BibTeX records: Rolando Trujillo-Rasua

download as .bib file

@article{DBLP:journals/corr/abs-2401-06626,
  author       = {Sergiu Bursuc and
                  Reynaldo Gil Pons and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  title        = {Software-Based Memory Erasure with relaxed isolation requirements:
                  Extended Version},
  journal      = {CoRR},
  volume       = {abs/2401.06626},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.06626},
  doi          = {10.48550/ARXIV.2401.06626},
  eprinttype    = {arXiv},
  eprint       = {2401.06626},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-06626.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/PonsMT23,
  author       = {Reynaldo Gil Pons and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  title        = {On the optimal resistance against mafia and distance fraud in distance-bounding
                  protocols},
  journal      = {Comput. Commun.},
  volume       = {210},
  pages        = {69--78},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comcom.2023.07.033},
  doi          = {10.1016/J.COMCOM.2023.07.033},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/PonsMT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bsci/Heikamp0DTR23,
  author       = {Fokke Heikamp and
                  Lei Pan and
                  Robin Doss and
                  Rolando Trujillo{-}Rasua and
                  Sushmita Ruj},
  editor       = {Keke Gai and
                  Kim{-}Kwang Raymond Choo},
  title        = {ForTrac: a Secure NFT-based Forward Traceability System for Providing
                  Data Accuracy and Completeness},
  booktitle    = {Proceedings of the 5th {ACM} International Symposium on Blockchain
                  and Secure Critical Infrastructure, {BSCI} 2023, Melbourne, VIC, Australia,
                  July 10-14, 2023},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3594556.3594608},
  doi          = {10.1145/3594556.3594608},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bsci/Heikamp0DTR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-13331,
  author       = {Olga Gadyatskaya and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua and
                  Tim A. C. Willemse},
  title        = {Automated generation of attack trees with optimal shape and labelling},
  journal      = {CoRR},
  volume       = {abs/2311.13331},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.13331},
  doi          = {10.48550/ARXIV.2311.13331},
  eprinttype    = {arXiv},
  eprint       = {2311.13331},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-13331.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LaeuchliRT22,
  author       = {Jesse Laeuchli and
                  Yunior Ram{\'{\i}}rez{-}Cruz and
                  Rolando Trujillo{-}Rasua},
  title        = {Analysis of centrality measures under differential privacy models},
  journal      = {Appl. Math. Comput.},
  volume       = {412},
  pages        = {126546},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.amc.2021.126546},
  doi          = {10.1016/J.AMC.2021.126546},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/LaeuchliRT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SyedSTD22,
  author       = {Naeem Firdous Syed and
                  Syed W. Shah and
                  Rolando Trujillo{-}Rasua and
                  Robin Doss},
  title        = {Traceability in supply chains: {A} Cyber security analysis},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102536},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102536},
  doi          = {10.1016/J.COSE.2021.102536},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SyedSTD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KumarKST22,
  author       = {Rajesh Kumar and
                  Rohan Kela and
                  Siddhant Singh and
                  Rolando Trujillo{-}Rasua},
  title        = {{APT} attacks on industrial control systems: {A} tale of three incidents},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {37},
  pages        = {100521},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100521},
  doi          = {10.1016/J.IJCIP.2022.100521},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/KumarKST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/MauwRT22,
  author       = {Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz and
                  Rolando Trujillo{-}Rasua},
  title        = {Preventing active re-identification attacks on social graphs via sybil
                  subgraph obfuscation},
  journal      = {Knowl. Inf. Syst.},
  volume       = {64},
  number       = {4},
  pages        = {1077--1100},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10115-022-01662-z},
  doi          = {10.1007/S10115-022-01662-Z},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kais/MauwRT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/PonsHMTT22,
  author       = {Reynaldo Gil Pons and
                  Ross Horne and
                  Sjouke Mauw and
                  Alwen Tiu and
                  Rolando Trujillo{-}Rasua},
  title        = {Is Eve nearby? Analysing protocols under the distant-attacker assumption},
  booktitle    = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa,
                  Israel, August 7-10, 2022},
  pages        = {17--32},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSF54842.2022.9919655},
  doi          = {10.1109/CSF54842.2022.9919655},
  timestamp    = {Fri, 11 Nov 2022 16:53:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/PonsHMTT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/HeikampPTRD22,
  author       = {Fokke Heikamp and
                  Lei Pan and
                  Rolando Trujillo{-}Rasua and
                  Sushmita Ruj and
                  Robin Doss},
  editor       = {Xingliang Yuan and
                  Guangdong Bai and
                  Cristina Alcaraz and
                  Suryadipta Majumdar},
  title        = {Forward Traceability for Product Authenticity Using Ethereum Smart
                  Contracts},
  booktitle    = {Network and System Security - 16th International Conference, {NSS}
                  2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13787},
  pages        = {514--523},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23020-2\_29},
  doi          = {10.1007/978-3-031-23020-2\_29},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/HeikampPTRD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Trujillo-Rasua21,
  author       = {Rolando Trujillo{-}Rasua},
  title        = {Secure memory erasure in the presence of man-in-the-middle attackers},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102730},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102730},
  doi          = {10.1016/J.JISA.2020.102730},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Trujillo-Rasua21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-03556,
  author       = {Jesse Laeuchli and
                  Yunior Ram{\'{\i}}rez{-}Cruz and
                  Rolando Trujillo{-}Rasua},
  title        = {Analysis of centrality measures under differential privacy models},
  journal      = {CoRR},
  volume       = {abs/2103.03556},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.03556},
  eprinttype    = {arXiv},
  eprint       = {2103.03556},
  timestamp    = {Mon, 15 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-03556.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BuldasGLMT20,
  author       = {Ahto Buldas and
                  Olga Gadyatskaya and
                  Aleksandr Lenin and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  title        = {Attribute evaluation on attack trees with incomplete information},
  journal      = {Comput. Secur.},
  volume       = {88},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101630},
  doi          = {10.1016/J.COSE.2019.101630},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BuldasGLMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ZhuLTJX20,
  author       = {Qingyi Zhu and
                  Seng W. Loke and
                  Rolando Trujillo{-}Rasua and
                  Frank Jiang and
                  Yong Xiang},
  title        = {Applications of Distributed Ledger Technologies to the Internet of
                  Things: {A} Survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {52},
  number       = {6},
  pages        = {120:1--120:34},
  year         = {2020},
  url          = {https://doi.org/10.1145/3359982},
  doi          = {10.1145/3359982},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/ZhuLTJX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/DossTP20,
  author       = {Robin Doss and
                  Rolando Trujillo{-}Rasua and
                  Selwyn Piramuthu},
  title        = {Secure attribute-based search in RFID-based inventory control systems},
  journal      = {Decis. Support Syst.},
  volume       = {132},
  pages        = {113270},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.dss.2020.113270},
  doi          = {10.1016/J.DSS.2020.113270},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dss/DossTP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-05312,
  author       = {Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz and
                  Rolando Trujillo{-}Rasua},
  title        = {Preventing active re-identification attacks on social graphs via sybil
                  subgraph obfuscation},
  journal      = {CoRR},
  volume       = {abs/2007.05312},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.05312},
  eprinttype    = {arXiv},
  eprint       = {2007.05312},
  timestamp    = {Mon, 20 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-05312.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/PonsRTY19,
  author       = {Reynaldo Gil Pons and
                  Yunior Ram{\'{\i}}rez{-}Cruz and
                  Rolando Trujillo{-}Rasua and
                  Ismael Gonz{\'{a}}lez Yero},
  title        = {Distance-based vertex identification in graphs: The outer multiset
                  dimension},
  journal      = {Appl. Math. Comput.},
  volume       = {363},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.amc.2019.124612},
  doi          = {10.1016/J.AMC.2019.124612},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/PonsRTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/AvoineBBCHKKLMM19,
  author       = {Gildas Avoine and
                  Muhammed Ali Bing{\"{o}}l and
                  Ioana Boureanu and
                  Srdjan Capkun and
                  Gerhard P. Hancke and
                  S{\"{u}}leyman Kardas and
                  Chong Hee Kim and
                  C{\'{e}}dric Lauradoux and
                  Benjamin Martin and
                  Jorge Munilla and
                  Alberto Peinado and
                  Kasper Bonne Rasmussen and
                  Dave Singel{\'{e}}e and
                  Aslan Tchamkerten and
                  Rolando Trujillo{-}Rasua and
                  Serge Vaudenay},
  title        = {Security of Distance-Bounding: {A} Survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {51},
  number       = {5},
