Suivre
Rolando Trujillo Rasúa
Rolando Trujillo Rasúa
Senior Lecturer at Deakin University
Adresse e-mail validée de deakin.edu.au - Page d'accueil
Titre
Citée par
Citée par
Année
Microaggregation-and permutation-based anonymization of movement data
J Domingo-Ferrer, R Trujillo-Rasua
Information Sciences 208, 55-80, 2012
982012
Attack trees with sequential conjunction
R Jhawar, B Kordy, S Mauw, S Radomirović, R Trujillo-Rasua
IFIP International Information Security and Privacy Conference, 339-353, 2015
962015
Applications of distributed ledger technologies to the internet of things: A survey
Q Zhu, SW Loke, R Trujillo-Rasua, F Jiang, Y Xiang
ACM computing surveys (CSUR) 52 (6), 1-34, 2019
772019
The Poulidor distance-bounding protocol
R Trujillo-Rasua, B Martin, G Avoine
International Workshop on Radio Frequency Identification: Security and …, 2010
742010
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
522018
Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0
O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua
International Conference on Quantitative Evaluation of Systems, 159-162, 2016
522016
On the privacy offered by (k, δ)-anonymity
R Trujillo-Rasua, J Domingo-Ferrer
Information Systems 38 (4), 491-494, 2013
512013
Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study
M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua
IFIP Working Conference on The Practice of Enterprise Modeling, 326-334, 2016
482016
Distance-bounding protocols: Verification without time and location
S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua
2018 IEEE Symposium on Security and Privacy (SP), 549-566, 2018
462018
k-metric antidimension: A privacy measure for social graphs
R Trujillo-Rasua, IG Yero
Information Sciences 328, 403-417, 2016
412016
Privacy-preserving publication of trajectories using microaggregation
J Domingo-Ferrer, M Sramka, R Trujillo-Rasúa
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and …, 2010
412010
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation
A Fernandez-Mir, R Trujillo-Rasua, J Castella-Roca, J Domingo-Ferrer
International Workshop on Radio Frequency Identification: Security and …, 2011
382011
Distance bounding facing both mafia and distance frauds
R Trujillo-Rasua, B Martin, G Avoine
IEEE Transactions on Wireless Communications 13 (10), 5690-5698, 2014
272014
Refinement-aware generation of attack trees
O Gadyatskaya, R Jhawar, S Mauw, R Trujillo-Rasua, TAC Willemse
International Workshop on Security and Trust Management, 164-179, 2017
202017
Secure attribute-based search in RFID-based inventory control systems
R Doss, R Trujillo-Rasua, S Piramuthu
Decision Support Systems 132, 113270, 2020
182020
Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers
R Trujillo-Rasua, A Solanas
Computer Networks 55 (15), 3211-3223, 2011
172011
Attribute Evaluation on Attack Trees with Incomplete Information
A Buldas, O Gadyatskaya, A Lenin, S Mauw, R Trujillo-Rasua
Computers & Security, 101630, 2019
162019
Predictive protocol for the scalable identification of RFID tags through collaborative readers
R Trujillo-Rasua, A Solanas, PA Pérez-Martínez, J Domingo-Ferrer
Computers in Industry 63 (6), 557-573, 2012
162012
Comparing distance bounding protocols: A critical mission supported by decision theory
G Avoine, S Mauw, R Trujillo-Rasua
Computer Communications 67, 92-102, 2015
152015
Counteracting active attacks in social network graphs
S Mauw, R Trujillo-Rasua, B Xuan
IFIP Annual Conference on Data and Applications Security and Privacy, 233-248, 2016
142016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20