Esther Palomar
Title
Cited by
Cited by
Year
Anonymous authentication for privacy-preserving IoT target-driven applications
A Alcaide, E Palomar, J Montero-Castillo, A Ribagorda
computers & security 37, 111-123, 2013
1302013
Cooperative wireless communications
Y Zhang, HH Chen, M Guizani
CRC press, 2009
602009
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
F Le Fessant, A Papadimitriou, AC Viana, C Sengul, E Palomar
Computer communications 35 (2), 234-248, 2012
382012
Providing SIEM systems with self-adaptation
G Suarez-Tangil, E Palomar, A Ribagorda, I Sanz
Information Fusion 21, 145-158, 2015
362015
Cyber threat intelligence sharing: Survey and research directions
TD Wagner, K Mahbub, E Palomar, AE Abdallah
Computers & Security 87, 101589, 2019
312019
Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security
P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, E Palomar, ...
2010 IEEE International Conference on RFID (IEEE RFID 2010), 45-52, 2010
312010
Secure content access and replication in pure p2p networks
E Palomar, JME Tapiador, JC Hernandez-Castro, A Ribagorda
Computer Communications 31 (2), 266-279, 2008
312008
Certificate-based access control in pure p2p networks
E Palomar, JM Estevez-Tapiador, JC Hernandez-Castro, A Ribagorda
Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), 177-184, 2006
312006
Certificate-based access control in pure p2p networks
E Palomar, JM Estevez-Tapiador, JC Hernandez-Castro, A Ribagorda
Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), 177-184, 2006
312006
Hindering false event dissemination in VANETs with proof-of-work mechanisms
E Palomar, JM de Fuentes, AI González-Tablas, A Alcaide
Transportation Research Part C: Emerging Technologies 23, 85-97, 2012
282012
Automatic rule generation based on genetic programming for event correlation
G Suarez-Tangil, E Palomar, JM de Fuentes, J Blasco, A Ribagorda
Computational Intelligence in Security for Information Systems, 127-134, 2009
222009
A practical encrypted microprocessor
PT Breuer, JP Bowen, E Palomar, Z Liu
ICETE 2016-Proceedings of the 13th International Joint Conference on e …, 2016
212016
The peer’s dilemma: A general framework to examine cooperation in pure peer-to-peer systems
E Palomar, A Alcaide, A Ribagorda, Y Zhang
Computer Networks 56 (17), 3756-3766, 2012
202012
Component-based modelling for scalable smart city systems interoperability: A case study on integrating energy demand response systems
E Palomar, X Chen, Z Liu, S Maharjan, J Bowen
Sensors 16 (11), 1810, 2016
172016
On obfuscating compilation for encrypted computing
PT Breuer, JP Bowen, E Palomar, Z Liu
ICETE 2017-Proceedings of the 14th International Joint Conference on e …, 2017
162017
Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management
E Palomar, L González-Manzano, A Alcaide, Á Galán
IET Information Security 10 (2), 60-68, 2016
152016
Privacy preservation in location-based mobile applications: research directions
A Patel, E Palomar
2014 Ninth International Conference on Availability, Reliability and …, 2014
152014
A novel trust taxonomy for shared cyber threat intelligence
TD Wagner, E Palomar, K Mahbub, AE Abdallah
Security and Communication Networks 2018, 2018
142018
Superscalar encrypted RISC: The measure of a secret computer
P Breuer, J Bowen, E Palomar, Z Liu
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
132018
A secure distance-based RFID identification protocol with an off-line back-end database
P Peris-Lopez, A Orfila, E Palomar, JC Hernandez-Castro
Personal and Ubiquitous Computing 16 (3), 351-365, 2012
132012
The system can't perform the operation now. Try again later.
Articles 1–20