Publications

photo

Peer-reviewed publications

Generated using php-bibHTML by Hugo Jonker, based on the BiblioPhile PHP BibTex parser.

  • 2018:
    1. Distance-Bounding Protocols: Verification without Time and Location. S. Mauw, Z. Smith, J. Toro-Pozo and R. Trujillo-Rasua. In IEEE Symposium on Security and Privacy (Oackland), S&P’18, May 21–23, 2018, San Francisco, California, USA, 2018. bib | preprint ]
  • 2017:
    1. New Directions in Attack Tree Research: Catching up with Industrial Needs. O. Gadyatskaya and R. Trujillo-Rasua. In The Fourth International Workshop on Graphical Models for Security, GraMSec’17, Santa Barbara, CA, USA, August 21, 2017, 2017. bib | preprint ]
    2. Refinement-Aware Generation of Attack Trees. O. Gadyatskaya, R. Jhawar, S. Mauw, R. Trujillo-Rasua and T.A.C. Willemse. In Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings, pp. 164–179, 2017. bib | preprint ]
    3. Security of Distance-Bounding: A Survey. G. Avoine, M. Bingöl, I. Boureanu, S. Čapkun, G. Hancke, S. Kardaş, C. Kim, C. Lauradoux, B. Martin, J. Munilla, A. Peinado, K. Rasmussen, D. Singelée, A. Tchamkerten, R. Trujillo-Rasua and S. Vaudenay. ACM Computing Survey, 2017. (to appear) bib ]
    4. Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph. M. Lemanska, J. Rodríguez-Velázquez and R. Trujillo-Rasua. Fundam. Inform., 152(3):273–287, 2017. bib | preprint ]
  • 2016:
    1. Optimality results on the security of lookup-based protocols. S. Mauw, J. Pozo and R. Trujillo-Rasua. In At the 12th Workshop on RFID and IoT Security (RFIDSec 2016), Hong kong, November 29, December 2, 2016, 2016. bib | preprint ]
    2. Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study. M. Fraile, M. Ford, O. Gadyatskaya, R. Kumar, M. Stoelinga and R. Trujillo-Rasua. In At the 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling (PoEM) 8 - 10 November, 2016, Skövde, Sweden, Springer, Lecture Notes in Business Information Processing 267, pp. 326–334, 2016. bib | preprint ]
    3. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0. O. Gadyatskaya, R. Jhawar, P. Kordy, K. Lounis, S. Mauw and R. Trujillo-Rasua. In 13th International Conference on Quantitative Evaluation of SysTems (QEST’16), Québec, Canada, August 23-25, 2016, Springer, Lecture Notes in Computer Science 9826, pp. 159–162, 2016. bib | preprint ]
    4. The Fréchet⁄Manhattan distance and the trajectory anonymisation problem. C. Torres and R. Trujillo-Rasua. In 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec’16), Trento, Italy, July 18-21, 2016, Springer, Lecture Notes in Computer Science 9766, pp. 19–34, 2016. bib | preprint ]
    5. Counteracting active attacks in social network graphs. . Mauw, R. Trujillo-Rasua and B. Xuan. In 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec’16), Trento, Italy, July 18-21, 2016, Springer, Lecture Notes in Computer Science 9766, pp. 233–248, 2016. bib | preprint ]
    6. Man-in-the-middle attacks evolved… but our security models didn’t. H. Jonker, S. Mauw and R. Trujillo-Rasua. In 24th International Workshop on Security Protocols (SPW’16), Brno, Czech Republic, April 7-8, 2016, 2016. bib | preprint ]
    7. A class of precomputation-based distance-bounding protocols. S. Mauw, J. Pozo and R. Trujillo-Rasua. In 1st IEEE European Symposium on Security and Privacy (Euro S & P), Saarbrücken, Germany, March 21-24, 2016, IEEE, pp. 97–111, 2016. bib | preprint ]
    8. Characterizing 1-metric antidimensional trees and unicyclic graphs. R. Trujillo-Rasua and I.G. Yero. The Computer Journal, 59(8):1264–1273, 2016. (to appear) bib ]
  • 2015:
    1. k-Metric Antidimension: a Privacy Measure for Social Graphs. R. Trujillo-Rasua and I.G. Yero. Information Sciences, 328:403 – 417, 2015. bib | preprint | from publisher ]
    2. Attack Trees with Sequential Conjunction. R. Jhawar, B. Kordy, S. Mauw, S. Radomirovic and R. Trujillo-Rasua. In ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings, pp. 339–353, 2015. bib | preprint | from publisher ]
    3. Privacy in Spatio-Temporal Databases: A Microaggregation-Based Approach. R. Trujillo-Rasua and J. Domingo-Ferrer. In Advanced Research in Data Privacy, Springer International Publishing, Studies in Computational Intelligencepp. 197-214, 2015. bib | preprint | from publisher ]
    4. Comparing distance bounding protocols: A critical mission supported by decision theory. G. Avoine, S. Mauw and R. Trujillo-Rasua. Computer Communications, 67:92–102, 2015. bib | preprint | from publisher ]
  • 2014:
    1. Distance Bounding Facing Both Mafia and Distance Frauds. R. Trujillo-Rasua, B. Martin and G. Avoine. IEEE Transactions on Wireless Communications, 13(10):5690–5698, 2014. bib | preprint | from publisher ]
  • 2013:
    1. On the privacy offered by (k,δ)-anonymity. R. Trujillo-Rasua and J. Domingo-Ferrer. Inf. Syst., 38(4):491-494, 2013. bib | preprint | from publisher ]
    2. Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding. R. Trujillo-Rasua. In Mobile and Ubiquitous Systems: Computing, Networking, and Services - 10th International Conference, MOBIQUITOUS 2013, Tokyo, Japan, December 2-4, 2013, pp. 289–302, 2013. bib | preprint | from publisher ]
  • 2012:
    1. Microaggregation- and permutation-based anonymization of movement data. J. Domingo-Ferrer and R. Trujillo-Rasua. Inf. Sci., 208:55-80, 2012. bib | preprint | from publisher ]
    2. Predictive protocol for the scalable identification of RFID tags through collaborative readers. R. Trujillo-Rasua, A. Solanas, P.A. Pérez-Martínez and J. Domingo-Ferrer. Computers in Industry, 63(6):557-573, 2012. bib | preprint | from publisher ]
  • 2011:
    1. Scalable trajectory-based protocol for RFID tags identification. R. Trujillo-Rasua and A. Solanas. In RFID-TA, pp. 279-285, 2011. bib | preprint | from publisher ]
    2. A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation. A. Fernàndez-Mir, R. Trujillo-Rasua, J. Castellà-Roca and J. Domingo-Ferrer. In RFIDSec, pp. 147-162, 2011. bib | preprint | from publisher ]
    3. Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers. R. Trujillo-Rasua and A. Solanas. Computer Networks, 55(15):3211-3223, 2011. bib | preprint | from publisher ]
  • 2010:
    1. The Poulidor Distance-Bounding Protocol. R. Trujillo-Rasua, B. Martin and G. Avoine. In RFIDSec, pp. 239-257, 2010. bib | preprint | from publisher ]
    2. Privacy-preserving publication of trajectories using microaggregation. J. Domingo-Ferrer, M. Sramka and R. Trujillo-Rasua. In SPRINGL, pp. 26-33, 2010. bib | preprint | from publisher ]