2008 |
52 | EE | Joan Tomàs-Buliart,
Marcel Fernandez,
Miguel Soriano:
New Considerations about the Correct Design of Turbo Fingerprinting Codes.
ESORICS 2008: 501-516 |
51 | | Victor Morales-Rocha,
Jordi Puiggali,
Miguel Soriano:
Secure Remote Voter Registration.
Electronic Voting 2008: 95-108 |
50 | EE | Juan Hernández-Serrano,
Josep Pegueroles,
Miguel Soriano:
Shared Self-Organized GKM Protocol for MANETs.
J. Inf. Sci. Eng. 24(6): 1629-1646 (2008) |
2007 |
49 | EE | Luis Zarza,
Josep Pegueroles,
Miguel Soriano:
Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms.
ARES 2007: 1207-1213 |
48 | EE | Luis Zarza,
Josep Pegueroles,
Miguel Soriano:
Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms.
DEXA Workshops 2007: 708-712 |
47 | EE | Juan Hernández-Serrano,
Josep Pegueroles,
Miguel Soriano:
Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm.
ICCSA (2) 2007: 526-539 |
46 | EE | Marcel Fernandez,
Josep Cotrina Navau,
Miguel Soriano,
Neus Domingo:
A Note About the Traceability Properties of Linear Codes.
ICISC 2007: 251-258 |
45 | EE | Joan Tomàs-Buliart,
Marcel Fernandez,
Miguel Soriano:
Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems.
KES (3) 2007: 992-999 |
44 | EE | Juan Vera del Campo,
Josep Pegueroles,
Miguel Soriano:
Providing Security Services in a Resource Discovery System.
JNW 2(1): 48-59 (2007) |
2006 |
43 | EE | Juan Vera del Campo,
Josep Pegueroles,
Miguel Soriano:
Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks.
ARES 2006: 148-155 |
42 | EE | Josep Pegueroles,
Marcel Fernandez,
Francisco Rico-Novella,
Miguel Soriano:
A Practical Solution for Distribution Rights Protection in Multicast Environments.
ICCSA (3) 2006: 527-536 |
41 | | Luis Zarza,
Josep Pegueroles,
Miguel Soriano,
Rafael Martínez:
Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques.
SECRYPT 2006: 316-319 |
40 | EE | Oscar Esparza,
Jose L. Muñoz,
Miguel Soriano,
Jordi Forné:
Secure brokerage mechanisms for mobile electronic commerce.
Computer Communications 29(12): 2308-2321 (2006) |
39 | EE | Marcel Fernandez,
Miguel Soriano,
Josep Cotrina Navau:
Obtaining Traceability Codes from Chinese Reminder Theorem Codes.
IEICE Transactions 89-A(1): 227-230 (2006) |
38 | EE | Oscar Esparza,
Jose L. Muñoz,
Miguel Soriano,
Jordi Forné:
Punishing Malicious Hosts with the Cryptographic Traces Approach.
New Generation Comput. 24(4): (2006) |
2005 |
37 | EE | Miguel Soriano,
Stephan Flake,
Jürgen Tacken,
Frank Bormann,
Joan Tomas:
Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms.
DEXA Workshops 2005: 251-256 |
36 | EE | Marcel Fernandez,
Miguel Soriano,
Josep Cotrina Navau:
Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms.
ICCSA (2) 2005: 527-536 |
35 | EE | Marcel Fernandez,
Miguel Soriano,
Josep Cotrina Navau:
Practical Scenarios for the Van Trung-Martirosyan Codes.
ICCSA (2) 2005: 624-633 |
34 | EE | Marcel Fernandez,
Miguel Soriano,
Josep Cotrina Navau:
A New Class of Codes for Fingerprinting Schemes.
ISPEC 2005: 398-409 |
33 | EE | Marcel Fernandez,
Miguel Soriano,
Josep Cotrina Navau:
Tracing Traitors by Guessing Secrets. The q-Ary Case.
ISPEC 2005: 61-73 |
32 | EE | Miguel Soriano,
Marcel Fernandez,
Josep Cotrina Navau:
Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information.
IWDW 2005: 231-243 |
31 | EE | Josep Cotrina Navau,
Marcel Fernandez,
Miguel Soriano:
A Family of Collusion 2-Secure Codes.
Information Hiding 2005: 387-397 |
30 | EE | Juan Hernández-Serrano,
Josep Pegueroles,
Miguel Soriano:
Energy Efficiency of Load Balancing in MANET Routing Protocols.
SNPD 2005: 476-483 |
29 | | Elisa Sayrol,
Miguel Soriano,
Marcel Fernandez,
Joan Casanellas,
Joan Tomas:
Development of a platform offering video copyright protection and security against illegal distribution.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 76-83 |
28 | EE | Miguel Soriano,
Marcel Fernandez,
Elisa Sayrol,
Joan Tomas,
Joan Casanellas,
Josep Pegueroles,
Juan Hernández-Serrano:
Multimedia Copyright Protection Platform Demonstrator.
iTrust 2005: 411-414 |
2004 |
27 | EE | Jose L. Muñoz,
Jordi Forné,
Oscar Esparza,
Miguel Soriano:
CERVANTES - A Certificate Validation Test-Bed.
EuroPKI 2004: 28-42 |
26 | EE | Marcel Fernandez,
Miguel Soriano:
Identification of Traitors Using a Trellis.
ICICS 2004: 211-222 |
25 | EE | Marcel Fernandez,
Miguel Soriano:
Identification Algorithms for Sequential Traitor Tracing.
INDOCRYPT 2004: 414-430 |
24 | EE | Marcel Fernandez,
Miguel Soriano:
Efficient Recovery of Secrets.
ITCC (2) 2004: 763-767 |
23 | EE | Jose L. Muñoz,
Josep Pegueroles,
Jordi Forné,
Oscar Esparza,
Miguel Soriano:
Security Issues in Virtual Grid Environments.
International Conference on Computational Science 2004: 174-178 |
22 | EE | Oscar Esparza,
Miguel Soriano,
Jose L. Muñoz,
Jordi Forné:
Detecting and Proving Manipulation Attacks in Mobile Agent Systems.
MATA 2004: 224-233 |
21 | EE | Marcel Fernandez,
Miguel Soriano:
Soft-Decision Tracing in Fingerprinted Multimedia Content.
IEEE MultiMedia 11(2): 38-46 (2004) |
20 | EE | Jose L. Muñoz,
Jordi Forné,
Oscar Esparza,
Miguel Soriano:
Certificate revocation system implementation based on the Merkle hash tree.
Int. J. Inf. Sec. 2(2): 110-124 (2004) |
2003 |
19 | EE | Jose L. Muñoz,
Jordi Forné,
Oscar Esparza,
Miguel Soriano:
Using OCSP to Secure Certificate-Using Transactions in M-commerce.
ACNS 2003: 280-292 |
18 | EE | Oscar Esparza,
Marcel Fernandez,
Miguel Soriano,
Jose L. Muñoz,
Jordi Forné:
Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts.
DEXA 2003: 927-936 |
17 | EE | Antoni Martínez-Ballesté,
Francesc Sebé,
Josep Domingo-Ferrer,
Miguel Soriano:
Practical Asymmetric Fingerprinting with a TTP.
DEXA Workshops 2003: 352-356 |
16 | EE | Jose L. Muñoz,
Jordi Forné,
Oscar Esparza,
Miguel Soriano,
David Jodra:
Evaluation of Revocation Systems with a JAVA Test-bed.
DEXA Workshops 2003: 450-454 |
15 | EE | Marcel Fernandez,
Miguel Soriano:
Protecting Intellectual Property by Guessing Secrets.
EC-Web 2003: 196-205 |
14 | EE | Josep Pegueroles,
Wang Bin,
Miguel Soriano,
Francisco Rico-Novella:
Group Rekeying Algorithm Using Pseudo-random Functions and Modular Reduction.
GCC (1) 2003: 875-882 |
13 | EE | Oscar Esparza,
Miguel Soriano,
Jose L. Muñoz,
Jordi Forné:
Protocols for Malicious Host Revocation.
ICICS 2003: 191-201 |
12 | EE | Oscar Esparza,
Miguel Soriano,
Jose L. Muñoz,
Jordi Forné:
Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts.
ICWE 2003: 289-292 |
11 | EE | Jose L. Muñoz,
Jordi Forné,
Oscar Esparza,
Miguel Soriano:
Implementation of an Efficient Authenticated Dictionary for Certificate Revocation.
ISCC 2003: 238-243 |
10 | EE | Oscar Esparza,
Miguel Soriano,
Jose L. Muñoz,
Jordi Forné:
A protocol for detecting malicious hosts based on limiting the execution time of mobile agents.
ISCC 2003: 251-256 |
9 | EE | Oscar Esparza,
Miguel Soriano,
Jose L. Muñoz,
Jordi Forné:
Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts.
MATA 2003: 286-295 |
8 | EE | Jose L. Muñoz,
Jordi Forné,
Oscar Esparza,
Miguel Soriano:
Efficient Offline Certificate Revocation.
MIPS 2003: 319-330 |
7 | EE | Jose L. Muñoz,
Jordi Forné,
Oscar Esparza,
Miguel Soriano:
A Certificate Status Checking Protocol for the Authenticated Dictionary.
MMM-ACNS 2003: 255-266 |
6 | EE | Jose L. Muñoz,
Jordi Forné,
Oscar Esparza,
Miguel Soriano:
E-MHT. An Efficient Protocol for Certificate Status Checking.
WISA 2003: 410-424 |
2002 |
5 | EE | Marcel Fernandez,
Miguel Soriano:
Efficient Identification of Traitors in Fingerprinted Multimedia Contents.
DEXA Workshops 2002: 463-467 |
4 | EE | Marcel Fernandez,
Miguel Soriano:
Fingerprinting Concatenated Codes with Efficient Identification.
ISC 2002: 459-470 |
3 | EE | Marcel Fernandez,
Miguel Soriano:
Decoding codes with the identifiable parent property.
ISCC 2002: 1028-1033 |
1993 |
2 | EE | Miguel Soriano,
Jordi Forné,
Francisco Recacha,
José L. Melús:
A Particular Solution to Provide Secure Communications in an Ethernet Environment.
ACM Conference on Computer and Communications Security 1993: 17-25 |
1 | | Francisco Recacha,
José L. Melús,
X. Simón,
Miguel Soriano,
Jordi Forné:
Secure Data Transmission in Extended Ethernet Environments.
IEEE Journal on Selected Areas in Communications 11(5): 794-803 (1993) |