  pages        = {94:1--94:33},
  year         = {2019},
  url          = {https://doi.org/10.1145/3264628},
  doi          = {10.1145/3264628},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/AvoineBBCHKKLMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/datamine/MauwRT19,
  author       = {Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz and
                  Rolando Trujillo{-}Rasua},
  title        = {Robust active attacks on social graphs},
  journal      = {Data Min. Knowl. Discov.},
  volume       = {33},
  number       = {5},
  pages        = {1357--1392},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10618-019-00631-5},
  doi          = {10.1007/S10618-019-00631-5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/datamine/MauwRT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/MauwRT19,
  author       = {Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz and
                  Rolando Trujillo{-}Rasua},
  title        = {Conditional adjacency anonymity in social graphs under active attacks},
  journal      = {Knowl. Inf. Syst.},
  volume       = {61},
  number       = {1},
  pages        = {485--511},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10115-018-1283-x},
  doi          = {10.1007/S10115-018-1283-X},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kais/MauwRT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MauwSTT19,
  author       = {Sjouke Mauw and
                  Zach Smith and
                  Jorge Toro{-}Pozo and
                  Rolando Trujillo{-}Rasua},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Post-Collusion Security and Distance Bounding},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {941--958},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3345651},
  doi          = {10.1145/3319535.3345651},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MauwSTT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itnac/KangFVTH19,
  author       = {James Jin Kang and
                  Kiran Fahd and
                  Sitalakshmi Venkatraman and
                  Rolando Trujillo{-}Rasua and
                  Paul S. Haskell{-}Dowland},
  title        = {Hybrid Routing for Man-in-the-Middle {(MITM)} Attack Detection in
                  IoT Networks},
  booktitle    = {29th International Telecommunication Networks and Applications Conference,
                  {ITNAC} 2019, Auckland, New Zealand, November 27-29, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ITNAC46935.2019.9077977},
  doi          = {10.1109/ITNAC46935.2019.9077977},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itnac/KangFVTH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-13474,
  author       = {Rolando Trujillo{-}Rasua},
  title        = {Secure Memory Erasure in the Presence of Man-in-the-Middle Attackers},
  journal      = {CoRR},
  volume       = {abs/1905.13474},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.13474},
  eprinttype    = {arXiv},
  eprint       = {1905.13474},
  timestamp    = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-13474.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-03041,
  author       = {Nicholas Charles Patterson and
                  Rolando Trujillo{-}Rasua and
                  Michael Hobbs and
                  Guy Wood{-}Bradley and
                  Judy Currey and
                  Elicia Lanham},
  title        = {Chunked Lectures: {A} new model for conducting online lectures within
                  Information Technology higher education},
  journal      = {CoRR},
  volume       = {abs/1909.03041},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.03041},
  eprinttype    = {arXiv},
  eprint       = {1909.03041},
  timestamp    = {Fri, 13 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-03041.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MauwRT18,
  author       = {Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz and
                  Rolando Trujillo{-}Rasua},
  title        = {Anonymising social graphs in the presence of active attackers},
  journal      = {Trans. Data Priv.},
  volume       = {11},
  number       = {2},
  pages        = {169--198},
  year         = {2018},
  url          = {http://www.tdp.cat/issues16/tdp.a285a17.pdf},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdp/MauwRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MauwSTT18,
  author       = {Sjouke Mauw and
                  Zach Smith and
                  Jorge Toro{-}Pozo and
                  Rolando Trujillo{-}Rasua},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Automated Identification of Desynchronisation Attacks on Shared Secrets},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {406--426},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_20},
  doi          = {10.1007/978-3-319-99073-6\_20},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MauwSTT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MauwSTT18,
  author       = {Sjouke Mauw and
                  Zach Smith and
                  Jorge Toro{-}Pozo and
                  Rolando Trujillo{-}Rasua},
  title        = {Distance-Bounding Protocols: Verification without Time and Location},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {549--566},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00001},
  doi          = {10.1109/SP.2018.00001},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MauwSTT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-10915,
  author       = {Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz and
                  Rolando Trujillo{-}Rasua},
  title        = {Robust active attacks on social graphs},
  journal      = {CoRR},
  volume       = {abs/1811.10915},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.10915},
  eprinttype    = {arXiv},
  eprint       = {1811.10915},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-10915.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-10754,
  author       = {Ahto Buldas and
                  Olga Gadyatskaya and
                  Aleksandr Lenin and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  title        = {Attribute Evaluation on Attack Trees with Incomplete Information},
  journal      = {CoRR},
  volume       = {abs/1812.10754},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.10754},
  eprinttype    = {arXiv},
  eprint       = {1812.10754},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-10754.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/LemanskaRT17,
  author       = {Magdalena Lemanska and
                  Juan Alberto Rodr{\'{\i}}guez{-}Vel{\'{a}}zquez and
                  Rolando Trujillo{-}Rasua},
  title        = {Similarities and Differences Between the Vertex Cover Number and the
                  Weakly Connected Domination Number of a Graph},
  journal      = {Fundam. Informaticae},
  volume       = {152},
  number       = {3},
  pages        = {273--287},
  year         = {2017},
  url          = {https://doi.org/10.3233/FI-2017-1520},
  doi          = {10.3233/FI-2017-1520},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/LemanskaRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GadyatskayaT17,
  author       = {Olga Gadyatskaya and
                  Rolando Trujillo{-}Rasua},
  editor       = {Peng Liu and
                  Sjouke Mauw and
                  Ketil St{\o}len},
  title        = {New Directions in Attack Tree Research: Catching up with Industrial
                  Needs},
  booktitle    = {Graphical Models for Security - 4th International Workshop, GraMSec
                  2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10744},
  pages        = {115--126},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-74860-3\_9},
  doi          = {10.1007/978-3-319-74860-3\_9},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/GadyatskayaT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GadyatskayaJMTW17,
  author       = {Olga Gadyatskaya and
                  Ravi Jhawar and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua and
                  Tim A. C. Willemse},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Refinement-Aware Generation of Attack Trees},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {164--179},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_11},
  doi          = {10.1007/978-3-319-68063-7\_11},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/GadyatskayaJMTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MauwRT17,
  author       = {Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz and
                  Rolando Trujillo{-}Rasua},
  title        = {Rethinking (k, {\unicode{120001}})-anonymity in social graphs: (k,
                  {\unicode{120001}})-adjacency anonymity and (k, {\unicode{120001}})-(adjacency)
                  anonymous transformations},
  journal      = {CoRR},
  volume       = {abs/1704.07078},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.07078},
  eprinttype    = {arXiv},
  eprint       = {1704.07078},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MauwRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Trujillo-RasuaY16,
  author       = {Rolando Trujillo{-}Rasua and
                  Ismael Gonz{\'{a}}lez Yero},
  title        = {Characterizing 1-Metric Antidimensional Trees and Unicyclic Graphs},
  journal      = {Comput. J.},
  volume       = {59},
  number       = {8},
  pages        = {1264--1273},
  year         = {2016},
  url          = {https://doi.org/10.1093/comjnl/bxw021},
  doi          = {10.1093/COMJNL/BXW021},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/Trujillo-RasuaY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Trujillo-RasuaY16,
  author       = {Rolando Trujillo{-}Rasua and
                  Ismael Gonz{\'{a}}lez Yero},
  title        = {k-Metric antidimension: {A} privacy measure for social graphs},
  journal      = {Inf. Sci.},
  volume       = {328},
  pages        = {403--417},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ins.2015.08.048},
  doi          = {10.1016/J.INS.2015.08.048},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/Trujillo-RasuaY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/TorresT16,
  author       = {Christof Ferreira Torres and
                  Rolando Trujillo{-}Rasua},
  editor       = {Silvio Ranise and
                  Vipin Swarup},
  title        = {The Fr{\'{e}}chet/Manhattan Distance and the Trajectory Anonymisation
                  Problem},
  booktitle    = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9766},
  pages        = {19--34},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-41483-6\_2},
  doi          = {10.1007/978-3-319-41483-6\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/TorresT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MauwTX16,
  author       = {Sjouke Mauw and
                  Rolando Trujillo{-}Rasua and
                  Bochuan Xuan},
  editor       = {Silvio Ranise and
                  Vipin Swarup},
  title        = {Counteracting Active Attacks in Social Network Graphs},
  booktitle    = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9766},
  pages        = {233--248},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-41483-6\_17},
  doi          = {10.1007/978-3-319-41483-6\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/MauwTX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/MauwTT16,
  author       = {Sjouke Mauw and
                  Jorge Toro{-}Pozo and
                  Rolando Trujillo{-}Rasua},
  title        = {A Class of Precomputation-Based Distance-Bounding Protocols},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages        = {97--111},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/EuroSP.2016.19},
  doi          = {10.1109/EUROSP.2016.19},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/MauwTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip8-1/FraileFGKST16,
  author       = {Marlon Fraile and
                  Margaret Ford and
                  Olga Gadyatskaya and
                  Rajesh Kumar and
                  Mari{\"{e}}lle Stoelinga and
                  Rolando Trujillo{-}Rasua},
  editor       = {Jennifer Horkoff and
                  Manfred A. Jeusfeld and
                  Anne Persson},
  title        = {Using Attack-Defense Trees to Analyze Threats and Countermeasures
                  in an {ATM:} {A} Case Study},
  booktitle    = {The Practice of Enterprise Modeling - 9th {IFIP} {WG} 8.1. Working
                  Conference, PoEM 2016, Sk{\"{o}}vde, Sweden, November 8-10, 2016,
                  Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {267},
  pages        = {326--334},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48393-1\_24},
  doi          = {10.1007/978-3-319-48393-1\_24},
  timestamp    = {Sun, 25 Jul 2021 11:49:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip8-1/FraileFGKST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qest/GadyatskayaJKLM16,
  author       = {Olga Gadyatskaya and
                  Ravi Jhawar and
                  Piotr Kordy and
                  Karim Lounis and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  editor       = {Gul Agha and
                  Benny Van Houdt},
  title        = {Attack Trees for Practical Security Assessment: Ranking of Attack
                  Scenarios with ADTool 2.0},
  booktitle    = {Quantitative Evaluation of Systems - 13th International Conference,
                  {QEST} 2016, Quebec City, QC, Canada, August 23-25, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9826},
  pages        = {159--162},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-43425-4\_10},
  doi          = {10.1007/978-3-319-43425-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/qest/GadyatskayaJKLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/MauwTT16,
  author       = {Sjouke Mauw and
                  Jorge Toro{-}Pozo and
                  Rolando Trujillo{-}Rasua},
  editor       = {Gerhard P. Hancke and
                  Konstantinos Markantonakis},
  title        = {Optimality Results on the Security of Lookup-Based Protocols},
  booktitle    = {Radio Frequency Identification and IoT Security - 12th International
                  Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2,
                  2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10155},
  pages        = {137--150},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62024-4\_10},
  doi          = {10.1007/978-3-319-62024-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/MauwTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JonkerMT16,
  author       = {Hugo L. Jonker and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {19--25},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_3},
  doi          = {10.1007/978-3-319-62033-6\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/JonkerMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/AvoineMT15,
  author       = {Gildas Avoine and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  title        = {Comparing distance bounding protocols: {A} critical mission supported
                  by decision theory},
  journal      = {Comput. Commun.},
  volume       = {67},
  pages        = {92--102},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comcom.2015.06.007},
  doi          = {10.1016/J.COMCOM.2015.06.007},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/AvoineMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/JhawarKMRT15,
  author       = {Ravi Jhawar and
                  Barbara Kordy and
                  Sjouke Mauw and
                  Sasa Radomirovic and
                  Rolando Trujillo{-}Rasua},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Attack Trees with Sequential Conjunction},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {339--353},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_23},
  doi          = {10.1007/978-3-319-18467-8\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/JhawarKMRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/Trujillo-RasuaD15,
  author       = {Rolando Trujillo{-}Rasua and
                  Josep Domingo{-}Ferrer},
  editor       = {Guillermo Navarro{-}Arribas and
                  Vicen{\c{c}} Torra},
  title        = {Privacy in Spatio-Temporal Databases: {A} Microaggregation-Based Approach},
  booktitle    = {Advanced Research in Data Privacy},
  series       = {Studies in Computational Intelligence},
  volume       = {567},
  pages        = {197--214},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-09885-2\_11},
  doi          = {10.1007/978-3-319-09885-2\_11},
  timestamp    = {Tue, 07 May 2024 20:28:19 +0200},
  biburl       = {https://dblp.org/rec/series/sci/Trujillo-RasuaD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JhawarKMRT15,
  author       = {Ravi Jhawar and
                  Barbara Kordy and
                  Sjouke Mauw and
                  Sasa Radomirovic and
                  Rolando Trujillo{-}Rasua},
  title        = {Attack Trees with Sequential Conjunction},
  journal      = {CoRR},
  volume       = {abs/1503.02261},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.02261},
  eprinttype    = {arXiv},
  eprint       = {1503.02261},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JhawarKMRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AvoineMT15,
  author       = {Gildas Avoine and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  title        = {Comparing Distance Bounding Protocols: a Critical Mission Supported
                  by Decision Theory},
  journal      = {CoRR},
  volume       = {abs/1503.04593},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.04593},
  eprinttype    = {arXiv},
  eprint       = {1503.04593},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AvoineMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/Trujillo-Rasua0A14,
  author       = {Rolando Trujillo{-}Rasua and
                  Benjamin Martin and
                  Gildas Avoine},
  title        = {Distance Bounding Facing Both Mafia and Distance Frauds},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {13},
  number       = {10},
  pages        = {5690--5698},
  year         = {2014},
  url          = {https://doi.org/10.1109/TWC.2014.2323979},
  doi          = {10.1109/TWC.2014.2323979},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/Trujillo-Rasua0A14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Trujillo-RasuaMA14,
  author       = {Rolando Trujillo{-}Rasua and
                  Benjamin Martin and
                  Gildas Avoine},
  title        = {Distance-bounding facing both mafia and distance frauds: Technical
                  report},
  journal      = {CoRR},
  volume       = {abs/1405.5704},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.5704},
  eprinttype    = {arXiv},
  eprint       = {1405.5704},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Trujillo-RasuaMA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Trujillo-RasuaY14,
  author       = {Rolando Trujillo{-}Rasua and
                  Ismael Gonz{\'{a}}lez Yero},
  title        = {k-Metric Antidimension: a Privacy Measure for Social Graphs},
  journal      = {CoRR},
  volume       = {abs/1408.2154},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.2154},
  eprinttype    = {arXiv},
  eprint       = {1408.2154},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Trujillo-RasuaY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Trujillo-Rasua14,
  author       = {Rolando Trujillo{-}Rasua},
  title        = {Complexity of distance fraud attacks in graph-based distance bounding},
  journal      = {CoRR},
  volume       = {abs/1412.6016},
  year         = {2014},
  url          = {http://arxiv.org/abs/1412.6016},
  eprinttype    = {arXiv},
  eprint       = {1412.6016},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Trujillo-Rasua14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/is/Trujillo-RasuaD13,
  author       = {Rolando Trujillo{-}Rasua and
                  Josep Domingo{-}Ferrer},
  title        = {On the privacy offered by (k, {\(\delta\)})-anonymity},
  journal      = {Inf. Syst.},
  volume       = {38},
  number       = {4},
  pages        = {491--494},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.is.2012.12.003},
  doi          = {10.1016/J.IS.2012.12.003},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/is/Trujillo-RasuaD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/Trujillo-Rasua13,
  author       = {Rolando Trujillo{-}Rasua},
  editor       = {Ivan Stojmenovic and
                  Zixue Cheng and
                  Song Guo},
  title        = {Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding},
  booktitle    = {Mobile and Ubiquitous Systems: Computing, Networking, and Services
                  - 10th International Conference, {MOBIQUITOUS} 2013, Tokyo, Japan,
                  December 2-4, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {131},
  pages        = {289--302},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-11569-6\_23},
  doi          = {10.1007/978-3-319-11569-6\_23},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/Trujillo-Rasua13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Trujillo-Rasua13,
  author       = {Rolando Trujillo{-}Rasua},
  title        = {Privacy in {RFID} and mobile objects},
  journal      = {CoRR},
  volume       = {abs/1310.5476},
  year         = {2013},
  url          = {http://arxiv.org/abs/1310.5476},
  eprinttype    = {arXiv},
  eprint       = {1310.5476},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Trujillo-Rasua13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/es/Rasua12,
  author       = {Rolando Trujillo{-}Rasua},
  title        = {Privacy in rfid and mobile objects},
  school       = {University of Rovira i Virgili, Spain},
  year         = {2012},
  url          = {http://hdl.handle.net/10803/86942},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/es/Rasua12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/Trujillo-RasuaSPD12,
  author       = {Rolando Trujillo{-}Rasua and
                  Agusti Solanas and
                  Pablo A. P{\'{e}}rez{-}Mart{\'{\i}}nez and
                  Josep Domingo{-}Ferrer},
  title        = {Predictive protocol for the scalable identification of {RFID} tags
                  through collaborative readers},
  journal      = {Comput. Ind.},
  volume       = {63},
  number       = {6},
  pages        = {557--573},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.compind.2012.03.005},
  doi          = {10.1016/J.COMPIND.2012.03.005},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cii/Trujillo-RasuaSPD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Domingo-FerrerT12,
  author       = {Josep Domingo{-}Ferrer and
                  Rolando Trujillo{-}Rasua},
  title        = {Microaggregation- and permutation-based anonymization of movement
                  data},
  journal      = {Inf. Sci.},
  volume       = {208},
  pages        = {55--80},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ins.2012.04.015},
  doi          = {10.1016/J.INS.2012.04.015},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/Domingo-FerrerT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Trujillo-RasuaS11,
  author       = {Rolando Trujillo{-}Rasua and
                  Agusti Solanas},
  title        = {Efficient probabilistic communication protocol for the private identification
                  of {RFID} tags by means of collaborative readers},
  journal      = {Comput. Networks},
  volume       = {55},
  number       = {15},
  pages        = {3211--3223},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comnet.2011.05.013},
  doi          = {10.1016/J.COMNET.2011.05.013},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Trujillo-RasuaS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/Fernandez-MirTCD11,
  author       = {Albert Fern{\`{a}}ndez{-}Mir and
                  Rolando Trujillo{-}Rasua and
                  Jordi Castell{\`{a}}{-}Roca and
                  Josep Domingo{-}Ferrer},
  editor       = {Ari Juels and
                  Christof Paar},
  title        = {A Scalable {RFID} Authentication Protocol Supporting Ownership Transfer
                  and Controlled Delegation},
  booktitle    = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec
                  2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7055},
  pages        = {147--162},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25286-0\_10},
  doi          = {10.1007/978-3-642-25286-0\_10},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rfidsec/Fernandez-MirTCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidta/Trujillo-RasuaS11,
  author       = {Rolando Trujillo{-}Rasua and
                  Agusti Solanas},
  title        = {Scalable trajectory-based protocol for {RFID} tags identification},
  booktitle    = {2011 {IEEE} International Conference on RFID-Technologies and Applications,
                  {RFID-TA} 2011, Sitges, Spain, September 15-16, 2011},
  pages        = {279--285},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/RFID-TA.2011.6068650},
  doi          = {10.1109/RFID-TA.2011.6068650},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidta/Trujillo-RasuaS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gis/Domingo-FerrerST10,
  author       = {Josep Domingo{-}Ferrer and
                  Michal Sramka and
                  Rolando Trujillo{-}Rasua},
  editor       = {Elisa Bertino and
                  Maria Luisa Damiani and
                  Y{\"{u}}cel Saygin},
  title        = {Privacy-preserving publication of trajectories using microaggregation},
  booktitle    = {Proceedings of the 3rd {ACM} {SIGSPATIAL} International Workshop on
                  Security and Privacy in {GIS} and LBS, {SPRINGL} 2010, November 2,
                  2010, San Jose, California, USA, Proceedings},
  pages        = {26--33},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1868470.1868478},
  doi          = {10.1145/1868470.1868478},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gis/Domingo-FerrerST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/Trujillo-RasuaMA10,
  author       = {Rolando Trujillo{-}Rasua and
                  Benjamin Martin and
                  Gildas Avoine},
  editor       = {Siddika Berna {\"{O}}rs Yal{\c{c}}in},
  title        = {The Poulidor Distance-Bounding Protocol},
  booktitle    = {Radio Frequency Identification: Security and Privacy Issues - 6th
                  International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6370},
  pages        = {239--257},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16822-2\_19},
  doi          = {10.1007/978-3-642-16822-2\_19},
  timestamp    = {Fri, 03 Sep 2021 17:40:55 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/Trujillo-RasuaMA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/antsw/ManiezzoRGGOT08,
  author       = {Vittorio Maniezzo and
                  Matteo Roffilli and
                  Roberto Gabrielli and
                  Alessandra Guidazzi and
                  Manuel Otero and
                  Rolando Trujillo{-}Rasua},
  editor       = {Marco Dorigo and
                  Mauro Birattari and
                  Christian Blum and
                  Maurice Clerc and
                  Thomas St{\"{u}}tzle and
                  Alan F. T. Winfield},
  title        = {Regional Traffic Assignment by {ACO}},
  booktitle    = {Ant Colony Optimization and Swarm Intelligence, 6th International
                  Conference, {ANTS} 2008, Brussels, Belgium, September 22-24, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5217},
  pages        = {409--410},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87527-7\_49},
  doi          = {10.1007/978-3-540-87527-7\_49},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/antsw/ManiezzoRGGOT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics