Díaz-Sánchez, Daniel; Marín-Lopez, Andrés; Mendoza, Florina Almenárez; Cabarcos, Patricia Arias DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT † Journal Article In: Sensors, vol. 19, iss. 15, pp. 1-23, 2019, ISSN: 1424-8220. Abstract | Links | BibTeX | Tags: authentication, chameleon signatures, cynamon, DANE, DNSSEC, Internet of Things, magos, microservices Díaz-Sánchez, Daniel; Marín-López, Andrés; Almenárez-Mendoza, Florina; Arias-Cabarcos, Patricia; Simon-Sherratt, R. TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications Journal Article In: IEEE Communications Surveys and Tutorials, vol. 21, iss. 4, pp. 3502-3531, 2019, ISSN: 1553-877X. Abstract | Links | BibTeX | Tags: authentication, certificate pinning, cynamon, DTLS, Internet of Things, Machine to Machine, magos, PKI, Protocols, TLS, Trusted Third Party, Tutorials Seiler-Hwang, Sunyoung; Arias-Cabarcos, Patricia; Marín, Andrés; Almenares, Florina; Díaz-Sánchez, Daniel; Becker, Christian I Don'T See Why I Would Ever Want to Use It: Analyzing the Usability of Popular Smartphone Password Managers Proceedings Article In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1937–1953, The 26th ACM Conference on Computer and Communications Security ACM, London, United Kingdom, 2019, ISBN: 978-1-4503-6747-9. Abstract | Links | BibTeX | Tags: authentication, password managers, usable security, user study Arias-Cabarcos, Patricia; Almenares, Florina; Sánchez-Guerrero, Rosa; Marin, Andrés; Díaz-Sánchez, Daniel Multi-device Single Sign-on for cloud service continuity Proceedings Article In: 2012 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2012, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: authentication, computing paradigm, synchronization Sánchez, Rosa; Almenares, Florina; Arias, Patricia; Díaz-Sánchez, Daniel; Marín, Andrés Enhancing privacy and dynamic federation in IdM for consumer cloud computing Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 58, iss. 1, pp. 95-103, 2012, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: authentication, Cloud computing, Computer architecture, context, desarrollodespliegue, privacy, Protocols Sánchez-Guerrero, Rosa; Díaz-Sánchez, Daniel; Almenares-Mendoza, Florina; López, Andrés Marín-; Arias-Cabarcos, Patricia; Proserpio, Davide An identity aware wimax personalization for pervasive computing services Proceedings Article In: Proceedings of the 5th International Symposium of Ubiquitous Computing and Ambient Intelligence (UCAMI 2011), December 5-9th, 2011, Riviera Maya, Mexico., UCAMI, 2011, ISBN: 978-84-694-9677-0. Abstract | Links | BibTeX | Tags: authentication, desarrollodespliegue, identity management, IEEE 802.16, personalization, Security, WiMAX Sánchez-Guerrero, Rosa; Díaz-Sánchez, Daniel; Almenarez, Florina; Arias, Patricia; Proserpio, Davide; Marín, Andrés Introducing identity management in WiMAX to enable secure and personalized services Proceedings Article In: 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISBN: 978-1-4577-1192-3. Abstract | Links | BibTeX | Tags: authentication, identity management, IEEE 802.16, netlab, personalization, Security, WiMAX Almenárez, Florina; Arias, Patricia; Díaz-Sánchez, Daniel; Marín, Andrés; Sánchez., Rosa fedTV: Personal Networks Federation for IdM in Mobile DTV Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 57, iss. 2, pp. 499 - 506, 2011, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: anot, anotacionsemantica, authentication, Digital TV, identity management, Mobile communication, Mobile computing, mobile DTV, Mobile handsets, Personal Network Federation, SAML, Trust management Almenares, Florina; Marin, Andrés; Diaz-Sanchez, Daniel; Arias, Patricia Personal networks federation in mobile DTV Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: authentication, Digital TV, Protocols Proserpio, Davide; Sanvido, Fabio; Arias-Cabarcos, Patricia; Sánchez-Guerrero, Rosa; Almenárez-Mendoza, Florina; Díaz-Sánchez, Daniel; Marín-López, Andrés Introducing Infocards in NGN to Enable User-Centric Identity Management Proceedings Article In: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 1930-529X. Abstract | Links | BibTeX | Tags: authentication, cryptography, IP networks, Protocols Forné, Jordi; Hinarejos, Francisca; Marín, Andrés; Almenárez, Florina; Lopez, Javier; Montenegro, Jose A.; Lacoste, Marc; Díaz, Daniel Pervasive authentication and authorization infrastructures for mobile users Journal Article In: COMPUTERS & SECURITY, vol. 29, iss. 4, pp. 501-514, 2009, ISSN: 0167-4048. Abstract | Links | BibTeX | Tags: authentication, Authorization, ITACA, security architecture, trust, Ubiquitous computing, Ubisec2019
