default search action
Rolando Trujillo-Rasua
Person information
- affiliation: Deakin University, VIC, Australia
- affiliation (former): University of Luxembourg
- affiliation (former): Universitat Rovira i Virgili, Catalonia, Spain
- affiliation (former): University of Havana, Cuba
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2012
- [b1]Rolando Trujillo-Rasua:
Privacy in rfid and mobile objects. University of Rovira i Virgili, Spain, 2012
Journal Articles
- 2024
- [j24]Jesse Laeuchli, Rolando Trujillo-Rasua:
Software-based remote memory attestation using quantum entanglement. Quantum Inf. Process. 23(6): 208 (2024) - 2023
- [j23]Reynaldo Gil Pons, Sjouke Mauw, Rolando Trujillo-Rasua:
On the optimal resistance against mafia and distance fraud in distance-bounding protocols. Comput. Commun. 210: 69-78 (2023) - 2022
- [j22]Jesse Laeuchli, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Analysis of centrality measures under differential privacy models. Appl. Math. Comput. 412: 126546 (2022) - [j21]Naeem Firdous Syed, Syed W. Shah, Rolando Trujillo-Rasua, Robin Doss:
Traceability in supply chains: A Cyber security analysis. Comput. Secur. 112: 102536 (2022) - [j20]Rajesh Kumar, Rohan Kela, Siddhant Singh, Rolando Trujillo-Rasua:
APT attacks on industrial control systems: A tale of three incidents. Int. J. Crit. Infrastructure Prot. 37: 100521 (2022) - [j19]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation. Knowl. Inf. Syst. 64(4): 1077-1100 (2022) - 2021
- [j18]Rolando Trujillo-Rasua:
Secure memory erasure in the presence of man-in-the-middle attackers. J. Inf. Secur. Appl. 57: 102730 (2021) - 2020
- [j17]Ahto Buldas, Olga Gadyatskaya, Aleksandr Lenin, Sjouke Mauw, Rolando Trujillo-Rasua:
Attribute evaluation on attack trees with incomplete information. Comput. Secur. 88 (2020) - [j16]Qingyi Zhu, Seng W. Loke, Rolando Trujillo-Rasua, Frank Jiang, Yong Xiang:
Applications of Distributed Ledger Technologies to the Internet of Things: A Survey. ACM Comput. Surv. 52(6): 120:1-120:34 (2020) - [j15]Robin Doss, Rolando Trujillo-Rasua, Selwyn Piramuthu:
Secure attribute-based search in RFID-based inventory control systems. Decis. Support Syst. 132: 113270 (2020) - 2019
- [j14]Reynaldo Gil Pons, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua, Ismael González Yero:
Distance-based vertex identification in graphs: The outer multiset dimension. Appl. Math. Comput. 363 (2019) - [j13]Gildas Avoine, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan Capkun, Gerhard P. Hancke, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay:
Security of Distance-Bounding: A Survey. ACM Comput. Surv. 51(5): 94:1-94:33 (2019) - [j12]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Robust active attacks on social graphs. Data Min. Knowl. Discov. 33(5): 1357-1392 (2019) - [j11]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Conditional adjacency anonymity in social graphs under active attacks. Knowl. Inf. Syst. 61(1): 485-511 (2019) - 2018
- [j10]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Anonymising social graphs in the presence of active attackers. Trans. Data Priv. 11(2): 169-198 (2018) - 2017
- [j9]Magdalena Lemanska, Juan Alberto Rodríguez-Velázquez, Rolando Trujillo-Rasua:
Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph. Fundam. Informaticae 152(3): 273-287 (2017) - 2016
- [j8]Rolando Trujillo-Rasua, Ismael González Yero:
Characterizing 1-Metric Antidimensional Trees and Unicyclic Graphs. Comput. J. 59(8): 1264-1273 (2016) - [j7]Rolando Trujillo-Rasua, Ismael González Yero:
k-Metric antidimension: A privacy measure for social graphs. Inf. Sci. 328: 403-417 (2016) - 2015
- [j6]Gildas Avoine, Sjouke Mauw, Rolando Trujillo-Rasua:
Comparing distance bounding protocols: A critical mission supported by decision theory. Comput. Commun. 67: 92-102 (2015) - 2014
- [j5]Rolando Trujillo-Rasua, Benjamin Martin, Gildas Avoine:
Distance Bounding Facing Both Mafia and Distance Frauds. IEEE Trans. Wirel. Commun. 13(10): 5690-5698 (2014) - 2013
- [j4]Rolando Trujillo-Rasua, Josep Domingo-Ferrer:
On the privacy offered by (k, δ)-anonymity. Inf. Syst. 38(4): 491-494 (2013) - 2012
- [j3]Rolando Trujillo-Rasua, Agusti Solanas, Pablo A. Pérez-Martínez, Josep Domingo-Ferrer:
Predictive protocol for the scalable identification of RFID tags through collaborative readers. Comput. Ind. 63(6): 557-573 (2012) - [j2]Josep Domingo-Ferrer, Rolando Trujillo-Rasua:
Microaggregation- and permutation-based anonymization of movement data. Inf. Sci. 208: 55-80 (2012) - 2011
- [j1]Rolando Trujillo-Rasua, Agusti Solanas:
Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers. Comput. Networks 55(15): 3211-3223 (2011)
Conference and Workshop Papers
- 2024
- [c24]Sergiu Bursuc, Reynaldo Gil Pons, Sjouke Mauw, Rolando Trujillo-Rasua:
Software-Based Memory Erasure with Relaxed Isolation Requirements. CSF 2024: 1-16 - 2023
- [c23]Fokke Heikamp, Lei Pan, Robin Doss, Rolando Trujillo-Rasua, Sushmita Ruj:
ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness. BSCI 2023: 1-10 - 2022
- [c22]Reynaldo Gil Pons, Ross Horne, Sjouke Mauw, Alwen Tiu, Rolando Trujillo-Rasua:
Is Eve nearby? Analysing protocols under the distant-attacker assumption. CSF 2022: 17-32 - [c21]Fokke Heikamp, Lei Pan, Rolando Trujillo-Rasua, Sushmita Ruj, Robin Doss:
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts. NSS 2022: 514-523 - 2019
- [c20]Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua:
Post-Collusion Security and Distance Bounding. CCS 2019: 941-958 - [c19]James Jin Kang, Kiran Fahd, Sitalakshmi Venkatraman, Rolando Trujillo-Rasua, Paul S. Haskell-Dowland:
Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks. ITNAC 2019: 1-6 - 2018
- [c18]Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua:
Automated Identification of Desynchronisation Attacks on Shared Secrets. ESORICS (1) 2018: 406-426 - [c17]Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua:
Distance-Bounding Protocols: Verification without Time and Location. IEEE Symposium on Security and Privacy 2018: 549-566 - 2017
- [c16]Olga Gadyatskaya, Rolando Trujillo-Rasua:
New Directions in Attack Tree Research: Catching up with Industrial Needs. GraMSec@CSF 2017: 115-126 - [c15]Olga Gadyatskaya, Ravi Jhawar, Sjouke Mauw, Rolando Trujillo-Rasua, Tim A. C. Willemse:
Refinement-Aware Generation of Attack Trees. STM 2017: 164-179 - 2016
- [c14]Christof Ferreira Torres, Rolando Trujillo-Rasua:
The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem. DBSec 2016: 19-34 - [c13]Sjouke Mauw, Rolando Trujillo-Rasua, Bochuan Xuan:
Counteracting Active Attacks in Social Network Graphs. DBSec 2016: 233-248 - [c12]Sjouke Mauw, Jorge Toro-Pozo, Rolando Trujillo-Rasua:
A Class of Precomputation-Based Distance-Bounding Protocols. EuroS&P 2016: 97-111 - [c11]Marlon Fraile, Margaret Ford, Olga Gadyatskaya, Rajesh Kumar, Mariëlle Stoelinga, Rolando Trujillo-Rasua:
Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study. PoEM 2016: 326-334 - [c10]Olga Gadyatskaya, Ravi Jhawar, Piotr Kordy, Karim Lounis, Sjouke Mauw, Rolando Trujillo-Rasua:
Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0. QEST 2016: 159-162 - [c9]Sjouke Mauw, Jorge Toro-Pozo, Rolando Trujillo-Rasua:
Optimality Results on the Security of Lookup-Based Protocols. RFIDSec 2016: 137-150 - [c8]Hugo L. Jonker, Sjouke Mauw, Rolando Trujillo-Rasua:
Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't. Security Protocols Workshop 2016: 19-25 - 2015
- [c7]Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, Rolando Trujillo-Rasua:
