Javier Lopez
Javier Lopez
Professor of Computer Science, University of Malaga
Потвърден имейл адрес: lcc.uma.es
On the features and challenges of security and privacy in distributed internet of things
R Roman, J Zhou, J Lopez
Computer Networks 57 (10), 2266-2279, 2013
Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges
R Roman, J Lopez, M Mambo
Future Generation Computer Systems 78, 680-698, 2018
Securing the internet of things
R Roman, P Najera, J Lopez
Computer 44 (9), 51-58, 2011
Trust management systems for wireless sensor networks: Best practices
J Lopez, R Roman, I Agudo, C Fernandez-Gago
Computer Communications 33 (9), 1086-1093, 2010
Key management systems for sensor networks in the context of the Internet of Things
R Roman, C Alcaraz, J Lopez, N Sklavos
Computers & Electrical Engineering 37 (2), 147-159, 2011
Applying intrusion detection systems to wireless sensor networks
R Roman, J Zhou, J Lopez
IEEE Consumer Communications & Networking Conference (CCNC 2006), 2006
A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services
I Stellios, P Kotzanikolaou, M Psarakis, C Alcaraz, J Lopez
IEEE Communications Surveys & Tutorials 20 (4), 3453-3495, 2018
Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?
C Alcaraz, P Najera, J Lopez, R Roman
1st International Workshop on the Security of the Internet of Things (SecIoT'10), 2010
Evolving privacy: From sensors to the Internet of Things
J Lopez, R Rios, F Bao, G Wang
Future Generation Computer Systems 75, 46-57, 2017
Integrating wireless sensor networks and the internet: a security analysis
R Roman, J Lopez
Internet Research 19 (2), 246-259, 2009
A security analysis for wireless sensor mesh networks in highly critical systems
C Alcaraz, J Lopez
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010
Analysis of security threats, requirements, technologies and standards in wireless sensor networks
J Lopez, R Roman, C Alcaraz
Foundations of Security Analysis and Design V, 289-338, 2009
A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes
R Roman, C Alcaraz, J Lopez
Mobile Networks and Applications 12 (4), 231-244, 2007
Authentication and authorization infrastructures (AAIs): a comparative survey
J Lopez, R Oppliger, G Pernul
Computers & Security 23 (7), 578-590, 2004
Overview of wireless sensor network security
J Lopez, J Zhou
Wireless sensor network security. IOS Press, incorporated, 1-21, 2008
Real-time location and inpatient care systems based on passive RFID
P Najera, J Lopez, R Roman
Journal of Network and Computer Applications 34 (3), 980-989, 2011
Wireless Sensor Network Security
J López, J Zhou
Ios PressInc, 2008
Modelling trust dynamics in the Internet of Things
C Fernandez-Gago, F Moyano, J Lopez
Information Sciences 396, 72-82, 2017
OCPP Protocol: Security Threats and Challenges
C Alcaraz, J Lopez, S Wolthusen
IEEE Transactions on Smart Grid, 2017
Accountability for cloud and other future internet services
S Pearson, V Tountopoulos, D Catteddu, M Südholt, R Molva, C Reich, ...
Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th …, 2012
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20