@article{Diaz_Sanchez_2019,
title = {DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †},
author = {Daniel Díaz-Sánchez and Andrés Marín-Lopez and Florina Almenárez Mendoza and Patricia Arias Cabarcos},
url = {http://dx.doi.org/10.3390/s19153292
/download/DNS_DANE_Collision-Based_Distributed_and_Dynamic_Authentication_for_Microservices_in_IoT.pdf},
doi = {https://doi.org/10.3390/s19153292},
issn = {1424-8220},
year = {2019},
date = {2019-07-26},
urldate = {2019-07-26},
journal = {Sensors},
volume = {19},
issue = {15},
pages = {1-23},
publisher = {MDPI AG},
abstract = {IoT devices provide real-time data to a rich ecosystem of services and applications. The volume of data and the involved subscribe/notify signaling will likely become a challenge also for access and core networks. To alleviate the core of the network, other technologies like fog computing can be used. On the security side, designers of IoT low-cost devices and applications often reuse old versions of development frameworks and software components that contain vulnerabilities. Many server applications today are designed using microservice architectures where components are easier to update. Thus, IoT can benefit from deploying microservices in the fog as it offers the required flexibility for the main players of ubiquitous computing: nomadic users. In such deployments, IoT devices need the dynamic instantiation of microservices. IoT microservices require certificates so they can be accessed securely. Thus, every microservice instance may require a newly-created domain name and a certificate. The DNS-based Authentication of Named Entities (DANE) extension to Domain Name System Security Extensions (DNSSEC) allows linking a certificate to a given domain name. Thus, the combination of DNSSEC and DANE provides microservices’ clients with secure information regarding the domain name, IP address, and server certificate of a given microservice. However, IoT microservices may be short-lived since devices can move from one local fog to another, forcing DNSSEC servers to sign zones whenever new changes occur. Considering DNSSEC and DANE were designed to cope with static services, coping with IoT dynamic microservice instantiation can throttle the scalability in the fog. To overcome this limitation, this article proposes a solution that modifies the DNSSEC/DANE signature mechanism using chameleon signatures and defining a new soft delegation scheme. Chameleon signatures are signatures computed over a chameleon hash, which have a property: a secret trapdoor function can be used to compute collisions to the hash. Since the hash is maintained, the signature does not have to be computed again. In the soft delegation schema, DNS servers obtain a trapdoor that allows performing changes in a constrained zone without affecting normal DNS operation. In this way, a server can receive this soft delegation and modify the DNS zone to cope with frequent changes such as microservice dynamic instantiation. Changes in the soft delegated zone are much faster and do not require the intervention of the DNS primary servers of the zone.},
keywords = {authentication, chameleon signatures, cynamon, DANE, DNSSEC, Internet of Things, magos, microservices},
pubstate = {published},
tppubtype = {article}
}
@article{8704893,
title = {TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications},
author = {Daniel Díaz-Sánchez and Andrés Marín-López and Florina Almenárez-Mendoza and Patricia Arias-Cabarcos and R. Simon-Sherratt},
url = {https://doi.org/10.1109/COMST.2019.2914453
https://ieeexplore.ieee.org/document/8704893
https://phpmyadmin.pervasive.it.uc3m.es/download/TLC-PKI-challenges-certificate-pinning.pdf},
doi = {10.1109/COMST.2019.2914453},
issn = {1553-877X},
year = {2019},
date = {2019-05-02},
urldate = {2019-05-02},
journal = {IEEE Communications Surveys and Tutorials},
volume = {21},
issue = {4},
pages = {3502-3531},
abstract = {Transport layer security (TLS) is becoming the de facto standard to provide end-to-end security in the current Internet. IoT and M2M scenarios are not an exception since TLS is also being adopted there. The ability of TLS for negotiating any security parameter, its flexibility and extensibility are responsible for its wide adoption but also for several attacks. Moreover, as it relies on public key infrastructure (PKI) for authentication, it is also affected by PKI problems. Considering the advent of IoT/M2M scenarios and their particularities, it is necessary to have a closer look at TLS history to evaluate the potential challenges of using TLS and PKI in these scenarios. According to this, this paper provides a deep revision of several security aspects of TLS and PKI, with a particular focus on current certificate pinning solutions in order to illustrate the potential problems that should be addressed.},
keywords = {authentication, certificate pinning, cynamon, DTLS, Internet of Things, Machine to Machine, magos, PKI, Protocols, TLS, Trusted Third Party, Tutorials},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{Seiler-Hwang:2019:DSW:3319535.3354192,
title = {I Don'T See Why I Would Ever Want to Use It: Analyzing the Usability of Popular Smartphone Password Managers},
author = {Sunyoung Seiler-Hwang and Patricia Arias-Cabarcos and Andrés Marín and Florina Almenares and Daniel Díaz-Sánchez and Christian Becker},
url = {http://doi.acm.org/10.1145/3319535.3354192},
doi = {10.1145/3319535.3354192},
isbn = {978-1-4503-6747-9},
year = {2019},
date = {2019-01-01},
urldate = {2019-01-01},
booktitle = {Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security},
pages = {1937--1953},
publisher = {ACM},
address = {London, United Kingdom},
organization = {The 26th ACM Conference on Computer and Communications Security},
series = {CCS '19},
abstract = {Passwords are an often unavoidable authentication mechanism, despite the availability of additional alternative means. In the case of smartphones, usability problems are aggravated because interaction happens through small screens and multilayer keyboards. While password managers (PMs) can improve this situation and contribute to hardening security, their adoption is far from widespread. To understand the underlying reasons, we conducted the first empirical usability study of mobile PMs, covering both quantitative and qualitative evaluations. Our findings show that popular PMs are barely acceptable according to the standard System Usability Scale, and that there are three key areas for improvement: integration with external applications, security, and user guidance and interaction. We build on the collected evidence to suggest recommendations that can fill this gap.},
keywords = {authentication, password managers, usable security, user study},
pubstate = {published},
tppubtype = {inproceedings}
}
2012
@inproceedings{pa018,
title = {Multi-device Single Sign-on for cloud service continuity},
author = {Patricia Arias-Cabarcos and Florina Almenares and Rosa Sánchez-Guerrero and Andrés Marin and Daniel Díaz-Sánchez},
url = {https://ieeexplore.ieee.org/document/6162011},
doi = {https://doi.org/10.1109/ICCE.2012.6162011},
issn = {2158-3994},
year = {2012},
date = {2012-03-01},
booktitle = {2012 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {The great variety of consumer electronic devices with support of wireless communications combined with the emerging Cloud Computing paradigm is paving the way to real anytime/anywhere computing. In this context, many services, such as music or video streaming, are delivered to the clients using Cloud-based providers. However, service continuity when moving across different terminals is still a major challenge. This paper proposes a novel middleware architecture that allows security sessions initiated from one device to be seamlessly transferred to a second one, as might be desirable in the enjoyment of long running media.},
keywords = {authentication, computing paradigm, synchronization},
pubstate = {published},
tppubtype = {inproceedings}
}
@article{almenarez003,
title = {Enhancing privacy and dynamic federation in IdM for consumer cloud computing},
