dblp.uni-trier.dewww.uni-trier.de

Miguel Soriano

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
52EEJoan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano: New Considerations about the Correct Design of Turbo Fingerprinting Codes. ESORICS 2008: 501-516
51 Victor Morales-Rocha, Jordi Puiggali, Miguel Soriano: Secure Remote Voter Registration. Electronic Voting 2008: 95-108
50EEJuan Hernández-Serrano, Josep Pegueroles, Miguel Soriano: Shared Self-Organized GKM Protocol for MANETs. J. Inf. Sci. Eng. 24(6): 1629-1646 (2008)
2007
49EELuis Zarza, Josep Pegueroles, Miguel Soriano: Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms. ARES 2007: 1207-1213
48EELuis Zarza, Josep Pegueroles, Miguel Soriano: Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms. DEXA Workshops 2007: 708-712
47EEJuan Hernández-Serrano, Josep Pegueroles, Miguel Soriano: Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm. ICCSA (2) 2007: 526-539
46EEMarcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo: A Note About the Traceability Properties of Linear Codes. ICISC 2007: 251-258
45EEJoan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano: Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems. KES (3) 2007: 992-999
44EEJuan Vera del Campo, Josep Pegueroles, Miguel Soriano: Providing Security Services in a Resource Discovery System. JNW 2(1): 48-59 (2007)
2006
43EEJuan Vera del Campo, Josep Pegueroles, Miguel Soriano: Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks. ARES 2006: 148-155
42EEJosep Pegueroles, Marcel Fernandez, Francisco Rico-Novella, Miguel Soriano: A Practical Solution for Distribution Rights Protection in Multicast Environments. ICCSA (3) 2006: 527-536
41 Luis Zarza, Josep Pegueroles, Miguel Soriano, Rafael Martínez: Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques. SECRYPT 2006: 316-319
40EEOscar Esparza, Jose L. Muñoz, Miguel Soriano, Jordi Forné: Secure brokerage mechanisms for mobile electronic commerce. Computer Communications 29(12): 2308-2321 (2006)
39EEMarcel Fernandez, Miguel Soriano, Josep Cotrina Navau: Obtaining Traceability Codes from Chinese Reminder Theorem Codes. IEICE Transactions 89-A(1): 227-230 (2006)
38EEOscar Esparza, Jose L. Muñoz, Miguel Soriano, Jordi Forné: Punishing Malicious Hosts with the Cryptographic Traces Approach. New Generation Comput. 24(4): (2006)
2005
37EEMiguel Soriano, Stephan Flake, Jürgen Tacken, Frank Bormann, Joan Tomas: Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms. DEXA Workshops 2005: 251-256
36EEMarcel Fernandez, Miguel Soriano, Josep Cotrina Navau: Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms. ICCSA (2) 2005: 527-536
35EEMarcel Fernandez, Miguel Soriano, Josep Cotrina Navau: Practical Scenarios for the Van Trung-Martirosyan Codes. ICCSA (2) 2005: 624-633
34EEMarcel Fernandez, Miguel Soriano, Josep Cotrina Navau: A New Class of Codes for Fingerprinting Schemes. ISPEC 2005: 398-409
33EEMarcel Fernandez, Miguel Soriano, Josep Cotrina Navau: Tracing Traitors by Guessing Secrets. The q-Ary Case. ISPEC 2005: 61-73
32EEMiguel Soriano, Marcel Fernandez, Josep Cotrina Navau: Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information. IWDW 2005: 231-243
31EEJosep Cotrina Navau, Marcel Fernandez, Miguel Soriano: A Family of Collusion 2-Secure Codes. Information Hiding 2005: 387-397
30EEJuan Hernández-Serrano, Josep Pegueroles, Miguel Soriano: Energy Efficiency of Load Balancing in MANET Routing Protocols. SNPD 2005: 476-483
29 Elisa Sayrol, Miguel Soriano, Marcel Fernandez, Joan Casanellas, Joan Tomas: Development of a platform offering video copyright protection and security against illegal distribution. Security, Steganography, and Watermarking of Multimedia Contents 2005: 76-83
28EEMiguel Soriano, Marcel Fernandez, Elisa Sayrol, Joan Tomas, Joan Casanellas, Josep Pegueroles, Juan Hernández-Serrano: Multimedia Copyright Protection Platform Demonstrator. iTrust 2005: 411-414
2004
27EEJose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano: CERVANTES - A Certificate Validation Test-Bed. EuroPKI 2004: 28-42
26EEMarcel Fernandez, Miguel Soriano: Identification of Traitors Using a Trellis. ICICS 2004: 211-222
25EEMarcel Fernandez, Miguel Soriano: Identification Algorithms for Sequential Traitor Tracing. INDOCRYPT 2004: 414-430
24EEMarcel Fernandez, Miguel Soriano: Efficient Recovery of Secrets. ITCC (2) 2004: 763-767
23EEJose L. Muñoz, Josep Pegueroles, Jordi Forné, Oscar Esparza, Miguel Soriano: Security Issues in Virtual Grid Environments. International Conference on Computational Science 2004: 174-178
22EEOscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné: Detecting and Proving Manipulation Attacks in Mobile Agent Systems. MATA 2004: 224-233
21EEMarcel Fernandez, Miguel Soriano: Soft-Decision Tracing in Fingerprinted Multimedia Content. IEEE MultiMedia 11(2): 38-46 (2004)
20EEJose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano: Certificate revocation system implementation based on the Merkle hash tree. Int. J. Inf. Sec. 2(2): 110-124 (2004)
2003
19EEJose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano: Using OCSP to Secure Certificate-Using Transactions in M-commerce. ACNS 2003: 280-292
18EEOscar Esparza, Marcel Fernandez, Miguel Soriano, Jose L. Muñoz, Jordi Forné: Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts. DEXA 2003: 927-936
17EEAntoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer, Miguel Soriano: Practical Asymmetric Fingerprinting with a TTP. DEXA Workshops 2003: 352-356
16EEJose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano, David Jodra: Evaluation of Revocation Systems with a JAVA Test-bed. DEXA Workshops 2003: 450-454
15EEMarcel Fernandez, Miguel Soriano: Protecting Intellectual Property by Guessing Secrets. EC-Web 2003: 196-205
14EEJosep Pegueroles, Wang Bin, Miguel Soriano, Francisco Rico-Novella: Group Rekeying Algorithm Using Pseudo-random Functions and Modular Reduction. GCC (1) 2003: 875-882
13EEOscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné: Protocols for Malicious Host Revocation. ICICS 2003: 191-201
12EEOscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné: Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts. ICWE 2003: 289-292
11EEJose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano: Implementation of an Efficient Authenticated Dictionary for Certificate Revocation. ISCC 2003: 238-243
10EEOscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné: A protocol for detecting malicious hosts based on limiting the execution time of mobile agents. ISCC 2003: 251-256
9EEOscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné: Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts. MATA 2003: 286-295
8EEJose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano: Efficient Offline Certificate Revocation. MIPS 2003: 319-330
7EEJose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano: A Certificate Status Checking Protocol for the Authenticated Dictionary. MMM-ACNS 2003: 255-266
6EEJose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano: E-MHT. An Efficient Protocol for Certificate Status Checking. WISA 2003: 410-424
2002
5EEMarcel Fernandez, Miguel Soriano: Efficient Identification of Traitors in Fingerprinted Multimedia Contents. DEXA Workshops 2002: 463-467
4EEMarcel Fernandez, Miguel Soriano: Fingerprinting Concatenated Codes with Efficient Identification. ISC 2002: 459-470
3EEMarcel Fernandez, Miguel Soriano: Decoding codes with the identifiable parent property. ISCC 2002: 1028-1033
1993
2EEMiguel Soriano, Jordi Forné, Francisco Recacha, José L. Melús: A Particular Solution to Provide Secure Communications in an Ethernet Environment. ACM Conference on Computer and Communications Security 1993: 17-25
1 Francisco Recacha, José L. Melús, X. Simón, Miguel Soriano, Jordi Forné: Secure Data Transmission in Extended Ethernet Environments. IEEE Journal on Selected Areas in Communications 11(5): 794-803 (1993)

Coauthor Index

1Wang Bin [14]
2Frank Bormann [37]
3Juan Vera del Campo [43] [44]
4Joan Casanellas [28] [29]
5Neus Domingo [46]
6Josep Domingo-Ferrer [17]
7Oscar Esparza [6] [7] [8] [9] [10] [11] [12] [13] [16] [18] [19] [20] [22] [23] [27] [38] [40]
8Marcel Fernandez [3] [4] [5] [15] [18] [21] [24] [25] [26] [28] [29] [31] [32] [33] [34] [35] [36] [39] [42] [45] [46] [52]
9Stephan Flake [37]
10Jordi Forné [1] [2] [6] [7] [8] [9] [10] [11] [12] [13] [16] [18] [19] [20] [22] [23] [27] [38] [40]
11Juan Hernández-Serrano [28] [30] [47] [50]
12David Jodra [16]
13Rafael Martínez [41]
14Antoni Martínez-Ballesté [17]
15José L. Melús [1] [2]
16Victor Morales-Rocha [51]
17Jose L. Muñoz [6] [7] [8] [9] [10] [11] [12] [13] [16] [18] [19] [20] [22] [23] [27] [38] [40]
18Josep Cotrina Navau [31] [32] [33] [34] [35] [36] [39] [46]
19Josep Pegueroles [14] [23] [28] [30] [41] [42] [43] [44] [47] [48] [49] [50]
20Jordi Puiggali [51]
21Francisco Recacha [1] [2]
22Francisco Rico-Novella [14] [42]
23Elisa Sayrol [28] [29]
24Francesc Sebé [17]
25X. Simón [1]
26Jürgen Tacken [37]
27Joan Tomas [28] [29] [37]
28Joan Tomàs-Buliart [45] [52]
29Luis Zarza [41] [48] [49]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)