Rolando Trujillo Rasúa
Rolando Trujillo Rasúa
Lecturer at Deakin University
Verifierad e-postadress på deakin.edu.au - Startsida
TitelCiteras avÅr
Microaggregation-and permutation-based anonymization of movement data
J Domingo-Ferrer, R Trujillo-Rasua
Information Sciences 208, 55-80, 2012
652012
The Poulidor distance-bounding protocol
R Trujillo-Rasua, B Martin, G Avoine
International Workshop on Radio Frequency Identification: Security and …, 2010
612010
Attack trees with sequential conjunction
R Jhawar, B Kordy, S Mauw, S Radomirović, R Trujillo-Rasua
IFIP International Information Security and Privacy Conference, 339-353, 2015
532015
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation
A Fernandez-Mir, R Trujillo-Rasua, J Castellà-Roca, J Domingo-Ferrer
International Workshop on Radio Frequency Identification: Security and …, 2011
362011
Privacy-preserving publication of trajectories using microaggregation
J Domingo-Ferrer, M Sramka, R Trujillo-Rasúa
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and …, 2010
342010
On the privacy offered by (k, δ)-anonymity
R Trujillo-Rasua, J Domingo-Ferrer
Information Systems 38 (4), 491-494, 2013
332013
Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0
O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua
International Conference on Quantitative Evaluation of Systems, 159-162, 2016
282016
k-metric antidimension: A privacy measure for social graphs
R Trujillo-Rasua, IG Yero
Information Sciences 328, 403-417, 2016
202016
Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study
M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua
IFIP Working Conference on The Practice of Enterprise Modeling, 326-334, 2016
192016
Distance bounding facing both mafia and distance frauds
R Trujillo-Rasua, B Martin, G Avoine
IEEE Transactions on Wireless Communications 13 (10), 5690-5698, 2014
162014
Distance-bounding protocols: Verification without time and location
S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua
2018 IEEE Symposium on Security and Privacy (SP), 549-566, 2018
142018
Predictive protocol for the scalable identification of RFID tags through collaborative readers
R Trujillo-Rasua, A Solanas, PA Pérez-Martínez, J Domingo-Ferrer
Computers in Industry 63 (6), 557-573, 2012
142012
Gildas Avoine, The Poulidor distance-bounding protocol
R Trujillo-Rasua, B Martin
Proceedings of the 6th international conference on Radio frequency …, 2010
142010
Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers
R Trujillo-Rasua, A Solanas
Computer Networks 55 (15), 3211-3223, 2011
122011
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, G Hancke, S Kardaş, CH Kim, ...
ACM Computing Surveys (CSUR) 51 (5), 94, 2019
112019
Comparing distance bounding protocols: A critical mission supported by decision theory
G Avoine, S Mauw, R Trujillo-Rasua
Computer Communications 67, 92-102, 2015
112015
Counteracting active attacks in social network graphs
S Mauw, R Trujillo-Rasua, B Xuan
IFIP Annual Conference on Data and Applications Security and Privacy, 233-248, 2016
92016
A class of precomputation-based distance-bounding protocols
S Mauw, J Toro-Pozo, R Trujillo-Rasua
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 97-111, 2016
92016
Scalable trajectory-based protocol for RFID tags identification
R Trujillo-Rasua, A Solanas
2011 IEEE International Conference on RFID-Technologies and Applications …, 2011
92011
Refinement-aware generation of attack trees
O Gadyatskaya, R Jhawar, S Mauw, R Trujillo-Rasua, TAC Willemse
International Workshop on Security and Trust Management, 164-179, 2017
72017
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20