Attack Trees with Sequential Conjunction. SEC 2015: 339-353 - 2013
- [c6]Rolando Trujillo-Rasua:
Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding. MobiQuitous 2013: 289-302 - 2011
- [c5]Albert Fernàndez-Mir, Rolando Trujillo-Rasua, Jordi Castellà-Roca, Josep Domingo-Ferrer:
A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation. RFIDSec 2011: 147-162 - [c4]Rolando Trujillo-Rasua, Agusti Solanas:
Scalable trajectory-based protocol for RFID tags identification. RFID-TA 2011: 279-285 - 2010
- [c3]Josep Domingo-Ferrer, Michal Sramka, Rolando Trujillo-Rasua:
Privacy-preserving publication of trajectories using microaggregation. SPRINGL 2010: 26-33 - [c2]Rolando Trujillo-Rasua, Benjamin Martin, Gildas Avoine:
The Poulidor Distance-Bounding Protocol. RFIDSec 2010: 239-257 - 2008
- [c1]Vittorio Maniezzo, Matteo Roffilli, Roberto Gabrielli, Alessandra Guidazzi, Manuel Otero, Rolando Trujillo-Rasua:
Regional Traffic Assignment by ACO. ANTS Conference 2008: 409-410
Parts in Books or Collections
- 2015
- [p1]Rolando Trujillo-Rasua, Josep Domingo-Ferrer:
Privacy in Spatio-Temporal Databases: A Microaggregation-Based Approach. Advanced Research in Data Privacy 2015: 197-214
Informal and Other Publications
- 2024
- [i15]Sergiu Bursuc, Reynaldo Gil Pons, Sjouke Mauw, Rolando Trujillo-Rasua:
Software-Based Memory Erasure with relaxed isolation requirements: Extended Version. CoRR abs/2401.06626 (2024) - 2023
- [i14]Olga Gadyatskaya, Sjouke Mauw, Rolando Trujillo-Rasua, Tim A. C. Willemse:
Automated generation of attack trees with optimal shape and labelling. CoRR abs/2311.13331 (2023) - 2021
- [i13]Jesse Laeuchli, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Analysis of centrality measures under differential privacy models. CoRR abs/2103.03556 (2021) - 2020
- [i12]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation. CoRR abs/2007.05312 (2020) - 2019
- [i11]Rolando Trujillo-Rasua:
Secure Memory Erasure in the Presence of Man-in-the-Middle Attackers. CoRR abs/1905.13474 (2019) - [i10]Nicholas Charles Patterson, Rolando Trujillo-Rasua, Michael Hobbs, Guy Wood-Bradley, Judy Currey, Elicia Lanham:
Chunked Lectures: A new model for conducting online lectures within Information Technology higher education. CoRR abs/1909.03041 (2019) - 2018
- [i9]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Robust active attacks on social graphs. CoRR abs/1811.10915 (2018) - [i8]Ahto Buldas, Olga Gadyatskaya, Aleksandr Lenin, Sjouke Mauw, Rolando Trujillo-Rasua:
Attribute Evaluation on Attack Trees with Incomplete Information. CoRR abs/1812.10754 (2018) - 2017
- [i7]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Rethinking (k, 𝓁)-anonymity in social graphs: (k, 𝓁)-adjacency anonymity and (k, 𝓁)-(adjacency) anonymous transformations. CoRR abs/1704.07078 (2017) - 2015
- [i6]Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, Rolando Trujillo-Rasua:
Attack Trees with Sequential Conjunction. CoRR abs/1503.02261 (2015) - [i5]Gildas Avoine, Sjouke Mauw, Rolando Trujillo-Rasua:
Comparing Distance Bounding Protocols: a Critical Mission Supported by Decision Theory. CoRR abs/1503.04593 (2015) - 2014
- [i4]Rolando Trujillo-Rasua, Benjamin Martin, Gildas Avoine:
Distance-bounding facing both mafia and distance frauds: Technical report. CoRR abs/1405.5704 (2014) - [i3]Rolando Trujillo-Rasua, Ismael González Yero:
k-Metric Antidimension: a Privacy Measure for Social Graphs. CoRR abs/1408.2154 (2014) - [i2]Rolando Trujillo-Rasua:
Complexity of distance fraud attacks in graph-based distance bounding. CoRR abs/1412.6016 (2014) - 2013
- [i1]Rolando Trujillo-Rasua:
Privacy in RFID and mobile objects. CoRR abs/1310.5476 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint