Search For:

Displaying 1-4 out of 4 total
Guaranteeing the Authenticity of Location Information
Found in: IEEE Pervasive Computing
By Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez, Arturo Ribagorda Garnacho
Issue Date:July 2008
pp. 72-80
Location authentication is a young security requirement that has recently arisen in ubiquitous computing applications. During the last decade, researchers have proposed several schemes to guarantee this property in different contexts, but more research is ...
Search Engines as a Security Threat
Found in: Computer
By Julio César Hernández, José María Sierra, Arturo Ribagorda, Benjamín Ramos
Issue Date:October 2001
pp. 25-30
<p>Search engines index a huge number of Web pages and other resources. Hackers can use these engines to make anonymous attacks, find easy victims, and gain the knowledge necessary to mount a powerful attack against a network.</p><p>Furth...
Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System
Found in: IEEE Transactions on Dependable and Secure Computing
By Juan E. Tapiador,Agustin Orfila,Arturo Ribagorda,Benjamin Ramos
Issue Date:September 2013
pp. 1
Most anomaly detection systems rely on machine learning algorithms to derive a model of normality that is later used to detect suspicious events. Some works conducted over the last years have pointed out that such algorithms are generally susceptible to de...
Extended electronic signature policies
Found in: Proceedings of the 2nd international conference on Security of information and networks (SIN '09)
By Ana I. Gonzalez-Tablas, Arturo Ribagorda, Benjamin Ramos, Jorge L. Hernandez-Ardieta
Issue Date:October 2009
pp. 268-277
A signature policy collects the rules to create and validate electronic signatures under which they become binding in a particular transactional context. These policies have been widely adopted to enforce the binding property of signatures in business scen...