2008 | ||
---|---|---|
52 | EE | Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano: New Considerations about the Correct Design of Turbo Fingerprinting Codes. ESORICS 2008: 501-516 |
51 | Victor Morales-Rocha, Jordi Puiggali, Miguel Soriano: Secure Remote Voter Registration. Electronic Voting 2008: 95-108 | |
50 | EE | Juan Hernández-Serrano, Josep Pegueroles, Miguel Soriano: Shared Self-Organized GKM Protocol for MANETs. J. Inf. Sci. Eng. 24(6): 1629-1646 (2008) |
2007 | ||
49 | EE | Luis Zarza, Josep Pegueroles, Miguel Soriano: Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms. ARES 2007: 1207-1213 |
48 | EE | Luis Zarza, Josep Pegueroles, Miguel Soriano: Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms. DEXA Workshops 2007: 708-712 |
47 | EE | Juan Hernández-Serrano, Josep Pegueroles, Miguel Soriano: Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm. ICCSA (2) 2007: 526-539 |
46 | EE | Marcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo: A Note About the Traceability Properties of Linear Codes. ICISC 2007: 251-258 |
45 | EE | Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano: Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems. KES (3) 2007: 992-999 |
44 | EE | Juan Vera del Campo, Josep Pegueroles, Miguel Soriano: Providing Security Services in a Resource Discovery System. JNW 2(1): 48-59 (2007) |
2006 | ||
43 | EE | Juan Vera del Campo, Josep Pegueroles, Miguel Soriano: Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks. ARES 2006: 148-155 |
42 | EE | Josep Pegueroles, Marcel Fernandez, Francisco Rico-Novella, Miguel Soriano: A Practical Solution for Distribution Rights Protection in Multicast Environments. ICCSA (3) 2006: 527-536 |
41 | Luis Zarza, Josep Pegueroles, Miguel Soriano, Rafael Martínez: Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques. SECRYPT 2006: 316-319 | |
40 | EE | Oscar Esparza, Jose L. Muñoz, Miguel Soriano, Jordi Forné: Secure brokerage mechanisms for mobile electronic commerce. Computer Communications 29(12): 2308-2321 (2006) |
39 | EE | Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau: Obtaining Traceability Codes from Chinese Reminder Theorem Codes. IEICE Transactions 89-A(1): 227-230 (2006) |
38 | EE | Oscar Esparza, Jose L. Muñoz, Miguel Soriano, Jordi Forné: Punishing Malicious Hosts with the Cryptographic Traces Approach. New Generation Comput. 24(4): (2006) |
2005 | ||
37 | EE | Miguel Soriano, Stephan Flake, Jürgen Tacken, Frank Bormann, Joan Tomas: Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms. DEXA Workshops 2005: 251-256 |
36 | EE | Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau: Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms. ICCSA (2) 2005: 527-536 |
35 | EE | Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau: Practical Scenarios for the Van Trung-Martirosyan Codes. ICCSA (2) 2005: 624-633 |
34 | EE | Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau: A New Class of Codes for Fingerprinting Schemes. ISPEC 2005: 398-409 |
33 | EE | Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau: Tracing Traitors by Guessing Secrets. The q-Ary Case. ISPEC 2005: 61-73 |
32 | EE | Miguel Soriano, Marcel Fernandez, Josep Cotrina Navau: Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information. IWDW 2005: 231-243 |
31 | EE | Josep Cotrina Navau, Marcel Fernandez, Miguel Soriano: A Family of Collusion 2-Secure Codes. Information Hiding 2005: 387-397 |
30 | EE | Juan Hernández-Serrano, Josep Pegueroles, Miguel Soriano: Energy Efficiency of Load Balancing in MANET Routing Protocols. SNPD 2005: 476-483 |
29 | Elisa Sayrol, Miguel Soriano, Marcel Fernandez, Joan Casanellas, Joan Tomas: Development of a platform offering video copyright protection and security against illegal distribution. Security, Steganography, and Watermarking of Multimedia Contents 2005: 76-83 | |
28 | EE | Miguel Soriano, Marcel Fernandez, Elisa Sayrol, Joan Tomas, Joan Casanellas, Josep Pegueroles, Juan Hernández-Serrano: Multimedia Copyright Protection Platform Demonstrator. iTrust 2005: 411-414 |
2004 | ||
27 | EE | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano: CERVANTES - A Certificate Validation Test-Bed. EuroPKI 2004: 28-42 |
26 | EE | Marcel Fernandez, Miguel Soriano: Identification of Traitors Using a Trellis. ICICS 2004: 211-222 |
25 | EE | Marcel Fernandez, Miguel Soriano: Identification Algorithms for Sequential Traitor Tracing. INDOCRYPT 2004: 414-430 |
24 | EE | Marcel Fernandez, Miguel Soriano: Efficient Recovery of Secrets. ITCC (2) 2004: 763-767 |
23 | EE | Jose L. Muñoz, Josep Pegueroles, Jordi Forné, Oscar Esparza, Miguel Soriano: Security Issues in Virtual Grid Environments. International Conference on Computational Science 2004: 174-178 |
22 | EE | Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné: Detecting and Proving Manipulation Attacks in Mobile Agent Systems. MATA 2004: 224-233 |
21 | EE | Marcel Fernandez, Miguel Soriano: Soft-Decision Tracing in Fingerprinted Multimedia Content. IEEE MultiMedia 11(2): 38-46 (2004) |
20 | EE | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano: Certificate revocation system implementation based on the Merkle hash tree. Int. J. Inf. Sec. 2(2): 110-124 (2004) |
2003 | ||
19 | EE | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano: Using OCSP to Secure Certificate-Using Transactions in M-commerce. ACNS 2003: 280-292 |
18 | EE | Oscar Esparza, Marcel Fernandez, Miguel Soriano, Jose L. Muñoz, Jordi Forné: Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts. DEXA 2003: 927-936 |
17 | EE | Antoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer, Miguel Soriano: Practical Asymmetric Fingerprinting with a TTP. DEXA Workshops 2003: 352-356 |
16 | EE | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano, David Jodra: Evaluation of Revocation Systems with a JAVA Test-bed. DEXA Workshops 2003: 450-454 |
15 | EE | Marcel Fernandez, Miguel Soriano: Protecting Intellectual Property by Guessing Secrets. EC-Web 2003: 196-205 |
14 | EE | Josep Pegueroles, Wang Bin, Miguel Soriano, Francisco Rico-Novella: Group Rekeying Algorithm Using Pseudo-random Functions and Modular Reduction. GCC (1) 2003: 875-882 |
13 | EE | Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné: Protocols for Malicious Host Revocation. ICICS 2003: 191-201 |
12 | EE | Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné: Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts. ICWE 2003: 289-292 |
11 | EE | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano: Implementation of an Efficient Authenticated Dictionary for Certificate Revocation. ISCC 2003: 238-243 |
10 | EE | Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné: A protocol for detecting malicious hosts based on limiting the execution time of mobile agents. ISCC 2003: 251-256 |
9 | EE | Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné: Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts. MATA 2003: 286-295 |
8 | EE | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano: Efficient Offline Certificate Revocation. MIPS 2003: 319-330 |
7 | EE | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano: A Certificate Status Checking Protocol for the Authenticated Dictionary. MMM-ACNS 2003: 255-266 |
6 | EE | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano: E-MHT. An Efficient Protocol for Certificate Status Checking. WISA 2003: 410-424 |
2002 | ||
5 | EE | Marcel Fernandez, Miguel Soriano: Efficient Identification of Traitors in Fingerprinted Multimedia Contents. DEXA Workshops 2002: 463-467 |
4 | EE | Marcel Fernandez, Miguel Soriano: Fingerprinting Concatenated Codes with Efficient Identification. ISC 2002: 459-470 |
3 | EE | Marcel Fernandez, Miguel Soriano: Decoding codes with the identifiable parent property. ISCC 2002: 1028-1033 |
1993 | ||
2 | EE | Miguel Soriano, Jordi Forné, Francisco Recacha, José L. Melús: A Particular Solution to Provide Secure Communications in an Ethernet Environment. ACM Conference on Computer and Communications Security 1993: 17-25 |
1 | Francisco Recacha, José L. Melús, X. Simón, Miguel Soriano, Jordi Forné: Secure Data Transmission in Extended Ethernet Environments. IEEE Journal on Selected Areas in Communications 11(5): 794-803 (1993) |