyatskaya, R. Kumar, M. Stoelinga and R. Trujillo-Rasua.
In At the 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling (PoEM) 8 - 10 November, 2016, Skövde, Sweden,
Springer, Lecture Notes in Business Information Processing 267, pp. 326–334, 2016.
[ bib | preprint ]
Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0.
O. Gadyatskaya, R. Jhawar, P. Kordy, K. Lounis, S. Mauw and R. Trujillo-Rasua.
In 13th International Conference on Quantitative Evaluation of SysTems (QEST’16), Québec, Canada, August 23-25, 2016,
Springer, Lecture Notes in Computer Science 9826, pp. 159–162, 2016.
[ bib | preprint ]
The Fréchet⁄Manhattan distance and the trajectory anonymisation problem.
C. Torres and R. Trujillo-Rasua.
In 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec’16), Trento, Italy, July 18-21, 2016,
Springer, Lecture Notes in Computer Science 9766, pp. 19–34, 2016.
[ bib | preprint ]
Counteracting active attacks in social network graphs.
. Mauw, R. Trujillo-Rasua and B. Xuan.
In 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec’16), Trento, Italy, July 18-21, 2016,
Springer, Lecture Notes in Computer Science 9766, pp. 233–248, 2016.
[ bib | preprint ]
Man-in-the-middle attacks evolved… but our security models didn’t.
H. Jonker, S. Mauw and R. Trujillo-Rasua.
In 24th International Workshop on Security Protocols (SPW’16), Brno, Czech Republic, April 7-8, 2016,
2016.
[ bib | preprint ]
A class of precomputation-based distance-bounding protocols.
S. Mauw, J. Pozo and R. Trujillo-Rasua.
In 1st IEEE European Symposium on Security and Privacy (Euro S & P), Saarbrücken, Germany, March 21-24, 2016,
IEEE, pp. 97–111, 2016.
[ bib | preprint ]
Characterizing 1-metric antidimensional trees and unicyclic graphs.
R. Trujillo-Rasua and I.G. Yero.
The Computer Journal,
59(8):1264–1273, 2016. (to appear)
[ bib ]
2015:
k-Metric Antidimension: a Privacy Measure for Social Graphs.
R. Trujillo-Rasua and I.G. Yero.
Information Sciences,
328:403 – 417, 2015.
[ bib | preprint | from publisher ]
Attack Trees with Sequential Conjunction.
R. Jhawar, B. Kordy, S. Mauw, S. Radomirovic and R. Trujillo-Rasua.
In ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings,
pp. 339–353, 2015.
[ bib | preprint | from publisher ]
Privacy in Spatio-Temporal Databases: A Microaggregation-Based Approach.
R. Trujillo-Rasua and J. Domingo-Ferrer.
In Advanced Research in Data Privacy,
Springer International Publishing, Studies in Computational Intelligencepp. 197-214, 2015.
[ bib | preprint | from publisher ]
Comparing distance bounding protocols: A critical mission supported by decision theory.
G. Avoine, S. Mauw and R. Trujillo-Rasua.
Computer Communications,
67:92–102, 2015.
[ bib | preprint | from publisher ]
2014:
Distance Bounding Facing Both Mafia and Distance Frauds.
R. Trujillo-Rasua, B. Martin and G. Avoine.
IEEE Transactions on Wireless Communications,
13(10):5690–5698, 2014.
[ bib | preprint | from publisher ]
2013:
On the privacy offered by (k,δ)-anonymity.
R. Trujillo-Rasua and J. Domingo-Ferrer.
Inf. Syst.,
38(4):491-494, 2013.
[ bib | preprint | from publisher ]
Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding.
R. Trujillo-Rasua.
In Mobile and Ubiquitous Systems: Computing, Networking, and Services - 10th International Conference, MOBIQUITOUS 2013, Tokyo, Japan, December 2-4, 2013,
pp. 289–302, 2013.
[ bib | preprint | from publisher ]
2012:
Microaggregation- and permutation-based anonymization of movement data.
J. Domingo-Ferrer and R. Trujillo-Rasua.
Inf. Sci.,
208:55-80, 2012.
[ bib | preprint | from publisher ]
Predictive protocol for the scalable identification of RFID tags through collaborative readers.
R. Trujillo-Rasua, A. Solanas, P.A. Pérez-Martínez and J. Domingo-Ferrer.
Computers in Industry,
63(6):557-573, 2012.
[ bib | preprint | from publisher ]
2011:
Scalable trajectory-based protocol for RFID tags identification.
R. Trujillo-Rasua and A. Solanas.
In RFID-TA,
pp. 279-285, 2011.
[ bib | preprint | from publisher ]
A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation.
A. Fernàndez-Mir, R. Trujillo-Rasua, J. Castellà-Roca and J. Domingo-Ferrer.
In RFIDSec,
pp. 147-162, 2011.
[ bib | preprint | from publisher ]
Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers.
R. Trujillo-Rasua and A. Solanas.
Computer Networks,
55(15):3211-3223, 2011.
[ bib | preprint | from publisher ]
2010:
The Poulidor Distance-Bounding Protocol.
R. Trujillo-Rasua, B. Martin and G. Avoine.
In RFIDSec,
pp. 239-257, 2010.
[ bib | preprint | from publisher ]
Privacy-preserving publication of trajectories using microaggregation.
J. Domingo-Ferrer, M. Sramka and R. Trujillo-Rasua.
In SPRINGL,
pp. 26-33, 2010.
[ bib | preprint | from publisher ]