![]() ![]() | Gildas, A., Muhammed, A. B., Ioana, B., Srdjan, Č., Gerhard, H., Süleyman, K., Chong, H. K., Cédric, L., Benjamin, M., Jorge, M., Alberto, P., Kasper, R., Dave, S., Aslan, T., TRUJILLO RASUA, R., & Serge, V. (In press). Security of Distance−Bounding: A Survey. ACM Computing Surveys. doi:10.1145/3264628 ![]() |
![]() ![]() | MAUW, S., RAMIREZ CRUZ, Y., & TRUJILLO RASUA, R. (27 February 2022). Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation. Knowledge and Information Systems, 64, 1077-1100. doi:10.1007/s10115-022-01662-z ![]() |
![]() ![]() | Buldas, A., GADYATSKAYA, O., Lenin, A., MAUW, S., & TRUJILLO RASUA, R. (2020). Attribute evaluation on attack trees with incomplete information. Computers and Security, 88 (101630). doi:10.1016/j.cose.2019.101630 ![]() |
![]() ![]() | MAUW, S., SMITH, Z. D., TRUJILLO RASUA, R., & TORO POZO, J. L. (2019). Post-collusion security and distance bounding. In Post-collusion security and distance bounding. ![]() |
![]() ![]() | MAUW, S., RAMIREZ CRUZ, Y., & TRUJILLO RASUA, R. (September 2019). Robust active attacks on social graphs. Data Mining and Knowledge Discovery, 33 (5), 1357-1392. doi:10.1007/s10618-019-00631-5 ![]() |
![]() ![]() | MAUW, S., SMITH, Z. D., TORO POZO, J. L., & TRUJILLO RASUA, R. (2018). Automated Identification of Desynchronisation Attacks on Shared Secrets. In Automated Identification of Desynchronisation Attacks on Shared Secrets. Springer. doi:10.1007/978-3-319-99073-6_20 ![]() |
![]() ![]() | MAUW, S., RAMIREZ CRUZ, Y., & TRUJILLO RASUA, R. (August 2018). Anonymising social graphs in the presence of active attackers. Transactions on Data Privacy, 11 (2), 169-198. ![]() |
![]() ![]() | GADYATSKAYA, O., & TRUJILLO RASUA, R. (2018). New Directions in Attack Tree Research: Catching up with Industrial Needs. In S. MAUW, Proceedings of the 4th International Workshop on Graphical Models for Security. Springer. doi:10.1007/978-3-319-74860-3_9 ![]() |
![]() ![]() | MAUW, S., RAMIREZ CRUZ, Y., & TRUJILLO RASUA, R. (2018). Conditional adjacency anonymity in social graphs under active attacks. Knowledge and Information Systems. doi:10.1007/s10115-018-1283-x ![]() |
![]() ![]() | MAUW, S., SMITH, Z. D., TORO POZO, J. L., & TRUJILLO RASUA, R. (2018). Distance-Bounding Protocols: Verification without Time and Location. In Proceedings of IEEE Symposium on Security and Privacy (SP), San Francisco 21-23 May 2018. United States - New York: IEEE Computer Society. doi:10.1109/SP.2018.00001 ![]() |
![]() ![]() | GADYATSKAYA, O., Ravi, J., MAUW, S., TRUJILLO RASUA, R., & Tim, A. C. W. (2017). Refinement-Aware Generation of Attack Trees. In G. Livraga & C. J. Mitchell, Security and Trust Management - 13th International Workshop (pp. 164-179). Springer. ![]() |
![]() ![]() | Lemanska, M., Rodríguez-Velázquez, A., & TRUJILLO RASUA, R. (2017). Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph. Fundamenta Informaticae, 152 (3), 273-287. doi:10.3233/FI-2017-1520 ![]() |
![]() ![]() | MAUW, S., TORO POZO, J. L., & TRUJILLO RASUA, R. (2016). Optimality Results on the Security of Lookup-Based Protocols. In G. P. Hancke & K. Markantonakis (Eds.), Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers (pp. 137-150). Springer. doi:10.1007/978-3-319-62024-4_10 ![]() |
![]() ![]() | MAUW, S., TORO POZO, J. L., & TRUJILLO RASUA, R. (16 March 2016). A class of precomputation-based distance-bounding protocols [Paper presentation]. Grande Region Security and Reliability Day 2016, Nancy, France. |
![]() ![]() | TRUJILLO RASUA, R., & Yero, I. G. (2016). Characterizing 1-metric antidimensional trees and unicyclic graphs. Computer Journal, 59 (8), 1264--1273. doi:10.1093/comjnl/bxw021 ![]() |
![]() ![]() | GADYATSKAYA, O., JHAWAR, R., KORDY, P., LOUNIS, K., MAUW, S., & TRUJILLO RASUA, R. (2016). Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0. In Quantitative Evaluation of Systems - 13th International Conference (Lecture Notes in Computer Science, pp. 159--162). Quebec, Canada: Springer. doi:10.1007/978-3-319-43425-4_10 ![]() |
![]() ![]() | Fraile, M., Ford, M., GADYATSKAYA, O., Kumar, R., Stoelinga, M., & TRUJILLO RASUA, R. (2016). Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study. In IFIP Working Conference on The Practice of Enterprise Modeling (pp. 326-334). doi:10.1007/978-3-319-48393-1_24 ![]() |
![]() ![]() | MAUW, S., TRUJILLO RASUA, R., & Xuan, B. (2016). Counteracting active attacks in social network graphs. In Proceedings of Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference (DBSec 2016) (Lecture Notes in Computer Science, pp. 233--248). Springer. ![]() |
![]() ![]() | MAUW, S., TORO POZO, J. L., & TRUJILLO RASUA, R. (2016). A Class of Precomputation-based Distance-bounding Protocols. In Proceedings of the 1st IEEE European Symposium on Security and Privacy. doi:10.1109/EuroS&P.2016.19 ![]() |
![]() ![]() | TRUJILLO RASUA, R., & Yero, I. G. (2016). k-Metric antidimension: A privacy measure for social graphs. Information Sciences, 328, 403--417. doi:10.1016/j.ins.2015.08.048 ![]() |
![]() ![]() | FERREIRA TORRES, C., & TRUJILLO RASUA, R. (2016). The Fréchet/Manhattan distance and the trajectory anonymisation problem. In Proceedings of Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference (DBSec 2016) (Lecture Notes in Computer Science). Springer. ![]() |
![]() ![]() | TRUJILLO RASUA, R., & Yero, I. G. (2015). k-Metric Antidimension: a Privacy Measure for Social Graphs. Information Sciences, 328, 403 – 417. doi:10.1016/j.ins.2015.08.048 ![]() |
![]() ![]() | Avoine, G., MAUW, S., & TRUJILLO RASUA, R. (2015). Comparing distance bounding protocols: A critical mission supported by decision theory. Computer Communications, 67, 92–102. doi:10.1016/j.comcom.2015.06.007 ![]() |
![]() ![]() | TRUJILLO RASUA, R., & Domingo-Ferrer, J. (2015). Privacy in Spatio-Temporal Databases: A Microaggregation-Based Approach. In G. Navarro-Arribas & T. Vicenç (Eds.), Advanced Research in Data Privacy (pp. 197-214). Springer. ![]() |
![]() ![]() | JHAWAR, R., Kordy, B., MAUW, S., Radomirovic, S., & TRUJILLO RASUA, R. (2015). Attack Trees with Sequential Conjunction. In Proceedings of the 30th IFIP TC 11 International Conference ICT Systems Security and Privacy Protection (SEC 2015) (pp. 339--353). Springer. ![]() |
![]() ![]() | TRUJILLO RASUA, R., Martin, B., & Avoine, G. (2014). Distance Bounding Facing Both Mafia and Distance Frauds. IEEE Transactions on Wireless Communications, 13 (10), 5690–5698. doi:10.1109/TWC.2014.2323979 ![]() |
![]() ![]() | TRUJILLO RASUA, R., & Domingo-Ferrer, J. (2013). On the privacy offered by (k,δ)-anonymity. Information Systems, 38 (4), 491-494. doi:10.1016/j.is.2012.12.003 ![]() |
![]() ![]() | TRUJILLO RASUA, R. (2013). Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding. In I. Stojmenovic, C. Zixue, ... G. Song (Eds.), Mobile and Ubiquitous Systems: Computing, Networking, and Services - 10th International Conference (Revised Selected Papers). Springer. doi:10.1007/978-3-319-11569-6_23 ![]() |
![]() ![]() | TRUJILLO RASUA, R. (2013). Privacy in RFID and mobile objects [Doctoral thesis, Universitat Rovira i Virgili]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/34139 |
![]() ![]() | Domingo-Ferrer, J., & TRUJILLO RASUA, R. (2012). Microaggregation-and Permutation-Based Anonymization of Mobility Data. Information Sciences, 208, 55--80. doi:10.1016/j.ins.2012.04.015 ![]() |
![]() ![]() | Domingo-Ferrer, J., & TRUJILLO RASUA, R. (2012). Microaggregation-and permutation-based anonymization of movement data. Information Sciences, 208, 55--80. doi:10.1016/j.ins.2012.04.015 ![]() |
![]() ![]() | TRUJILLO RASUA, R., & Solanas, A. (2011). Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers. Computer Networks, 55 (15), 3211--3223. doi:10.1016/j.comnet.2011.05.013 ![]() |
![]() ![]() | TRUJILLO RASUA, R., & Solanas, A. (2011). Scalable trajectory-based protocol for RFID tags identification. In IEEE International Conference on RFID-Technologies and Applications (RFID-TA 2011) (pp. 279--285). doi:10.1109/RFID-TA.2011.6068650 ![]() |
![]() ![]() | Domingo-Ferrer, J., & TRUJILLO RASUA, R. (2011). Anonymization of trajectory data. In Advanced Research in Data Privacy. Springer. ![]() |
![]() ![]() | Fernandez-Mir, A., TRUJILLO RASUA, R., Castellà-Roca, J., & Domingo-Ferrer, J. (2011). A scalable RFID authentication protocol supporting ownership transfer and controlled delegation. In International Workshop on Radio Frequency Identification: Security and Privacy Issues (Lecture Notes in Computer Science, pp. 147--162). Springer. ![]() |
![]() ![]() | Domingo-Ferrer, J., Sramka, M., & TRUJILLO RASUA, R. (2010). Privacy-preserving publication of trajectories using microaggregation. In Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (pp. 26--33). doi:10.1145/1868470.1868478 ![]() |
![]() ![]() | TRUJILLO RASUA, R., Martin, B., & Avoine, G. (2010). The Poulidor distance-bounding protocol. In Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop (RFIDSec 2010) (Lecture Notes in Computer Science, pp. 239--257). Springer. ![]() |