default search action
José María de Fuentes
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Luis Ibanez-Lissen, Lorena González-Manzano, José María de Fuentes, Manuel Goyanes:
On the Feasibility of Predicting Volumes of Fake News - The Spanish Case. IEEE Trans. Comput. Soc. Syst. 11(4): 5230-5240 (2024) - [c16]Luis Ibanez-Lissen, José María de Fuentes, Lorena González-Manzano, Nicolas Anciaux:
Continuous Authentication Leveraging Matrix Profile. ARES 2024: 7:1-7:13 - [i1]Cédric Eichler, Nathan Champeil, Nicolas Anciaux, Alexandra Bensamoun, Héber Hwang Arcolezi, José María de Fuentes:
Nob-MIAs: Non-biased Membership Inference Attacks Assessment on Large Language Models with Ex-Post Dataset Construction. CoRR abs/2408.05968 (2024) - 2023
- [j35]Lorena González-Manzano, Marta Beltrán, José María de Fuentes, Gianluca Dini, Cristina Alcaraz:
Cybersecurity in the digital world. Future Gener. Comput. Syst. 144: 242-243 (2023) - [j34]Mar Gimenez-Aguilar, José María de Fuentes, Lorena González-Manzano:
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus. Int. J. Inf. Sec. 22(5): 1445-1480 (2023) - [j33]Lorena González-Manzano, José María de Fuentes, Flavio Lombardi, Cristina Ramos:
A technical characterization of APTs by leveraging public resources. Int. J. Inf. Sec. 22(6): 1567-1584 (2023) - [j32]Luis Hernández-Álvarez, Elena Barbierato, Stefano Caputo, José María de Fuentes, Lorena González-Manzano, Luis Hernández Encinas, Lorenzo Mucchi:
KeyEncoder: A secure and usable EEG-based cryptographic key generation mechanism. Pattern Recognit. Lett. 173: 1-9 (2023) - [c15]Miguel Peidro-Paredes, José María de Fuentes, Lorena González-Manzano, Miguel Velasco-Gomez:
Characterizing the MasterPrint threat on Android devices with capacitive sensors. ARES 2023: 16:1-16:11 - 2022
- [c14]José Reverte Cazorla, José María de Fuentes, Lorena González-Manzano:
Eye-based keystroke prediction for natural texts - a feasibility analysis. TrustCom 2022: 375-382 - 2021
- [j31]Mar Gimenez-Aguilar, José María de Fuentes, Lorena González-Manzano, Carmen Camara:
Zephyrus: An Information Hiding Mechanism Leveraging Ethereum Data Fields. IEEE Access 9: 118553-118570 (2021) - [j30]Mar Gimenez-Aguilar, José María de Fuentes, Lorena González-Manzano, David Arroyo:
Achieving cybersecurity in blockchain-based systems: A survey. Future Gener. Comput. Syst. 124: 91-118 (2021) - [j29]Luis Hernández-Álvarez, José María de Fuentes, Lorena González-Manzano, Luis Hernández Encinas:
SmartCAMPP - Smartphone-based continuous authentication leveraging motion sensors with privacy preservation. Pattern Recognit. Lett. 147: 189-196 (2021) - [j28]Luis Hernández-Álvarez, José María de Fuentes, Lorena González-Manzano, Luis Hernández Encinas:
Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review. Sensors 21(1): 92 (2021) - [j27]Carmen Camara, Pedro Peris-Lopez, José María de Fuentes, Samuel Marchal:
Access Control for Implantable Medical Devices. IEEE Trans. Emerg. Top. Comput. 9(3): 1126-1138 (2021) - 2020
- [j26]Lorena González-Manzano, Upal Mahbub, José María de Fuentes, Rama Chellappa:
Impact of injection attacks on sensor-based continuous authentication for smartphones. Comput. Commun. 163: 150-161 (2020) - [c13]Lorena González-Manzano, Sergio Bernardez, José María de Fuentes:
SmartLED: Smartphone-based covert channels leveraging the notification LED. TrustCom 2020: 1748-1755
2010 – 2019
- 2019
- [j25]Lorena González-Manzano, José María de Fuentes:
Design recommendations for online cybersecurity courses. Comput. Secur. 80: 238-256 (2019) - [j24]Lorena González-Manzano, José María de Fuentes, Arturo Ribagorda:
Leveraging User-related Internet of Things for Continuous Authentication: A Survey. ACM Comput. Surv. 52(3): 53:1-53:38 (2019) - [j23]Omid Mirzaei, José María de Fuentes, Juan E. Tapiador, Lorena González-Manzano:
AndrODet: An adaptive Android obfuscation detector. Future Gener. Comput. Syst. 90: 240-261 (2019) - [j22]Constantinos Patsakis, Kleanthis Dellios, José María de Fuentes, Fran Casino, Agusti Solanas:
External Monitoring Changes in Vehicle Hardware Profiles: Enhancing Automotive Cyber-Security. J. Hardw. Syst. Secur. 3(3): 289-303 (2019) - [j21]José María de Fuentes, Lorena González-Manzano, Javier López, Pedro Peris-Lopez, Kim-Kwang Raymond Choo:
Editorial: Security and Privacy in Internet of Things. Mob. Networks Appl. 24(3): 878-880 (2019) - [c12]Omid Mirzaei, Guillermo Suarez-Tangil, José María de Fuentes, Juan Tapiador, Gianluca Stringhini:
AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families. AsiaCCS 2019: 307-314 - 2018
- [j20]José María de Fuentes, Lorena González-Manzano, Agusti Solanas, Fatbardh Veseli:
Attribute-Based Credentials for Privacy-Aware Smart Health Services in IoT-Based Smart Cities. Computer 51(7): 44-53 (2018) - [j19]Pedro Peris-Lopez, Lorena González-Manzano, Carmen Camara, José María de Fuentes:
Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things. Future Gener. Comput. Syst. 81: 67-77 (2018) - [j18]José María de Fuentes, Lorena González-Manzano, Arturo Ribagorda:
Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors. Sensors 18(4): 1219 (2018) - [p2]José María de Fuentes, Luis Hernández Encinas, Arturo Ribagorda:
Security Protocols for Networks and Internet: A Global Vision. Computer and Network Security Essentials 2018: 135-151 - 2017
- [j17]José María de Fuentes, Lorena González-Manzano, Juan E. Tapiador, Pedro Peris-Lopez:
PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing. Comput. Secur. 69: 127-141 (2017) - [j16]Lorena González-Manzano, José María de Fuentes, Pedro Peris-Lopez, Carmen Camara:
Encryption by Heart (EbH) - Using ECG for time-invariant symmetric key generation. Future Gener. Comput. Syst. 77: 136-148 (2017) - [j15]Fei Yu, Chin-Chen Chang, Jian Shu, Iftikhar Ahmad, Jun Zhang, José María de Fuentes:
Recent Advances in Security and Privacy for Wireless Sensor Networks 2016. J. Sensors 2017: 3057534:1-3057534:3 (2017) - [j14]José María de Fuentes, Lorena González-Manzano, Jetzabel Serna-Olvera, Fatbardh Veseli:
Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities. Pers. Ubiquitous Comput. 21(5): 869-891 (2017) - [c11]Omid Mirzaei, Guillermo Suarez-Tangil, Juan E. Tapiador, José María de Fuentes:
TriFlow: Triaging Android Applications using Speculative Information Flows. AsiaCCS 2017: 640-651 - [c10]Lorena González-Manzano, Mark Slaymaker, José María de Fuentes, Dimitris Vayenas:
SoNeUCONABCPro: An Access Control Model for Social Networks with Translucent User Provenance. ATCS/SePrIoT@SecureComm 2017: 234-252 - [c9]Alfonso Blanco Blanco, José María de Fuentes, Lorena González-Manzano, Luis Hernández Encinas, Agustín Martín Muñoz, José Luis Rodrigo Oliva, J. Ignacio Sánchez García:
A Framework for Acquiring and Analyzing Traces from Cryptographic Devices. ATCS/SePrIoT@SecureComm 2017: 283-300 - 2016
- [j13]Lorena González-Manzano, José María de Fuentes, Sergio Pastrana, Pedro Peris-Lopez, Luis Hernández Encinas:
PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things. J. Netw. Comput. Appl. 71: 59-71 (2016) - [j12]José María de Fuentes, Lorena González-Manzano, Omid Mirzaei:
Privacy Models in Wireless Sensor Networks: A Survey. J. Sensors 2016: 4082084:1-4082084:18 (2016) - [c8]Lorena González-Manzano, José María de Fuentes, Kim-Kwang Raymond Choo:
ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments. SecureComm 2016: 412-428 - 2015
- [j11]José María de Fuentes, Pedro Peris-Lopez, Juan E. Tapiador, Sergio Pastrana:
Probabilistic yoking proofs for large scale IoT systems. Ad Hoc Networks 32: 43-52 (2015) - [j10]Fei Yu, Chin-Chen Chang, Jian Shu, Iftikhar Ahmad, Jun Zhang, José María de Fuentes:
Recent Advances in Security and Privacy for Wireless Sensor Networks. J. Sensors 2015: 169305:1-169305:2 (2015) - [c7]Lorena González-Manzano, José María de Fuentes, Agustín Orfila:
Access Control for the Cloud Based on Multi-device Authentication. TrustCom/BigDataSE/ISPA (1) 2015: 856-863 - 2014
- [j9]Lorena González-Manzano, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Arturo Ribagorda:
SoNeUCONABC, an expressive usage control model for Web-Based Social Networks. Comput. Secur. 43: 159-187 (2014) - [j8]Lorena González-Manzano, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Arturo Ribagorda:
CooPeD: Co-owned Personal Data management. Comput. Secur. 47: 41-65 (2014) - [j7]José María de Fuentes, Jorge Blasco Alís, Ana Isabel González-Tablas Ferreres, Lorena González-Manzano:
Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles. Int. J. Distributed Sens. Networks 10 (2014) - [j6]Lorena González-Manzano, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Arturo Ribagorda:
Extended U+F Social Network Protocol: Interoperability, reusability, data protection and indirect relationships in Web Based Social Networks. J. Syst. Softw. 94: 50-71 (2014) - [c6]Julian Schütte, Dennis Titze, José María de Fuentes:
AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps. TrustCom 2014: 370-379 - 2013
- [j5]Ana Isabel González-Tablas Ferreres, Almudena Alcaide, José María de Fuentes, José Montero-Castillo:
Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations. Ad Hoc Networks 11(8): 2693-2709 (2013) - [j4]Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Benjamín Ramos:
A taxonomy and survey of attacks on digital signatures. Comput. Secur. 34: 67-112 (2013) - [j3]Ana Isabel González-Tablas Ferreres, José María de Fuentes, Jorge L. Hernandez-Ardieta, Benjamín Ramos:
Leveraging Quiz-based Multiple-prize Web Tournaments for Reinforcing Routine Mathematical Skills. J. Educ. Technol. Soc. 16(3): 28-43 (2013) - [j2]José María de Fuentes, Lorena González-Manzano, Ana Isabel González-Tablas Ferreres, Jorge Blasco Alís:
WEVAN - A mechanism for evidence creation and verification in VANETs. J. Syst. Archit. 59(10-B): 985-995 (2013) - [p1]Lorena González-Manzano, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Arturo Ribagorda:
User-Managed Access Control in Web Based Social Networks. Security and Privacy Preserving in Social Networks 2013: 97-137 - 2012
- [j1]Jorge Blasco Alís, Julio César Hernández Castro, José María de Fuentes, Benjamín Ramos:
A framework for avoiding steganography usage over HTTP. J. Netw. Comput. Appl. 35(1): 491-501 (2012) - [c5]Lorena González-Manzano, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Arturo Ribagorda:
U+F Social Network Protocol: Achieving Interoperability and Reusability between Web Based Social Networks. TrustCom 2012: 1387-1392 - 2011
- [c4]Ana Isabel González-Tablas Ferreres, Almudena Alcaide, Guillermo Suarez-Tangil, José María de Fuentes, Israel Barroso-Perez:
POSTER Towards a Privacy - Respectful Telematic Verification System for Vehicle and Driver Authorizations. MobiQuitous 2011: 224-227 - 2010
- [c3]Almudena Alcaide, Ali E. Abdallah, Ana Isabel González-Tablas Ferreres, José María de Fuentes:
L-PEP: A Logic to Reason about Privacy-Enhancing Cryptography Protocols. DPM/SETOP 2010: 108-122
2000 – 2009
- 2009
- [c2]Guillermo Suarez-Tangil, Esther Palomar, José María de Fuentes, Jorge Blasco Alís, Arturo Ribagorda:
Automatic Rule Generation Based on Genetic Programming for Event Correlation. CISIS 2009: 127-134 - 2008
- [c1]José María de Fuentes, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda:
CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies. ARES 2008: 363-368
Coauthor Index
aka: Ana Isabel González-Tablas Ferreres
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint