Profil

TRUJILLO RASUA Rolando

Main Referenced Co-authors
MAUW, Sjouke  (16)
Domingo-Ferrer, Josep (7)
TORO POZO, Jorge Luis  (6)
GADYATSKAYA, Olga  (5)
RAMIREZ CRUZ, Yunior  (4)
Main Referenced Keywords
security (2); anonymity (1); Attack trees (1); attack trees (1); automated generation (1);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Other (3)
ULHPC - University of Luxembourg: High Performance Computing (1)
Main Referenced Disciplines
Computer science (37)
Mathematics (1)

Publications (total 37)

The most downloaded
639 downloads
Mauw, S., Toro Pozo, J. L., & Trujillo Rasua, R. (16 March 2016). A class of precomputation-based distance-bounding protocols [Paper presentation]. Grande Region Security and Reliability Day 2016, Nancy, France. https://hdl.handle.net/10993/26836

The most cited

80 citations (Scopus®)

Domingo-Ferrer, J., & Trujillo Rasua, R. (2012). Microaggregation-and Permutation-Based Anonymization of Mobility Data. Information Sciences, 208, 55--80. doi:10.1016/j.ins.2012.04.015 https://hdl.handle.net/10993/28771

Gildas, A., Muhammed, A. B., Ioana, B., Srdjan, Č., Gerhard, H., Süleyman, K., Chong, H. K., Cédric, L., Benjamin, M., Jorge, M., Alberto, P., Kasper, R., Dave, S., Aslan, T., Trujillo Rasua, R., & Serge, V. (In press). Security of Distance−Bounding: A Survey. ACM Computing Surveys. doi:10.1145/3264628
Peer Reviewed verified by ORBi

Mauw, S., Ramirez Cruz, Y., & Trujillo Rasua, R. (27 February 2022). Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation. Knowledge and Information Systems, 64, 1077-1100. doi:https://doi.org/10.1007/s10115-022-01662-z
Peer Reviewed verified by ORBi

Buldas, A., Gadyatskaya, O., Lenin, A., Mauw, S., & Trujillo Rasua, R. (2020). Attribute evaluation on attack trees with incomplete information. Computers and Security, 88 (101630). doi:10.1016/j.cose.2019.101630
Peer Reviewed verified by ORBi

Mauw, S., Smith, Z. D., Trujillo Rasua, R., & Toro Pozo, J. L. (2019). Post-collusion security and distance bounding. In Post-collusion security and distance bounding.
Peer reviewed

Mauw, S., Ramirez Cruz, Y., & Trujillo Rasua, R. (September 2019). Robust active attacks on social graphs. Data Mining and Knowledge Discovery, 33 (5), 1357-1392. doi:10.1007/s10618-019-00631-5
Peer Reviewed verified by ORBi

Mauw, S., Smith, Z. D., Toro Pozo, J. L., & Trujillo Rasua, R. (2018). Automated Identification of Desynchronisation Attacks on Shared Secrets. In Automated Identification of Desynchronisation Attacks on Shared Secrets. Springer. doi:10.1007/978-3-319-99073-6_20
Peer reviewed

Mauw, S., Ramirez Cruz, Y., & Trujillo Rasua, R. (August 2018). Anonymising social graphs in the presence of active attackers. Transactions on Data Privacy, 11 (2), 169-198.
Peer reviewed

Mauw, S., Smith, Z. D., Toro Pozo, J. L., & Trujillo Rasua, R. (2018). Distance-Bounding Protocols: Verification without Time and Location. In Proceedings of IEEE Symposium on Security and Privacy (SP), San Francisco 21-23 May 2018. United States - New York: IEEE Computer Society. doi:10.1109/SP.2018.00001
Peer reviewed

Mauw, S., Ramirez Cruz, Y., & Trujillo Rasua, R. (2018). Conditional adjacency anonymity in social graphs under active attacks. Knowledge and Information Systems. doi:10.1007/s10115-018-1283-x
Peer reviewed

Gadyatskaya, O., & Trujillo Rasua, R. (2018). New Directions in Attack Tree Research: Catching up with Industrial Needs. In S. Mauw, Proceedings of the 4th International Workshop on Graphical Models for Security. Springer. doi:10.1007/978-3-319-74860-3_9
Peer reviewed

Gadyatskaya, O., Ravi, J., Mauw, S., Trujillo Rasua, R., & Tim, A. C. W. (2017). Refinement-Aware Generation of Attack Trees. In G. Livraga & C. J. Mitchell, Security and Trust Management - 13th International Workshop (pp. 164-179). Springer.
Peer reviewed

Lemanska, M., Rodríguez-Velázquez, A., & Trujillo Rasua, R. (2017). Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph. Fundamenta Informaticae, 152 (3), 273-287. doi:10.3233/FI-2017-1520
Peer Reviewed verified by ORBi

Mauw, S., Toro Pozo, J. L., & Trujillo Rasua, R. (2016). Optimality Results on the Security of Lookup-Based Protocols. In G. P. Hancke & K. Markantonakis (Eds.), Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers (pp. 137-150). Springer. doi:10.1007/978-3-319-62024-4_10
Peer reviewed

Mauw, S., Toro Pozo, J. L., & Trujillo Rasua, R. (16 March 2016). A class of precomputation-based distance-bounding protocols [Paper presentation]. Grande Region Security and Reliability Day 2016, Nancy, France.

Fraile, M., Ford, M., Gadyatskaya, O., Kumar, R., Stoelinga, M., & Trujillo Rasua, R. (2016). Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study. In IFIP Working Conference on The Practice of Enterprise Modeling (pp. 326-334). doi:10.1007/978-3-319-48393-1_24
Peer reviewed

Gadyatskaya, O., Jhawar, R., Kordy, P., Lounis, K., Mauw, S., & Trujillo Rasua, R. (2016). Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0. In Quantitative Evaluation of Systems - 13th International Conference (Lecture Notes in Computer Science, pp. 159--162). Quebec, Canada: Springer. doi:10.1007/978-3-319-43425-4_10
Peer reviewed

Trujillo Rasua, R., & Yero, I. G. (2016). k-Metric antidimension: A privacy measure for social graphs. Information Sciences, 328, 403--417. doi:10.1016/j.ins.2015.08.048
Peer reviewed

Trujillo Rasua, R., & Yero, I. G. (2016). Characterizing 1-metric antidimensional trees and unicyclic graphs. Computer Journal, 59 (8), 1264--1273. doi:10.1093/comjnl/bxw021
Peer Reviewed verified by ORBi

Mauw, S., Trujillo Rasua, R., & Xuan, B. (2016). Counteracting active attacks in social network graphs. In Proceedings of Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference (DBSec 2016) (Lecture Notes in Computer Science, pp. 233--248). Springer.
Peer reviewed

Ferreira Torres, C., & Trujillo Rasua, R. (2016). The Fréchet/Manhattan distance and the trajectory anonymisation problem. In Proceedings of Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference (DBSec 2016) (Lecture Notes in Computer Science). Springer.
Peer reviewed

Mauw, S., Toro Pozo, J. L., & Trujillo Rasua, R. (2016). A Class of Precomputation-based Distance-bounding Protocols. In Proceedings of the 1st IEEE European Symposium on Security and Privacy. doi:10.1109/EuroS&P.2016.19
Peer reviewed

Trujillo Rasua, R., & Yero, I. G. (2015). k-Metric Antidimension: a Privacy Measure for Social Graphs. Information Sciences, 328, 403 – 417. doi:10.1016/j.ins.2015.08.048
Peer reviewed

Trujillo Rasua, R., & Domingo-Ferrer, J. (2015). Privacy in Spatio-Temporal Databases: A Microaggregation-Based Approach. In G. Navarro-Arribas & T. Vicenç (Eds.), Advanced Research in Data Privacy (pp. 197-214). Springer.
Peer reviewed

Avoine, G., Mauw, S., & Trujillo Rasua, R. (2015). Comparing distance bounding protocols: A critical mission supported by decision theory. Computer Communications, 67, 92–102. doi:10.1016/j.comcom.2015.06.007
Peer Reviewed verified by ORBi

Jhawar, R., Kordy, B., Mauw, S., Radomirovic, S., & Trujillo Rasua, R. (2015). Attack Trees with Sequential Conjunction. In Proceedings of the 30th IFIP TC 11 International Conference ICT Systems Security and Privacy Protection (SEC 2015) (pp. 339--353). Springer.
Peer reviewed

Trujillo Rasua, R., Martin, B., & Avoine, G. (2014). Distance Bounding Facing Both Mafia and Distance Frauds. IEEE Transactions on Wireless Communications, 13 (10), 5690–5698. doi:10.1109/TWC.2014.2323979
Peer Reviewed verified by ORBi

Trujillo Rasua, R., & Domingo-Ferrer, J. (2013). On the privacy offered by (k,δ)-anonymity. Information Systems, 38 (4), 491-494. doi:10.1016/j.is.2012.12.003
Peer Reviewed verified by ORBi

Trujillo Rasua, R. (2013). Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding. In I. Stojmenovic, C. Zixue, ... G. Song (Eds.), Mobile and Ubiquitous Systems: Computing, Networking, and Services - 10th International Conference (Revised Selected Papers). Springer. doi:10.1007/978-3-319-11569-6_23
Peer reviewed

Trujillo Rasua, R. (2013). Privacy in RFID and mobile objects [Doctoral thesis, Universitat Rovira i Virgili]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/34139

Domingo-Ferrer, J., & Trujillo Rasua, R. (2012). Microaggregation-and Permutation-Based Anonymization of Mobility Data. Information Sciences, 208, 55--80. doi:10.1016/j.ins.2012.04.015
Peer reviewed

Domingo-Ferrer, J., & Trujillo Rasua, R. (2012). Microaggregation-and permutation-based anonymization of movement data. Information Sciences, 208, 55--80. doi:10.1016/j.ins.2012.04.015
Peer reviewed

Trujillo Rasua, R., & Solanas, A. (2011). Scalable trajectory-based protocol for RFID tags identification. In IEEE International Conference on RFID-Technologies and Applications (RFID-TA 2011) (pp. 279--285). doi:10.1109/RFID-TA.2011.6068650
Peer reviewed

Fernandez-Mir, A., Trujillo Rasua, R., Castellà-Roca, J., & Domingo-Ferrer, J. (2011). A scalable RFID authentication protocol supporting ownership transfer and controlled delegation. In International Workshop on Radio Frequency Identification: Security and Privacy Issues (Lecture Notes in Computer Science, pp. 147--162). Springer.
Peer reviewed

Domingo-Ferrer, J., & Trujillo Rasua, R. (2011). Anonymization of trajectory data. In Advanced Research in Data Privacy. Springer.
Peer reviewed

Trujillo Rasua, R., & Solanas, A. (2011). Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers. Computer Networks, 55 (15), 3211--3223. doi:10.1016/j.comnet.2011.05.013
Peer reviewed

Domingo-Ferrer, J., Sramka, M., & Trujillo Rasua, R. (2010). Privacy-preserving publication of trajectories using microaggregation. In Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (pp. 26--33). doi:10.1145/1868470.1868478
Peer reviewed

Trujillo Rasua, R., Martin, B., & Avoine, G. (2010). The Poulidor distance-bounding protocol. In Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop (RFIDSec 2010) (Lecture Notes in Computer Science, pp. 239--257). Springer.
Peer reviewed

Contact ORBilu