Follow
Rolando Trujillo Rasúa
Rolando Trujillo Rasúa
Ramon i Cajal Researcher
Verified email at urv.cat - Homepage
Title
Cited by
Cited by
Year
Applications of distributed ledger technologies to the internet of things: A survey
Q Zhu, SW Loke, R Trujillo-Rasua, F Jiang, Y Xiang
ACM computing surveys (CSUR) 52 (6), 1-34, 2019
1722019
Attack trees with sequential conjunction
R Jhawar, B Kordy, S Mauw, S Radomirović, R Trujillo-Rasua
IFIP International Information Security and Privacy Conference, 339-353, 2015
1292015
Microaggregation-and permutation-based anonymization of movement data
J Domingo-Ferrer, R Trujillo-Rasua
Information Sciences 208, 55-80, 2012
1262012
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
982018
The Poulidor distance-bounding protocol
R Trujillo-Rasua, B Martin, G Avoine
Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010
832010
Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study
M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua
The Practice of Enterprise Modeling: 9th IFIP WG 8.1. Working Conference …, 2016
712016
Distance-bounding protocols: Verification without time and location
S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua
2018 IEEE Symposium on Security and Privacy (SP), 549-566, 2018
692018
On the privacy offered by (k, δ)-anonymity
R Trujillo-Rasua, J Domingo-Ferrer
Information Systems 38 (4), 491-494, 2013
672013
Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0
O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua
International Conference on Quantitative Evaluation of Systems, 159-162, 2016
622016
Traceability in supply chains: A Cyber security analysis
NF Syed, SW Shah, R Trujillo-Rasua, R Doss
Computers & Security 112, 102536, 2022
542022
k-metric antidimension: A privacy measure for social graphs
R Trujillo-Rasua, IG Yero
Information Sciences 328, 403-417, 2016
542016
Privacy-preserving publication of trajectories using microaggregation
J Domingo-Ferrer, M Sramka, R Trujillo-Rasúa
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and …, 2010
462010
Hybrid routing for Man-in-the-Middle (MITM) attack detection in IoT networks
JJ Kang, K Fahd, S Venkatraman, R Trujillo-Rasua, P Haskell-Dowland
2019 29th International Telecommunication Networks and Applications …, 2019
422019
Attribute Evaluation on Attack Trees with Incomplete Information
A Buldas, O Gadyatskaya, A Lenin, S Mauw, R Trujillo-Rasua
Computers & Security, 101630, 2019
402019
APT attacks on industrial control systems: A tale of three incidents
R Kumar, R Kela, S Singh, R Trujillo-Rasua
International Journal of Critical Infrastructure Protection 37, 100521, 2022
382022
Secure attribute-based search in RFID-based inventory control systems
R Doss, R Trujillo-Rasua, S Piramuthu
Decision Support Systems 132, 113270, 2020
362020
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation
A Fernandez-Mir, R Trujillo-Rasua, J Castella-Roca, J Domingo-Ferrer
RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012
362012
Refinement-aware generation of attack trees
O Gadyatskaya, R Jhawar, S Mauw, R Trujillo-Rasua, TAC Willemse
Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017
332017
Analysis of centrality measures under differential privacy models
J Laeuchli, Y Ramírez-Cruz, R Trujillo-Rasua
Applied Mathematics and Computation 412, 126546, 2022
252022
Distance bounding facing both mafia and distance frauds
R Trujillo-Rasua, B Martin, G Avoine
IEEE Transactions on Wireless Communications 13 (10), 5690-5698, 2014
242014
The system can't perform the operation now. Try again later.
Articles 1–20