Esther Palomar
Sitert av
Sitert av
Cyber threat intelligence sharing: Survey and research directions
TD Wagner, K Mahbub, E Palomar, AE Abdallah
Computers & Security 87, 101589, 2019
Anonymous authentication for privacy-preserving IoT target-driven applications
A Alcaide, E Palomar, J Montero-Castillo, A Ribagorda
computers & security 37, 111-123, 2013
Providing SIEM systems with self-adaptation
G Suarez-Tangil, E Palomar, A Ribagorda, I Sanz
Information Fusion 21, 145-158, 2015
A novel trust taxonomy for shared cyber threat intelligence
TD Wagner, E Palomar, K Mahbub, AE Abdallah
Security and Communication Networks 2018 (1), 9634507, 2018
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
F Le Fessant, A Papadimitriou, AC Viana, C Sengul, E Palomar
Computer communications 35 (2), 234-248, 2012
Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security
P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, E Palomar, ...
2010 IEEE International Conference on RFID (IEEE RFID 2010), 45-52, 2010
Secure content access and replication in pure p2p networks
E Palomar, JME Tapiador, JC Hernandez-Castro, A Ribagorda
Computer Communications 31 (2), 266-279, 2008
Certificate-based access control in pure p2p networks
E Palomar, JM Estevez-Tapiador, JC Hernandez-Castro, A Ribagorda
Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), 177-184, 2006
Hindering false event dissemination in VANETs with proof-of-work mechanisms
E Palomar, JM de Fuentes, AI González-Tablas, A Alcaide
Transportation Research Part C: Emerging Technologies 23, 85-97, 2012
Component-based modelling for scalable smart city systems interoperability: A case study on integrating energy demand response systems
E Palomar, X Chen, Z Liu, S Maharjan, J Bowen
Sensors 16 (11), 1810, 2016
A practical encrypted microprocessor
PT Breuer, JP Bowen, E Palomar, Z Liu
ICETE 2016-Proceedings of the 13th International Joint Conference on e …, 2016
Behavioural patterns in aggregated demand response developments for communities targeting renewables
C Cruz, E Palomar, I Bravo, M Aleixandre
Sustainable Cities and Society 72, 103001, 2021
Automatic rule generation based on genetic programming for event correlation
G Suarez-Tangil, E Palomar, JM de Fuentes, J Blasco, A Ribagorda
Computational Intelligence in Security for Information Systems: CISIS’09 …, 2009
The peer’s dilemma: A general framework to examine cooperation in pure peer-to-peer systems
E Palomar, A Alcaide, A Ribagorda, Y Zhang
Computer Networks 56 (17), 3756-3766, 2012
Implementing a privacy‐enhanced attribute‐based credential system for online social networks with co‐ownership management
E Palomar, L González‐Manzano, A Alcaide, Á Galán
IET Information Security 10 (2), 60-68, 2016
On obfuscating compilation for encrypted computing
PT Breuer, JP Bowen, E Palomar, Z Liu
ICETE 2017-Proceedings of the 14th International Joint Conference on e …, 2017
High level synthesis FPGA implementation of the Jacobi algorithm to solve the eigen problem
I Bravo, C Vázquez, A Gardel, JL Lázaro, E Palomar
Mathematical Problems in Engineering 2015 (1), 870569, 2015
Superscalar encrypted RISC: The measure of a secret computer
P Breuer, J Bowen, E Palomar, Z Liu
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
Privacy preservation in location-based mobile applications: research directions
A Patel, E Palomar
2014 Ninth International Conference on Availability, Reliability and …, 2014
A secure distance-based RFID identification protocol with an off-line back-end database
P Peris-Lopez, A Orfila, E Palomar, JC Hernandez-Castro
Personal and Ubiquitous Computing 16, 351-365, 2012
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20