Esther Palomar
Titolo
Citata da
Citata da
Anno
Anonymous authentication for privacy-preserving IoT target-driven applications
A Alcaide, E Palomar, J Montero-Castillo, A Ribagorda
computers & security 37, 111-123, 2013
1102013
Cooperative wireless communications
Y Zhang, HH Chen, M Guizani
CRC press, 2009
552009
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
F Le Fessant, A Papadimitriou, AC Viana, C Sengul, E Palomar
Computer communications 35 (2), 234-248, 2012
352012
Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security
P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, E Palomar, ...
2010 IEEE International Conference on RFID (IEEE RFID 2010), 45-52, 2010
312010
Certificate-based access control in pure p2p networks
E Palomar, JM Estevez-Tapiador, JC Hernandez-Castro, A Ribagorda
Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), 177-184, 2006
302006
Certificate-based access control in pure p2p networks
E Palomar, JM Estevez-Tapiador, JC Hernandez-Castro, A Ribagorda
Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), 177-184, 2006
302006
Providing SIEM systems with self-adaptation
G Suarez-Tangil, E Palomar, A Ribagorda, I Sanz
Information Fusion 21, 145-158, 2015
292015
Hindering false event dissemination in VANETs with proof-of-work mechanisms
E Palomar, JM de Fuentes, AI González-Tablas, A Alcaide
Transportation Research Part C: Emerging Technologies 23, 85-97, 2012
272012
Secure content access and replication in pure p2p networks
E Palomar, JME Tapiador, JC Hernandez-Castro, A Ribagorda
Computer Communications 31 (2), 266-279, 2008
272008
A practical encrypted microprocessor
PT Breuer, JP Bowen, E Palomar, Z Liu
ICETE 2016-Proceedings of the 13th International Joint Conference on e …, 2016
202016
The peer’s dilemma: A general framework to examine cooperation in pure peer-to-peer systems
E Palomar, A Alcaide, A Ribagorda, Y Zhang
Computer Networks 56 (17), 3756-3766, 2012
202012
Automatic rule generation based on genetic programming for event correlation
G Suarez-Tangil, E Palomar, JM de Fuentes, J Blasco, A Ribagorda
Computational Intelligence in Security for Information Systems, 127-134, 2009
192009
On obfuscating compilation for encrypted computing
PT Breuer, JP Bowen, E Palomar, Z Liu
ICETE 2017-Proceedings of the 14th International Joint Conference on e …, 2017
162017
Superscalar encrypted RISC: The measure of a secret computer
P Breuer, J Bowen, E Palomar, Z Liu
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
132018
Privacy preservation in location-based mobile applications: research directions
A Patel, E Palomar
2014 Ninth International Conference on Availability, Reliability and …, 2014
132014
A secure distance-based RFID identification protocol with an off-line back-end database
P Peris-Lopez, A Orfila, E Palomar, JC Hernandez-Castro
Personal and Ubiquitous Computing 16 (3), 351-365, 2012
132012
Component-based modelling for scalable smart city systems interoperability: A case study on integrating energy demand response systems
E Palomar, X Chen, Z Liu, S Maharjan, J Bowen
Sensors 16 (11), 1810, 2016
122016
Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management
E Palomar, L González-Manzano, A Alcaide, Á Galán
IET Information Security 10 (2), 60-68, 2016
122016
On security in encrypted computing
PT Breuer, JP Bowen, E Palomar, Z Liu
International Conference on Information and Communications Security, 192-211, 2018
112018
An experimental comparison of source location privacy methods for power optimization in WSNs
G Suarez-Tangil, E Palomar, B Ramos, A Ribagorda
Proceedings of the 3rd WSEAS international conference on Advances in sensors …, 2010
112010
Il sistema al momento non puň eseguire l'operazione. Riprova piů tardi.
Articoli 1–20