dblp.uni-trier.dewww.uni-trier.de

Arturo Ribagorda

Arturo Ribagorda Garnacho

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
54EEAgustín Orfila, Juan M. Estévez-Tapiador, Arturo Ribagorda: Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming. EvoWorkshops 2009: 93-98
53EEPedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. J. Inf. Sci. Eng. 25(1): 33-57 (2009)
2008
52EEJosé María de Fuentes, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda: CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies. ARES 2008: 363-368
51EEJulio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol. MCO 2008: 589-596
50EEAlmudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: Nature-Inspired Synthesis of Rational Protocols. PPSN 2008: 981-990
49EEPedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. WISA 2008: 56-68
48EEJuan M. Estévez-Tapiador, Almudena Alcaide, Julio César Hernández Castro, Arturo Ribagorda: Cryptanalysis of the RSA-CEGD protocol CoRR abs/0812.0686: (2008)
47EEEsther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: Secure content access and replication in pure P2P networks. Computer Communications 31(2): 266-279 (2008)
46EEAgustín Orfila, Javier Carbó, Arturo Ribagorda: Autonomous decision on intrusion detection with trained BDI agents. Computer Communications 31(9): 1803-1813 (2008)
45EEAna Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez, Arturo Ribagorda Garnacho: Guaranteeing the Authenticity of Location Information. IEEE Pervasive Computing 7(3): 72-80 (2008)
44EEJuan M. Estévez-Tapiador, Julio César Hernández Castro, Almudena Alcaide, Arturo Ribagorda: On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Transactions on Information Forensics and Security 3(2): 166-172 (2008)
43EEJuan M. Estévez-Tapiador, Almudena Alcaide, Julio César Hernández Castro, Arturo Ribagorda: Bayesian rational exchange. Int. J. Inf. Sec. 7(1): 85-100 (2008)
42EEJuan M. Estévez-Tapiador, Julio César Hernández Castro, Pedro Peris-Lopez, Arturo Ribagorda: Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. J. Inf. Sci. Eng. 24(5): 1485-1504 (2008)
41EEJavier Polimón, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: Automated design of a lightweight block cipher with Genetic Programming. KES Journal 12(1): 3-14 (2008)
2007
40EEEsther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security. DEXA Workshops 2007: 779-783
39EEPedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. EUC Workshops 2007: 781-794
38EEAna Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez, Arturo Ribagorda Garnacho: Spatial-Temporal Certification Framework and Extension of X.509 Attribute Certificate Framework and SAML Standard to Support Spatial-Temporal Certificates. EuroPKI 2007: 321-329
37EEAlmudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: A Multi-party Rational Exchange Protocol. OTM Workshops (1) 2007: 42-43
36EEAlmudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: Towards Automated Design of Multi-party Rational Exchange Security Protocols. Web Intelligence/IAT Workshops 2007: 387-390
2006
35EEEsther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: A Protocol for Secure Content Distribution in Pure P2P Networks. DEXA Workshops 2006: 712-716
34EEAlmudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information. ETRICS 2006: 396-408
33EEEsther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: A P2P Content Authentication Protocol Based on Byzantine Agreement. ETRICS 2006: 60-72
32EEEsther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: Security in P2P Networks: Survey and Research Directions. EUC Workshops 2006: 183-192
31EECésar Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi: Evolving hash functions by means of genetic programming. GECCO 2006: 1861-1862
30EEAgustín Orfila, Javier Carbó, Arturo Ribagorda: Effectiveness Evaluation of Data Mining Based IDS. Industrial Conference on Data Mining 2006: 377-388
29EEPedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. OTM Workshops (1) 2006: 352-361
28EEHugo A. Mitre, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda: A Legal Ontology to Support Privacy Preservation in Location-Based Services. OTM Workshops (2) 2006: 1755-1764
27EECésar Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi Viñuela: Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming. PPSN 2006: 818-827
26EECarlos Lamenca-Martinez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: Lamar: A New Pseudorandom Number Generator Evolved by Means of Genetic Programming. PPSN 2006: 850-859
25EEPedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: RFID Systems: A Survey on Security Threats and Proposed Solutions. PWC 2006: 159-170
24EEEsther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: Certificate-based Access Control in Pure P2P Networks. Peer-to-Peer Computing 2006: 177-184
23EEPedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. UIC 2006: 912-923
22EEJoaquín Torres Márquez, Antonio Izquierdo, José María Sierra, Arturo Ribagorda: Towards self-authenticable smart cards. Computer Communications 29(15): 2781-2787 (2006)
21EEJulio César Hernández Castro, Ignacio Blasco-Lopez, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho: Steganography in games: A general methodology and its application to the game of Go. Computers & Security 25(1): 64-71 (2006)
2005
20EEAna Isabel González-Tablas Ferreres, L. M. Salas, Benjamín Ramos, Arturo Ribagorda: Providing Personalization and Automation to Spatial-Temporal Stamping Services. DEXA Workshops 2005: 219-225
19EEAna Isabel González-Tablas Ferreres, K. Kursawe, Benjamín Ramos, Arturo Ribagorda: Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services. EUC Workshops 2005: 797-806
18EEJoaquín Torres Márquez, Antonio Izquierdo, Arturo Ribagorda, Almudena Alcaide: Secure Electronic Payments in Heterogeneous Networking: New Authentication Protocols Approach. ICCSA (3) 2005: 729-738
17EEAgustín Orfila, Javier Carbó, Arturo Ribagorda: Intrusion Detection Effectiveness Improvement by a Multiagent System. IJCSA 2(1): 1-6 (2005)
16EEJulio César Hernández Castro, José María Sierra, André Seznec, Antonio Izquierdo, Arturo Ribagorda: The strict avalanche criterion randomness test. Mathematics and Computers in Simulation 68(1): 1-7 (2005)
2004
15EEAntonio Izquierdo, José María Sierra, Julio César Hernández Castro, Arturo Ribagorda: Security Issues in Network File Systems. ICCSA (1) 2004: 812-820
14 José María Sierra, Julio César Hernández Castro, Antonio Izquierdo, Arturo Ribagorda: Secure Communications in Multi-Agent Systems Protecting KQML. WOSIS 2004: 305-313
13EEJosé María Sierra, Julio César Hernández Castro, Narayana Jayaram, Arturo Ribagorda: Low computational cost integrity for block ciphers. Future Generation Comp. Syst. 20(5): 857-863 (2004)
12EEJulio César Hernández Castro, José María Sierra, Arturo Ribagorda: Beware of the Security Software. Information Systems Security 12(6): 39-45 (2004)
2003
11EEAna Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda: Path-Stamps: A Proposal for Enhancing Security of Location Tracking Applications. CAiSE Workshops 2003
10EEJavier Carbo Rubiera, Agustín Orfila, Arturo Ribagorda: Adaptive Agents Applied to Intrusion Detection. CEEMAS 2003: 445-453
9EEJosé María Sierra, Julio César Hernández Castro, Eva Ponce, Arturo Ribagorda: Protection of Multiagent Systems. ICCSA (3) 2003: 123-128
2002
8 Ana Isabel González-Tablas Ferreres, Elena Castro, Arturo Ribagorda, Manuel Velasco: A Secure Perspective of Data. Including Authentication in the NewsML DTD. ICWI 2002: 791-794
7EEJulio César Hernández Castro, José María Sierra, Pedro Isasi, Arturo Ribagorda: Genetic Cryptoanalysis of Two Rounds TEA. International Conference on Computational Science (3) 2002: 1024-1031
6EEKarel Wouters, Bart Preneel, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda: Towards an XML format for time-stamps. XML Security 2002: 61-70
2001
5EEJulio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos, J. Carlos Mex-Perera: Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers. IMA Int. Conf. 2001: 374-377
4 Julio César Hernández Castro, Eva María Cebrián, José María Sierra, Arturo Ribagorda, Benjamín Ramos: Project WebOracle: Developing an advanced web server security assesment tool. WebNet 2001: 526-529
3 Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos: Search Engines as a security thread. WebNet 2001: 530-533
2EEJulio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos: Search Engines as a Security Threat. IEEE Computer 34(10): 25-30 (2001)
1993
1EEJ. Fernández-González, Gordon B. Agnew, Arturo Ribagorda: Encryption and error correction codes for reliable file storage. Computers & Security 12(5): 501-510 (1993)

Coauthor Index

1Gordon B. Agnew [1]
2Almudena Alcaide [18] [34] [36] [37] [43] [44] [48] [50]
3Ignacio Blasco-Lopez [21]
4Javier Carbó [17] [30] [46]
5Elena Castro (Elena Castro Galán) [8]
6Julio César Hernández Castro [2] [3] [4] [5] [7] [9] [12] [13] [14] [15] [16] [21] [23] [24] [25] [26] [27] [29] [31] [32] [33] [34] [35] [36] [37] [39] [40] [41] [42] [43] [44] [47] [48] [49] [50] [51] [53]
7Eva María Cebrián [4]
8César Estébanez [27] [31]
9Juan M. Estévez-Tapiador [21] [23] [24] [25] [26] [29] [32] [33] [34] [35] [36] [37] [39] [40] [41] [42] [43] [44] [47] [48] [49] [50] [51] [53] [54]
10J. Fernández-González [1]
11Ana Isabel González-Tablas Ferreres [6] [8] [11] [19] [20] [28] [38] [45] [52]
12José María de Fuentes [52]
13Antonio Izquierdo [14] [15] [16] [18] [22]
14Narayana Jayaram [13]
15K. Kursawe [19]
16Carlos Lamenca-Martinez [26]
17Joaquín Torres Márquez [18] [22]
18J. Carlos Mex-Perera [5]
19Hugo A. Mitre [28]
20Agustín Orfila [10] [17] [30] [46] [54]
21Esther Palomar [24] [32] [33] [35] [40] [47]
22Pedro Peris-Lopez [23] [25] [29] [39] [42] [49] [53]
23Javier Polimón [41]
24Eva Ponce [9]
25Bart Preneel [6]
26Benjamín Ramos (Benjamín Ramos Álvarez) [2] [3] [4] [5] [11] [19] [20] [28] [38] [45]
27Javier Ignacio Carbó Rubiera (Javier Carbo Rubiera) [10]
28L. M. Salas [20]
29André Seznec [16]
30José María Sierra [2] [3] [4] [5] [7] [9] [12] [13] [14] [15] [16] [22]
31Manuel Velasco [8]
32Pedro Isasi Viñuela (Pedro Isasi) [7] [27] [31]
33Karel Wouters [6]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)