author = {Rosa Sánchez and Florina Almenares and Patricia Arias and Daniel Díaz-Sánchez and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/6170060
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6170060},
doi = {https://doi.org/10.1109/TCE.2012.6170060},
issn = {0098-3063},
year = {2012},
date = {2012-02-01},
urldate = {2012-02-01},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {58},
issue = {1},
pages = {95-103},
abstract = {Consumer cloud computing paradigm has emerged as the natural evolution and integration of advances in several areas including distributed computing, service oriented architecture and consumer electronics. In this complex ecosystem, security and identity management challenges have cropped up, given their dynamism and heterogeneity. As a direct consequence, dynamic federated identity management with privacy improvements has arisen as an indispensable mechanism to enable the global scalability and usability that are required for the successful implantation of Cloud technologies. With these requirements in mind, we present an IdM architecture based on privacy and reputation extensions compliance with the SAMLv2/ID-FF standards.},
keywords = {authentication, Cloud computing, Computer architecture, context, desarrollodespliegue, privacy, Protocols},
pubstate = {published},
tppubtype = {article}
}
2011
@inproceedings{pa034,
title = {An identity aware wimax personalization for pervasive computing services},
author = {Rosa Sánchez-Guerrero and Daniel Díaz-Sánchez and Florina Almenares-Mendoza and Andrés Marín- López and Patricia Arias-Cabarcos and Davide Proserpio },
url = {http://hdl.handle.net/10016/13098
https://e-archivo.uc3m.es/bitstreams/685697a7-32a6-45e9-b60c-913dad70d44e/download},
isbn = {978-84-694-9677-0},
year = {2011},
date = {2011-12-27},
urldate = {2011-12-27},
booktitle = {Proceedings of the 5th International Symposium of Ubiquitous Computing and Ambient Intelligence (UCAMI 2011), December 5-9th, 2011, Riviera Maya, Mexico.},
publisher = {UCAMI},
abstract = {Mobile Internet access is becoming more and more pervasive in the new 4G scenarios, where WiMAX is to play a crucial role. WiMax has advantages when considering both energy consumption and bandwidth, when compared with HSDPA and LTE. However, we have found some limitations in IEEE 802.16 security support, which may limit authentication and authorization mechanisms for ubiquitous service development. In this article we analyze weaknesses and vulnerabilities we have found in WiMAX security. WiMax, with the adequate identity management support, could be invaluable for developing new pervasive computing services. We propose the introduction of identity management in WiMAX, as a pervious step to the definition of identity aware WiMax personalization of pervasive computing services.},
keywords = {authentication, desarrollodespliegue, identity management, IEEE 802.16, personalization, Security, WiMAX},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa022,
title = {Introducing identity management in WiMAX to enable secure and personalized services},
author = {Rosa Sánchez-Guerrero and Daniel Díaz-Sánchez and Florina Almenarez and Patricia Arias and Davide Proserpio and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/6097228},
doi = {https://doi.org/10.1109/WMNC.2011.6097228},
isbn = {978-1-4577-1192-3},
year = {2011},
date = {2011-12-12},
urldate = {2011-12-12},
booktitle = {2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {The increasing popularity of broadband Internet and the widespread penetration of full-featured mobile devices have signaled WiMAX importance. IEEE 802.16 standard has focused on security from the beginning, being security support a fundamental aspect in wireless communication. We have found some limitations concerning authentication and authorization mechanisms at user level. To overcome those limitations we consider necessary to provide a proper identity management support for WiMAX for enhancing users' experience whereas delivering services in a secure fashion. In this article we analyze several weaknesses and vulnerabilities in WiMAX security and propose the introduction of identity management in WiMAX for a better provision of secure personalized services.},
keywords = {authentication, identity management, IEEE 802.16, netlab, personalization, Security, WiMAX},
pubstate = {published},
tppubtype = {inproceedings}
}
@article{almenarez002,
title = {fedTV: Personal Networks Federation for IdM in Mobile DTV},
author = {Florina Almenárez and Patricia Arias and Daniel Díaz-Sánchez and Andrés Marín and Rosa Sánchez.},
url = {https://ieeexplore.ieee.org/document/5955185
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5955185},
doi = {https://doi.org/10.1109/TCE.2011.5955185},
issn = {0098-3063},
year = {2011},
date = {2011-05-03},
urldate = {2011-05-03},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {57},
issue = {2},
pages = {499 - 506},
abstract = {Mobile Social TV and Mobile Video Blogging are new challenging scenarios arising from mobile and online DTV. They will allow for new interactions, and dynamically share content and delegate services. That requires the dynamic discovery, joining, and establishing new federations, emerging the trust management as an important facet for that. Such trust management should be autonomous, user-centric, and dynamic to cope with forthcoming applications. We propose an enhanced mobile client to support federated environments for cooperation in mobile DTV scenarios. Our proposal extends the Enhanced Client Profile defined in SAML v2, incorporating a trust management layer inside user's consumer electronic devices' software.},
keywords = {anot, anotacionsemantica, authentication, Digital TV, identity management, Mobile communication, Mobile computing, mobile DTV, Mobile handsets, Personal Network Federation, SAML, Trust management},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{pa031,
title = {Personal networks federation in mobile DTV},
author = {Florina Almenares and Andrés Marin and Daniel Diaz-Sanchez and Patricia Arias},
url = {https://ieeexplore.ieee.org/document/5722641},
doi = {https://doi.org/10.1109/ICCE.2011.5722641},
issn = {2158-3994},
year = {2011},
date = {2011-03-03},
urldate = {2011-03-03},
booktitle = {2011 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Mobile and online DTV encourages new scenarios and applications to dynamically share content or delegate services between user's personal devices and networks. This requires the establishment of federations in a dynamic way, emerging the trust management as an important facet for that. Such trust management should be autonomous, user-centric, and dynamic to cope with forthcoming applications. This article addresses the mentioned requirements, by defining a SAML-compliant enhanced client to support federated environments for cooperation in mobile DTV scenarios. Such client is extended with a trust layer inside consumer electronic devices' software.},
keywords = {authentication, Digital TV, Protocols},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa024,
title = {Introducing Infocards in NGN to Enable User-Centric Identity Management},
author = {Davide Proserpio and Fabio Sanvido and Patricia Arias-Cabarcos and Rosa Sánchez-Guerrero and Florina Almenárez-Mendoza and Daniel Díaz-Sánchez and Andrés Marín-López },
url = {https://ieeexplore.ieee.org/document/5683383},
doi = {https://doi.org/10.1109/GLOCOM.2010.5683383},
issn = {1930-529X},
year = {2011},
date = {2011-01-10},
booktitle = {2010 IEEE Global Telecommunications Conference GLOBECOM 2010},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {With the rapid evolution of networks and the widespread penetration of mobile devices with increasing capabilities, that have already become a commodity, we are getting a step closer to ubiquity. Thus, we are moving a great part of our lives from the physical world to the online world, i.e. social interactions, business transactions, relations with government administrations, etc. However, while identity verification is easy to handle in the real world, there are many unsolved challenges when dealing with digital identity management, especially due to the lack of user awareness when it comes to privacy. Thus, with the aim to enhance the navigation experience and security in multiservice and multiprovider environments the user must be empowered to control how her attributes are shared and disclosed between different domains.With these goals on mind, we leverage the benefits of the Infocard technology and introduce this usercentric paradigm into the emerging NGN architectures. This paper proposes a way to combine the gains of a SAML federation between service and identity providers with the easiness for the final user of the Inforcard System using the well known architectural schema of IP Multimedia Subsystem.},
keywords = {authentication, cryptography, IP networks, Protocols},
pubstate = {published},
tppubtype = {inproceedings}
}
2009
@article{marin001,
title = {Pervasive authentication and authorization infrastructures for mobile users},
author = {Jordi Forné and Francisca Hinarejos and Andrés Marín and Florina Almenárez and Javier Lopez and Jose A. Montenegro and Marc Lacoste and Daniel Díaz},
url = {https://www.sciencedirect.com/science/article/pii/S0167404809000911?via%3Dihub},
doi = {https://doi.org/10.1016/j.cose.2009.09.001},
issn = {0167-4048},
year = {2009},
date = {2009-09-25},
urldate = {2009-09-25},
journal = {COMPUTERS & SECURITY},
volume = {29},
issue = {4},
pages = {501-514},
abstract = {Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, extremely dynamic operating conditions, are major challenges in the design of security infrastructures for pervasive computing. Yet, in a ubiquitous computing environment, limitations of traditional solutions for authentication and authorization can be overcome with a pervasive public key infrastructure (pervasive-PKI). This choice allows the validation of credentials of users roaming between heterogeneous networks, even when global connectivity is lost and some services are temporarily unreachable. Proof-of-concept implementations and testbed validation results demonstrate that strong security can be achieved for users and applications through the combination of traditional PKI services with a number of enhancements like: (i) dynamic and collaborative trust model, (ii) use of attribute certificates for privilege management, and (iii) modular architecture enabling nomadic mobility and enhanced with reconfiguration capabilities.},
keywords = {authentication, Authorization, ITACA, security architecture, trust, Ubiquitous computing, Ubisec},
pubstate = {published},
tppubtype = {article}
}
Publications
DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT † Journal Article In: Sensors, vol. 19, iss. 15, pp. 1-23, 2019, ISSN: 1424-8220. TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications Journal Article In: IEEE Communications Surveys and Tutorials, vol. 21, iss. 4, pp. 3502-3531, 2019, ISSN: 1553-877X. I Don'T See Why I Would Ever Want to Use It: Analyzing the Usability of Popular Smartphone Password Managers Proceedings Article In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1937–1953, The 26th ACM Conference on Computer and Communications Security ACM, London, United Kingdom, 2019, ISBN: 978-1-4503-6747-9. Multi-device Single Sign-on for cloud service continuity Proceedings Article In: 2012 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2012, ISSN: 2158-3994. Enhancing privacy and dynamic federation in IdM for consumer cloud computing Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 58, iss. 1, pp. 95-103, 2012, ISSN: 0098-3063. An identity aware wimax personalization for pervasive computing services Proceedings Article In: Proceedings of the 5th International Symposium of Ubiquitous Computing and Ambient Intelligence (UCAMI 2011), December 5-9th, 2011, Riviera Maya, Mexico., UCAMI, 2011, ISBN: 978-84-694-9677-0. Introducing identity management in WiMAX to enable secure and personalized services Proceedings Article In: 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISBN: 978-1-4577-1192-3. fedTV: Personal Networks Federation for IdM in Mobile DTV Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 57, iss. 2, pp. 499 - 506, 2011, ISSN: 0098-3063. Personal networks federation in mobile DTV Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2158-3994. Introducing Infocards in NGN to Enable User-Centric Identity Management Proceedings Article In: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 1930-529X. Pervasive authentication and authorization infrastructures for mobile users Journal Article In: COMPUTERS & SECURITY, vol. 29, iss. 4, pp. 501-514, 2009, ISSN: 0167-4048.2019
2012
2011
2009