2008 |
13 | EE | David Galindo,
Rodrigo Roman,
Javier Lopez:
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks.
CANS 2008: 120-132 |
2007 |
12 | EE | Rodrigo Roman,
M. Carmen Fernández Gago,
Javier Lopez:
Featuring trust and reputation management systems for constrained hardware devices.
Autonomics 2007: 6 |
11 | EE | Rodrigo Roman,
Cristina Alcaraz:
Applicability of Public Key Infrastructures in Wireless Sensor Networks.
EuroPKI 2007: 313-320 |
10 | EE | Javier Lopez,
Cristina Alcaraz,
Rodrigo Roman:
On the Protection and Technologies of Critical Information Infrastructures.
FOSAD 2007: 160-182 |
9 | EE | Rodrigo Roman,
Cristina Alcaraz,
Javier Lopez:
A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes.
MONET 12(4): 231-244 (2007) |
8 | EE | Jose Antonio Onieva,
Javier Lopez,
Rodrigo Roman,
Jianying Zhou,
Stefanos Gritzalis:
Integration of non-repudiation services in mobile DRM scenarios.
Telecommunication Systems 35(3-4): 161-176 (2007) |
2006 |
7 | EE | Cristina Alcaraz,
Rodrigo Roman:
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios.
CRITIS 2006: 166-178 |
6 | EE | Javier Lopez,
José A. Montenegro,
Rodrigo Roman:
Service-Oriented Security Architecture for CII based on Sensor Networks.
SecPerU 2006: 1-6 |
5 | EE | Rodrigo Roman,
Jianying Zhou,
Javier Lopez:
An anti-spam scheme using pre-challenges.
Computer Communications 29(15): 2739-2749 (2006) |
2005 |
4 | EE | Rodrigo Roman,
Jianying Zhou,
Javier Lopez:
On the Security of Wireless Sensor Networks.
ICCSA (3) 2005: 681-690 |
3 | | Rodrigo Roman,
Jianying Zhou,
Javier Lopez:
Protection Against Spam Using Pre-Challenges.
SEC 2005: 281-294 |
2 | | Rodrigo Roman,
Javier Lopez,
Jianying Zhou:
Casual virtual private network.
Comput. Syst. Sci. Eng. 20(3): (2005) |
2002 |
1 | EE | Javier Lopez,
José A. Montenegro,
Rodrigo Roman,
Jorge Davila:
Design of a VPN Software Solution Integrating TCP and UDP Services.
InfraSec 2002: 325-338 |