default search action
Ruben Rios
Person information
- affiliation: University of Malaga, Spain
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Antonio Muñoz, Ruben Rios, Rodrigo Román, Javier López:
A survey on the (in)security of trusted execution environments. Comput. Secur. 129: 103180 (2023) - [c13]Elena Molina, Ruben Rios, Isaac Agudo:
An empirical evaluation of BLE for ITS scenarios. VTC Fall 2023: 1-5 - [e2]Ruben Rios, Joachim Posegga:
Security and Trust Management - 19th International Workshop, STM 2023, The Hague, The Netherlands, September 28, 2023, Proceedings. Lecture Notes in Computer Science 14336, Springer 2023, ISBN 978-3-031-47197-1 [contents] - 2022
- [j14]Ruben Rios, Jose Antonio Onieva, Rodrigo Roman, Javier López:
Personal IoT Privacy Control at the Edge. IEEE Secur. Priv. 20(1): 23-32 (2022) - [j13]Xueou Wang, Xiaolu Hou, Ruben Rios, Nils Ole Tippenhauer, Martín Ochoa:
Constrained Proximity Attacks on Mobile Targets. ACM Trans. Priv. Secur. 25(2): 10:1-10:29 (2022) - 2020
- [c12]Juan E. Rubio, Cristina Alcaraz, Ruben Rios, Rodrigo Roman, Javier López:
Distributed Detection of APTs: Consensus vs. Clustering. ESORICS (1) 2020: 174-192
2010 – 2019
- 2019
- [j12]Ana Nieto, Ruben Rios:
Cybersecurity profiles based on human-centric IoT devices. Hum. centric Comput. Inf. Sci. 9: 39 (2019) - [j11]Rodrigo Roman, Ruben Rios, Jose Antonio Onieva, Javier López:
Immune System for the Internet of Things Using Edge Technologies. IEEE Internet Things J. 6(3): 4774-4781 (2019) - [j10]Jose Antonio Onieva, Ruben Rios, Rodrigo Roman, Javier López:
Edge-Assisted Vehicular Networks Security. IEEE Internet Things J. 6(5): 8038-8045 (2019) - [p1]Ana Nieto, Ruben Rios, Javier López, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Privacy-aware digital forensics. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 157-195 - 2018
- [j9]Ruben Rios, M. Carmen Fernández Gago, Javier López:
Modelling privacy-aware trust negotiations. Comput. Secur. 77: 773-789 (2018) - [j8]Ana Nieto, Ruben Rios, Javier López:
IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations. Sensors 18(2): 492 (2018) - [c11]Xueou Wang, Xiaolu Hou, Ruben Rios, Per A. Hallgren, Nils Ole Tippenhauer, Martín Ochoa:
Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies. ESORICS (2) 2018: 373-392 - [e1]Joaquín García-Alfaro, Jordi Herrera-Joancomartí, Giovanni Livraga, Ruben Rios:
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings. Lecture Notes in Computer Science 11025, Springer 2018, ISBN 978-3-030-00304-3 [contents] - 2017
- [j7]Javier López, Ruben Rios, Feng Bao, Guilin Wang:
Evolving privacy: From sensors to the Internet of Things. Future Gener. Comput. Syst. 75: 46-57 (2017) - [c10]Ruben Rios, Rodrigo Roman, Jose Antonio Onieva, Javier López:
From SMOG to Fog: A security perspective. FMEC 2017: 56-61 - [c9]Ruben Rios, David Nuñez, Javier López:
Query Privacy in Sensing-as-a-Service Platforms. SEC 2017: 141-154 - [c8]Ana Nieto, Ruben Rios, Javier López:
A Methodology for Privacy-Aware IoT-Forensics. TrustCom/BigDataSE/ICESS 2017: 626-633 - [c7]Ana Nieto, Ruben Rios, Javier López:
Digital Witness and Privacy in IoT: Anonymous Witnessing Approach. TrustCom/BigDataSE/ICESS 2017: 642-649 - 2016
- [b1]Ruben Rios, Javier López, Jorge Cuéllar:
Location Privacy in Wireless Sensor Networks. CRC Press / Taylor & Francis 2016, ISBN 9781498776332 - [c6]Ruben Rios, M. Carmen Fernández Gago, Javier López:
Privacy-Aware Trust Negotiation. STM 2016: 98-105 - 2015
- [j6]Ruben Rios, Jorge Cuéllar, Javier López:
Probabilistic receiver-location privacy protection in wireless sensor networks. Inf. Sci. 321: 205-223 (2015) - 2014
- [c5]Javier López, Ruben Rios, Jorge Cuéllar:
Preserving Receiver-Location Privacy in Wireless Sensor Networks. ISPEC 2014: 15-27 - 2013
- [j5]Ruben Rios, Jose Antonio Onieva, Javier López:
Covert communications through network configuration messages. Comput. Secur. 39: 34-46 (2013) - [j4]Isaac Agudo, Ruben Rios, Javier López:
A privacy-aware continuous authentication scheme for proximity-based access control. Comput. Secur. 39: 117-126 (2013) - [j3]Ruben Rios, Javier López:
(Un)Suitability of Anonymous Communication Systems to WSN. IEEE Syst. J. 7(2): 298-310 (2013) - [c4]Ruben Rios, Javier López, Jorge Cuéllar:
Location Privacy in WSNs: Solutions, Challenges, and Future Trends. FOSAD 2013: 244-282 - 2012
- [c3]Ruben Rios, Jorge Cuéllar, Javier López:
Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN. ESORICS 2012: 163-180 - [c2]Jorge Cuéllar, Martín Ochoa, Ruben Rios:
Indistinguishable regions in geographic privacy. SAC 2012: 1463-1469 - [c1]Ruben Rios, Jose Antonio Onieva, Javier López:
HIDE_DHCP: Covert Communications through Network Configuration Messages. SEC 2012: 162-173 - 2011
- [j2]Ruben Rios, Javier López:
Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks. Comput. J. 54(10): 1603-1615 (2011) - [j1]Ruben Rios, Javier López:
Analysis of location privacy solutions in wireless sensor networks. IET Commun. 5(17): 2518-2532 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint