sample of publications
-
articles
- Shuffle, cut, and learn: Crypto Go, a card game for teaching cryptography. Mathematics. 8:1-13. 2020
- Bootstrapping security policies for wearable Apps using attributed structural graphs. SENSORS. 16. 2016
- CooPeD: Co-owned Personal Data management. COMPUTERS & SECURITY. 47:41-65. 2014
- Extended U plus F Social Network Protocol: Interoperability, reusability, data protection and indirect relationships in Web Based Social Networks. JOURNAL OF SYSTEMS AND SOFTWARE. 94:50-71. 2014
- Extended U+F social network protocol: interoperability, reusability, data protection and indirect relationships in web based social networks. JOURNAL OF SYSTEMS AND SOFTWARE. 94:50-71. 2014
- SoNeUCON(ABC), an expressive usage control model for Web-Based Social Networks. COMPUTERS & SECURITY. 43:159-187. 2014
- Security Models in Vehicular Ad-hoc Networks: A Survey. IETE TECHNICAL REVIEW. 31:47-64. 2014
- Applying information hiding in VANETs to covertly report misbehaving vehicles. International Journal of Distributed Sensor Networks. 10. 2014
- Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations. Ad Hoc Networks. 11:2693-2709. 2013
- WEVAN ─ A mechanism for evidence creation and verification in VANETs. JOURNAL OF SYSTEMS ARCHITECTURE. 59:985-995. 2013
- Leveraging Quiz-based Multiple-prize Web Tournaments for Reinforcing Routine Mathematical Skills. EDUCATIONAL TECHNOLOGY & SOCIETY. 16:28-43. 2013
- Towards an automatic enforcement for speeding: enhanced model and intelligent transportation systems realisation. IET Intelligent Transport Systems. 6:270-281. 2012
- Hindering false event dissemination in VANETs with proof-of-work mechanisms. TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES. 23:85-97. 2012
- A taxonomy and survey of attacks on digital signatures. COMPUTERS & SECURITY. 34:67-112. 2012
- Authentication and Privacy in Vehicular Networks. Upgrade. 11:72-78. 2010
- Autenticación y privacidad en redes vehiculares. Novática. Año XXXV:43-48. 2009
- An Optimistic Fair Exchange Protocol Based on Signature Policies. COMPUTERS & SECURITY. 27:309-322. 2008
- Guaranteeing the Authenticity of Location Information. IEEE PERVASIVE COMPUTING. 7:72-80. 2008
- EVAWEB v2: Enhancing a Web-Based Assessment System Focused on Non-Repudiation Use and Teaching. International Journal of Web-Based Learning and Teaching Technologies. 3:21-32. 2008
-
book chapters
- User-Managed Access Control in Web Based Social Networks. In: Security and Privacy Preserving in Social Networks. SPRINGER. 97-137. 2013
- Overview of Security Issues in Vehicular Ad-hoc Networks. In: Handbook of Research on Mobility and Computing: Envolving Technologies and Ubiquitous Impacts. IGI GLOBAL. 894-911. 2011
- An Overview of Information Security. In: Advanced in Artificial Intelligence for Privacy Protection and Security. World Scientific. 29-60. 2010
-
books
- Problem book 2010-2015 : final exam problem collection : Cryptography and Computer Security. LEGANES: COPY RED, S.A.. 2016
- Recopilación de problemas de examen 2010-2015 : asignatura, Criptografía y Seguridad Informática. LEGANES: COPY RED, S.A.. 2016
-
conference contributions
- Exploring CyBOK with Topic Modeling Techniques. 49-65. 2022
- Student-Generated Videos for Promoting Better Attitudes towards Cryptography. 379-385. 2019
- "Crypto Go": criptografía simétrica en tapete verde. 53-55. 2018
- Aprendiendo en la sobremesa: Crypto Go, un juego de cartas para dominar la criptografía simétrica 2018
- Analysis of the alignment of Spanish Master's programs to US National Cybersecurity Workforce Framework. 185-191. 2016
- SoNeUCON_ADM: the administrative model for SoNeUCON_ABC. 209-214. 2014
- El proyecto E-SAVE: Asegurando las comunicaciones vehiculares para la mejora de la seguridad vial. 99-105. 2013
- Seguridad en Redes Sociales: problemas, tendencias y retos futuros 2013
- Control de acceso en redes sociales web 2012
- Diseño de un protocolo para el envío de notificaciones de tráficoal vehículo a través de tecnologías ITS 2012
- Proyecto e-SAVE y PRECIOUS sobre la aplicación de tecnologías ITS para la supervisión del cumplimiento de las normas 2012
- U+F Social Network Protocol: Achieving Interoperability and Reusability between Web based Social Networks. 1387-1392. 2012
- Towards a Comparable Evaluation for VANET Protocols: NS-2 Experiments Builder Assistant and Extensible Test Bed 2011
- Towards a Privacy-respectful Telematic Verification System for Vehicle & Driver Authorizations 2011
- CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies 2008
- Hacia un sistema preventivo del exceso de velocidad 2008
- Repudio de firmas electrónicas en infraestructuras de clave pública 2008