Search For:

Displaying 1-15 out of 15 total
U+F Social Network Protocol: Achieving Interoperability and Reusability between Web Based Social Networks
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Lorena Gonz'lez-Manzano,Ana I. Gonz'lez-Tablas,Jose M. de Fuentes,Arturo Ribagorda
Issue Date:June 2012
pp. 1387-1392
Along the time many Web Based Social Networks (WBSNs) have appeared, but not all of them offer the same services. Users may use multiple WBSNs to satisfy their requirements. Besides, operations such as the creation of accounts or the establishment of group...
 
Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming
Found in: Availability, Reliability and Security, International Conference on
By Jorge Blasco, Agustín Orfila, Arturo Ribagorda
Issue Date:February 2010
pp. 327-332
One of the central areas in network intrusion detection is how to build effective systems that are able to distinguish normal from intrusive traffic. In this paper we explore the use of Genetic Programming (GP) for such a purpose. Although GP has already b...
 
Effects of Cooperation--Based Peer-to-Peer Authentication on System Performance
Found in: Multimedia Information Networking and Security, International Conference on
By Esther Palomar, Arturo Ribagorda, Juan E. Tapiador, Julio Hernandez-Castro
Issue Date:November 2009
pp. 444-448
Fully distributed file sharing systems, where participants share content and collaborate in a Peer--to--Peer (P2P) manner, have to deal with a highly dynamic environment to ensure that even when some nodes are unavailable, others can still perform the task...
 
Towards Automated Design of Multi-party Rational Exchange Security Protocols
Found in: Web Intelligence and Intelligent Agent Technology, International Conference on
By Almudena Alcaide, Juan M. Estevez-Tapiador, Julio C. Hernandez-Castro, Arturo Ribagorda
Issue Date:November 2007
pp. 387-390
It is only recently that rational exchange schemes have been considered as an alternative solution to the exchange problem. A rational exchange protocol cannot provide fairness but it ensures that rational (i.e. self-interested) parties would have no reaso...
 
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
Found in: Database and Expert Systems Applications, International Workshop on
By Esther Palomar, Juan M.E. Tapiador, Julio C. Hernandez-Castro, Arturo Ribagorda
Issue Date:September 2007
pp. 779-783
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulated a general trend towards extending Peer-to-Peer (P2P) characteristics to wi...
 
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags
Found in: Security, Privacy and Trust in Pervasive and Ubiquitous Computing, International Workshop on
By Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador, Arturo Ribagorda
Issue Date:July 2007
pp. 55-60
The vast majority of works on RFID security focus only on privacy and tracking (violation of location privacy). However, in this paper we are interested in a new mechanism that enables a pair of RFID tags to generate a proof of having been simultaneously s...
 
Certificate-based Access Control in Pure P2P Networks
Found in: Peer-to-Peer Computing, IEEE International Conference on
By Esther Palomar, Juan M. Estevez-Tapiador, Julio C. Hernandez-Castro, Arturo Ribagorda
Issue Date:June 2006
pp. 177-184
Pure Peer-to-Peer (P2P) networks are characterized as being extremely decentralized and self-organized, properties which are essential in a number of environments, including teamwork, collaborative, and ad-hoc systems. One of the features offered by P2P ne...
 
A Protocol for Secure Content Distribution in Pure P2P Networks
Found in: Database and Expert Systems Applications, International Workshop on
By Esther Palomar, Juan M. Estevez-Tapiador, Julio C. Hernandez-Castro, Arturo Ribagorda
Issue Date:September 2006
pp. 712-716
A significant challenge for Peer-to-Peer (P2P) systems is maintaining the correctness and consistency of their global data structures and shared contents as peers independently and unpredictably join and leave the system. In such networks, it is necessary ...
 
A Functional Framework to Evade Network IDS
Found in: Hawaii International Conference on System Sciences
By Sergio Pastrana, Agustin Orfila, Arturo Ribagorda
Issue Date:January 2011
pp. 1-10
Signature based Network Intrusion Detection Systems (NIDS) apply a set of rules to identify hostile traffic in network segments. Currently they are so effective detecting known attacks that hackers seek new techniques to go unnoticed. Some of these techniq...
   
Guaranteeing the Authenticity of Location Information
Found in: IEEE Pervasive Computing
By Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez, Arturo Ribagorda Garnacho
Issue Date:July 2008
pp. 72-80
Location authentication is a young security requirement that has recently arisen in ubiquitous computing applications. During the last decade, researchers have proposed several schemes to guarantee this property in different contexts, but more research is ...
 
CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies
Found in: Availability, Reliability and Security, International Conference on
By José María de Fuentes, Ana Isabel González-Tablas, Arturo Ribagorda
Issue Date:March 2008
pp. 363-368
Recently researchers are being encouraged to address security and privacy requirements for location information. This work contributes to this area by presenting CERTILOC, a prototype of a spatialtemporal certification service that is interoperable with re...
 
Search Engines as a Security Threat
Found in: Computer
By Julio César Hernández, José María Sierra, Arturo Ribagorda, Benjamín Ramos
Issue Date:October 2001
pp. 25-30
<p>Search engines index a huge number of Web pages and other resources. Hackers can use these engines to make anonymous attacks, find easy victims, and gain the knowledge necessary to mount a powerful attack against a network.</p><p>Furth...
 
Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System
Found in: IEEE Transactions on Dependable and Secure Computing
By Juan E. Tapiador,Agustin Orfila,Arturo Ribagorda,Benjamin Ramos
Issue Date:September 2013
pp. 1
Most anomaly detection systems rely on machine learning algorithms to derive a model of normality that is later used to detect suspicious events. Some works conducted over the last years have pointed out that such algorithms are generally susceptible to de...
 
Extended electronic signature policies
Found in: Proceedings of the 2nd international conference on Security of information and networks (SIN '09)
By Ana I. Gonzalez-Tablas, Arturo Ribagorda, Benjamin Ramos, Jorge L. Hernandez-Ardieta
Issue Date:October 2009
pp. 268-277
A signature policy collects the rules to create and validate electronic signatures under which they become binding in a particular transactional context. These policies have been widely adopted to enforce the binding property of signatures in business scen...
     
Evolving hash functions by means of genetic programming
Found in: Proceedings of the 8th annual conference on Genetic and evolutionary computation (GECCO '06)
By Arturo Ribagorda, Cesar Estebanez, Julio Cesar Hernandez-Castro, Pedro Isasi
Issue Date:July 2006
pp. 1861-1862
The design of hash functions by means of evolutionary computation is a relatively new and unexplored problem. In this work, we use Genetic Programming (GP) to evolve robust and fast hash functions. We use a fitness function based on a non-linearity measure...
     
 1