Follow
Javier Lopez
Javier Lopez
Professor of Computer Science, University of Malaga
Verified email at lcc.uma.es
Title
Cited by
Cited by
Year
On the features and challenges of security and privacy in distributed internet of things
R Roman, J Zhou, J Lopez
Computer Networks 57 (10), 2266-2279, 2013
13212013
Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges
R Roman, J Lopez, M Mambo
Future Generation Computer Systems 78, 680-698, 2018
11282018
Securing the internet of things
R Roman, P Najera, J Lopez
Computer 44 (9), 51-58, 2011
9502011
Trust management systems for wireless sensor networks: Best practices
J Lopez, R Roman, I Agudo, C Fernandez-Gago
Computer Communications 33 (9), 1086-1093, 2010
4192010
Key management systems for sensor networks in the context of the Internet of Things
R Roman, C Alcaraz, J Lopez, N Sklavos
Computers & Electrical Engineering 37 (2), 147-159, 2011
3782011
Applying intrusion detection systems to wireless sensor networks
R Roman, J Zhou, J Lopez
IEEE Consumer Communications & Networking Conference (CCNC 2006), 2006
3472006
A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services
I Stellios, P Kotzanikolaou, M Psarakis, C Alcaraz, J Lopez
IEEE Communications Surveys & Tutorials 20 (4), 3453-3495, 2018
2632018
Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?
C Alcaraz, P Najera, J Lopez, R Roman
1st International Workshop on the Security of the Internet of Things (SecIoT'10), 2010
2262010
Integrating wireless sensor networks and the internet: a security analysis
R Roman, J Lopez
Internet Research 19 (2), 246-259, 2009
1652009
Evolving privacy: From sensors to the Internet of Things
J Lopez, R Rios, F Bao, G Wang
Future Generation Computer Systems 75, 46-57, 2017
1642017
A security analysis for wireless sensor mesh networks in highly critical systems
C Alcaraz, J Lopez
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010
1532010
A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes
R Roman, C Alcaraz, J Lopez
Mobile Networks and Applications 12 (4), 231-244, 2007
1462007
Authentication and authorization infrastructures (AAIs): a comparative survey
J Lopez, R Oppliger, G Pernul
Computers & Security 23 (7), 578-590, 2004
1462004
Analysis of security threats, requirements, technologies and standards in wireless sensor networks
J Lopez, R Roman, C Alcaraz
Foundations of Security Analysis and Design V, 289-338, 2009
1402009
Overview of wireless sensor network security
J Lopez, J Zhou
Wireless sensor network security. IOS Press, incorporated, 1-21, 2008
140*2008
Real-time location and inpatient care systems based on passive RFID
P Najera, J Lopez, R Roman
Journal of Network and Computer Applications 34 (3), 980-989, 2011
1322011
Wireless Sensor Network Security
J López, J Zhou
Ios PressInc, 2008
1252008
Modelling trust dynamics in the Internet of Things
C Fernandez-Gago, F Moyano, J Lopez
Information Sciences 396, 72-82, 2017
1002017
Accountability for cloud and other future internet services
S Pearson, V Tountopoulos, D Catteddu, M Südholt, R Molva, C Reich, ...
Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th …, 2012
982012
Accountability for cloud and other future internet services
S Pearson, V Tountopoulos, D Catteddu, M Südholt, R Molva, C Reich, ...
Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th …, 2012
982012
The system can't perform the operation now. Try again later.
Articles 1–20