Rolando Trujillo Rasua

Rolando Trujillo Rasua
Adresse postale Université du Luxembourg
2, avenue de l'Université
L-4365 Esch-sur-Alzette
powered by
orbilu.uni.lu

Sous presse

Full Text
See detailSecurity of Distance−Bounding: A Survey
Gildas, Avoine; Muhammed, Ali Bingöl; Ioana, Boureanu; Srdjan, Čapkun; Gerhard, Hancke; Süleyman, Kardaş; Chong, Hee Kim; Cédric, Lauradoux; Benjamin, Martin; Jorge, Munilla; Alberto, Peinado; Kasper, Rasmussen; Dave, Singelée; Aslan, Tchamkerten; Trujillo Rasua, Rolando; Serge, Vaudenay

in ACM Computing Surveys (in press)

Full Text
See detailConditional adjacency anonymity in social graphs under active attacks
Mauw, Sjouke; Ramirez Cruz, Yunior; Trujillo Rasua, Rolando

in Knowledge and Information Systems (in press)

Top of Page

2018

Full Text
See detailNew Directions in Attack Tree Research: Catching up with Industrial Needs
Gadyatskaya, Olga; Trujillo Rasua, Rolando

in Mauw, Sjouke (Ed.) Proceedings of the 4th International Workshop on Graphical Models for Security (2018, January)

Full Text
See detailAnonymising social graphs in the presence of active attackers
Mauw, Sjouke; Ramirez Cruz, Yunior; Trujillo Rasua, Rolando

in Transactions on Data Privacy (2018), 11(2), 169-198

Full Text
See detailAutomated Identification of Desynchronisation Attacks on Shared Secrets
Mauw, Sjouke; Smith, Zachary Daniel; Toro Pozo, Jorge Luis; Trujillo Rasua, Rolando

in Automated Identification of Desynchronisation Attacks on Shared Secrets (2018, September)

Full Text
See detailDistance-Bounding Protocols: Verification without Time and Location
Mauw, Sjouke; Smith, Zachary Daniel; Toro Pozo, Jorge Luis; Trujillo Rasua, Rolando

(2018)

Top of Page

2017

Full Text
See detailRefinement-Aware Generation of Attack Trees
Gadyatskaya, Olga; Ravi, Jhawar; Mauw, Sjouke; Trujillo Rasua, Rolando; Tim, A.C. Willemse

in Livraga, Giovanni; Mitchell, Chris J. (Eds.) Security and Trust Management - 13th International Workshop (2017, September)

Full Text
See detailSimilarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph
Lemanska, Magdalena; Rodríguez-Velázquez, Alberto; Trujillo Rasua, Rolando

in Fundamenta Informaticae (2017), 152(3), 273-287

Top of Page

2016

Full Text
See detailThe Fréchet/Manhattan distance and the trajectory anonymisation problem
Ferreira Torres, Christof; Trujillo Rasua, Rolando

in Proceedings of Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference (DBSec 2016) (2016)

Full Text
See detailUsing attack-defense trees to analyze threats and countermeasures in an ATM: a case study
Fraile, Marlon; Ford, Margaret; Gadyatskaya, Olga; Kumar, Rajesh; Stoelinga, Mariëlle; Trujillo Rasua, Rolando

in IFIP Working Conference on The Practice of Enterprise Modeling (2016)

Full Text
See detailAttack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0
Gadyatskaya, Olga; Jhawar, Ravi; Kordy, Piotr; Lounis, Karim; Mauw, Sjouke; Trujillo Rasua, Rolando

in Quantitative Evaluation of Systems - 13th International Conference (2016)

Full Text
See detailOptimality Results on the Security of Lookup-Based Protocols
Mauw, Sjouke; Toro Pozo, Jorge Luis; Trujillo Rasua, Rolando

in Hancke, Gerard P.; Markantonakis, Konstantinos (Eds.) Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers (2016, December)

Full Text
See detailA class of precomputation-based distance-bounding protocols
Mauw, Sjouke; Toro Pozo, Jorge Luis; Trujillo Rasua, Rolando

Presentation (2016, March 16)

Full Text
See detailA Class of Precomputation-based Distance-bounding Protocols
Mauw, Sjouke; Toro Pozo, Jorge Luis; Trujillo Rasua, Rolando

in Proceedings of the 1st IEEE European Symposium on Security and Privacy (2016)

