Miguel Soriano
Miguel Soriano
Dirección de correo verificada de entel.upc.edu - Página principal
TítuloCitado porAño
Securing cognitive radio networks
O Leon, J Hernandez-Serrano, M Soriano
International Journal of Communication Systems 23 (5), 633-652, 2010
1302010
Security and privacy in your smart city
A Bartoli, J Hernández-Serrano, M Soriano, M Dohler, A Kountouris, ...
Proceedings of the Barcelona smart cities congress 292, 1-6, 2011
832011
Secure lossless aggregation for smart grid M2M networks
A Bartoli, J Hernandez-Serrano, M Soriano, M Dohler, A Kountouris, ...
2010 first IEEE international conference on smart grid communications, 333-338, 2010
832010
Epidemiology of hip fracture in Asturias
AA Altadill, CA Gomez, MJS Virgós, BL Diaz, JBA Cannata
Medicina clinica 105 (8), 281-286, 1995
761995
A security and usability proposal for mobile electronic commerce
M Soriano, D Ponce
Communications Magazine, IEEE 40 (8), 62-67, 2002
592002
Secure lossless aggregation over fading and shadowing channels for smart grid m2m networks
A Bartoli, J Hernández-Serrano, M Soriano, M Dohler, A Kountouris, ...
IEEE Transactions on Smart Grid 2 (4), 844-864, 2011
482011
A new cross-layer attack to TCP in cognitive radio networks
O Leon, J Hernandez-Serrano, M Soriano
2009 Second International Workshop on Cross Layer Design, 1-5, 2009
452009
Providing k-anonymity and revocation in ubiquitous VANETs
C Caballero-Gil, J Molina-Gil, J Hernández-Serrano, O León, ...
Ad Hoc Networks 36, 482-494, 2016
382016
Modeling the lion attack in cognitive radio networks
J Hernandez-Serrano, O León, M Soriano
EURASIP Journal on Wireless Communications and Networking 2011, 1-10, 2011
382011
Certificate revocation system implementation based on the Merkle hash tree
JL Muñoz, J Forne, O Esparza, M Soriano
International Journal of Information Security 2 (2), 110-124, 2004
342004
Mobile agent watermarking and fingerprinting: tracing malicious hosts
O Esparza, M Fernandez, M Soriano, JL Munoz, J Forné
International Conference on Database and Expert Systems Applications, 927-936, 2003
342003
Host revocation authority: A way of protecting mobile agents from malicious hosts
O Esparza, M Soriano, JL Muñoz, J Forné
International Conference on Web Engineering, 289-292, 2003
342003
Cooperative detection of primary user emulation attacks in CRNs
O León, J Hernández-Serrano, M Soriano
Computer Networks 56 (14), 3374-3384, 2012
312012
Secure brokerage mechanisms for mobile electronic commerce
O Esparza, JL Muñoz, M Soriano, J Forné
Computer Communications 29 (12), 2308-2321, 2006
312006
Aluminum-induced osteogenesis in osteopenic rats with normal renal function
C Gomez-Alonso, P Menendez-Rodriguez, MJ Virgos-Soriano, ...
Calcified tissue international 64 (6), 534-541, 1999
301999
Fingerprinting concatenated codes with efficient identification
M Fernández, M Soriano
International Conference on Information Security, 459-470, 2002
292002
Improved LKH for batch rekeying in multicast groups
J Pegueroles, F Rico-Novella, J Hernandez-Serrano, M Soriano
International Conference on Information Technology: Research and Education …, 2003
272003
An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers
D Rebollo-Monedero, J Forné, M Soriano
Data & Knowledge Engineering 70 (10), 892-921, 2011
262011
A protocol for detecting malicious hosts based on limiting the execution time of mobile agents
O Esparza, M Soriano, JL Muñoz, J Forné
Proceedings of the Eighth IEEE Symposium on Computers and Communications …, 2003
252003
DocCloud: A document recommender system on cloud computing with plausible deniability
J Vera-del-Campo, J Pegueroles, J Hernández-Serrano, M Soriano
Information Sciences 258, 387-402, 2014
242014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20