Full Text
See detailCounteracting active attacks in social network graphs
Mauw, Sjouke; Trujillo Rasua, Rolando; Xuan, Bochuan

in Proceedings of Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference (DBSec 2016) (2016)

Full Text
See detailk-Metric antidimension: A privacy measure for social graphs
Trujillo Rasua, Rolando; Yero, Ismael G.

in Information Sciences (2016), 328

Full Text
See detailCharacterizing 1-metric antidimensional trees and unicyclic graphs
Trujillo Rasua, Rolando; Yero, Ismael G.

in Computer Journal (2016), 59(8), 1264--1273

Top of Page

2015

Full Text
See detailComparing distance bounding protocols: A critical mission supported by decision theory
Avoine, Gildas; Mauw, Sjouke; Trujillo Rasua, Rolando

in Computer Communications (2015), 67

Full Text
See detailAttack Trees with Sequential Conjunction
Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirovic, Sasa; Trujillo Rasua, Rolando

in Proceedings of the 30th IFIP TC 11 International Conference ICT Systems Security and Privacy Protection (SEC 2015) (2015)

Full Text
See detailPrivacy in Spatio-Temporal Databases: A Microaggregation-Based Approach
Trujillo Rasua, Rolando; Domingo-Ferrer, Josep

in Navarro-Arribas, Guillermo; Vicenç, Torra (Eds.) Advanced Research in Data Privacy (2015)

Full Text
See detailk-Metric Antidimension: a Privacy Measure for Social Graphs
Trujillo Rasua, Rolando; Yero, Ismael G.

in Information Sciences (2015), 328

Top of Page

2014

Full Text
See detailDistance Bounding Facing Both Mafia and Distance Frauds
Trujillo Rasua, Rolando; Martin, Benjamin; Avoine, Gildas

in IEEE Transactions on Wireless Communications (2014), 13(10), 56905698

Top of Page

2013

Full Text
See detailPrivacy in RFID and mobile objects
Trujillo Rasua, Rolando

Doctoral thesis (2013)

Full Text
See detailComplexity of Distance Fraud Attacks in Graph-Based Distance Bounding
Trujillo Rasua, Rolando

in Stojmenovic, Ivan; Zixue, Cheng; Song, Guo (Eds.) Mobile and Ubiquitous Systems: Computing, Networking, and Services - 10th International Conference (2013)

Full Text
See detailOn the privacy offered by (k,δ)-anonymity
Trujillo Rasua, Rolando; Domingo-Ferrer, Josep

in Information Systems (2013), 38(4), 491-494

Top of Page

2012

Full Text
See detailMicroaggregation-and permutation-based anonymization of movement data
Domingo-Ferrer, Josep; Trujillo Rasua, Rolando

in Information Sciences (2012), 208

Full Text
See detailMicroaggregation-and Permutation-Based Anonymization of Mobility Data
Domingo-Ferrer, Josep; Trujillo Rasua, Rolando

in Information Sciences (2012), 208

Top of Page

2011

Full Text
See detailAnonymization of trajectory data
Domingo-Ferrer, Josep; Trujillo Rasua, Rolando

in Advanced Research in Data Privacy (2011)

Full Text
See detailA scalable RFID authentication protocol supporting ownership transfer and controlled delegation
Fernandez-Mir, Albert; Trujillo Rasua, Rolando; Castellà-Roca, Jordi; Domingo-Ferrer, Josep

in International Workshop on Radio Frequency Identification: Security and Privacy Issues (2011)

Full Text
See detailScalable trajectory-based protocol for RFID tags identification
Trujillo Rasua, Rolando; Solanas, Agusti

in IEEE International Conference on RFID-Technologies and Applications (RFID-TA 2011) (2011)

Full Text
See detailEfficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers
Trujillo Rasua, Rolando; Solanas, Agusti

in Computer Networks (2011), 55(15), 3211--3223

Top of Page

2010

Full Text
See detailPrivacy-preserving publication of trajectories using microaggregation
Domingo-Ferrer, Josep; Sramka, Michal; Trujillo Rasua, Rolando

in Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (2010)

Full Text
See detailThe Poulidor distance-bounding protocol
Trujillo Rasua, Rolando; Martin, Benjamin; Avoine, Gildas

in Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop (RFIDSec 2010) (2010)

Top of Page