Blanco-Romero, Javier; Lorenzo, Vicente; Almenares, Florina; Díaz-Sánchez, Daniel; and Celeste Campo,; García-Rubio, Carlos Integrating Post-Quantum Cryptography into CoAP and MQTT-SN Protocols Conference 2024 IEEE Symposium on Computers and Communications (ISCC), IEEE, 2024, ISBN: 979-8-3503-5424-9. Abstract | Links | BibTeX | Tags: coap, compromise, cryptography, I-Shaper, IoT, MQTT-SN, Post-Quantum Cryptography, PQC, Protocols, Qursa Díaz-Sánchez, Daniel; Marín-López, Andrés; Almenárez-Mendoza, Florina; Arias-Cabarcos, Patricia; Simon-Sherratt, R. TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications Journal Article In: IEEE Communications Surveys and Tutorials, vol. 21, iss. 4, pp. 3502-3531, 2019, ISSN: 1553-877X. Abstract | Links | BibTeX | Tags: authentication, certificate pinning, cynamon, DTLS, Internet of Things, Machine to Machine, magos, PKI, Protocols, TLS, Trusted Third Party, Tutorials Marín-López, Andrés; Almenáres-Mendoza, Florina; Arias-Cabarcos, Patricia; Díaz-Sánchez, Daniel Wi-Fi Direct: Lessons learned Proceedings Article In: 2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), Institute of Electrical and Electronics Engineers (IEEE), 2016, ISBN: 978-1-5090-1984-7. Abstract | Links | BibTeX | Tags: Protocols, Security, usability Díaz-Sánchez, Daniel; Sherratt, Simon; Arias, Patricia; Almenares, Florina; Marín-López, Andrés Proxy re-encryption schemes for IoT and crowd sensing Proceedings Article In: IEEE, 2016, ISSN: 2158-4001. Abstract | Links | BibTeX | Tags: encryption, Protocols, secret key Arias-Cabarcos, Patricia; Almenárez, Florina; Trapero, Rubén; Díaz-Sánchez, Daniel; Marín, Andrés Blended Identity: Pervasive IdM for Continuous Authentication Journal Article In: IEEE Xplore, vol. 13, iss. 3, pp. 32-39, 2015, ISSN: 1540-7993. Abstract | Links | BibTeX | Tags: blended identity, emrisco, identity management, IdM, Pervasive computing, Protocols, risk assessment, Security Díaz-Sanchez, Daniel; Arias-Cabarcos, Patricia; Almenarez, Florina; Marín-López, Andrés P2P-based data layer for mobile Media Cloud Proceedings Article In: IEEE, 2015, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: Cloud computing, emrisco, Protocols Sánchez-Guerrero, Rosa; Almenárez, Florina; Díaz-Sánchez, Daniel; Arias, Patricia; Marín, Andrés A model for dimensioning a secure event-driven health care system Proceedings Article In: 2012 5th Joint IFIP Wireless and Mobile Networking Conference (WMNC), Institute of Electrical and Electronics Engineers (IEEE), 2013, ISBN: 978-1-4673-2993-4. Abstract | Links | BibTeX | Tags: privacy, Protocols, Security Sanvido, F.; Díaz-Sánchez, D.; Sánchez-Guerrero, R.; Almenares, F.; Arias, P. Privacy enhanced cloud services home aggregator Proceedings Article In: 2012 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2012, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: Cloud computing, emadrid, privacy, Protocols, Security Sánchez, Rosa; Almenares, Florina; Arias, Patricia; Díaz-Sánchez, Daniel; Marín, Andrés Enhancing privacy and dynamic federation in IdM for consumer cloud computing Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 58, iss. 1, pp. 95-103, 2012, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: authentication, Cloud computing, Computer architecture, context, desarrollodespliegue, privacy, Protocols Marin, Andres; Díaz-Sánchez, Daniel; Almenárez-Mendoza, Florina; Arias-Cabarcos, Patricia; Sánchez-Guerrero, Rosa; Sanvido, Fabio Consumer electronics for social video services Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2166-6814. Abstract | Links | BibTeX | Tags: bluetooth, Protocols, usability Proserpio, Davide; Díaz-Sánchez, Daniel; Almenárez, Florina; Marín, Andrés; Guerrero, Rosa Sánchez Achieving IPTV Service Portability through Delegation Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 57, iss. 2, pp. 492 - 498, 2011, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: Authorization, Hardware, IPTV, Protocols, prototiposNFC, Servers, Subscription Díaz-Sánchez, Daniel; Almenarez, Florina; Marín, Andrés; Proserpio, Davide; Cabarcos., Patricia Arias Media Cloud: An Open Cloud Computing Middleware for Content Management Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 57, iss. 2, pp. 970 - 978, 2011, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: Cloud computing, Home Automation, Indexes, Media, netlab, Protocols, Social network services Proserpio, Davide; Sanvido, Fabio; Diaz-Sanchez, Daniel; Marin, Andrés IPTV meets delegation: Achieving IPTV service portability Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: Access control, emadrid, home network, IPTV, Protocols Almenares, Florina; Marin, Andrés; Diaz-Sanchez, Daniel; Arias, Patricia Personal networks federation in mobile DTV Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: authentication, Digital TV, Protocols Proserpio, Davide; Sanvido, Fabio; Arias-Cabarcos, Patricia; Sánchez-Guerrero, Rosa; Almenárez-Mendoza, Florina; Díaz-Sánchez, Daniel; Marín-López, Andrés Introducing Infocards in NGN to Enable User-Centric Identity Management Proceedings Article In: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 1930-529X. Abstract | Links | BibTeX | Tags: authentication, cryptography, IP networks, Protocols Díaz-Sánchez, Daniel; Sanvido, Fabio; Proserpio, Davide; Marín, Andrés Extended DLNA protocol: Sharing protected pay TV contents Proceedings Article In: 2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2010, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: cryptography, Protection, Protocols2024
@conference{javierblanco002,
title = {Integrating Post-Quantum Cryptography into CoAP and MQTT-SN Protocols},
author = {Javier Blanco-Romero and Vicente Lorenzo and Florina Almenares and Daniel Díaz-Sánchez and and Celeste Campo and Carlos García-Rubio},
url = {https://ieeexplore.ieee.org/abstract/document/10733716/figures#figures},
doi = {https://doi.org/10.1109/ISCC61673.2024.10733716},
isbn = {979-8-3503-5424-9},
year = {2024},
date = {2024-10-31},
urldate = {2024-10-31},
booktitle = {2024 IEEE Symposium on Computers and Communications (ISCC)},
publisher = {IEEE},
abstract = {Post-Quantum Cryptography (PQC) is a practical and cost-effective solution to defend against emerging quantum computing threats. So, leading worldwide security agencies and standardization bodies strongly advocate for the proactive integration of PQ cryptography into underlying frameworks to support applications, protocols, and services. The current research predominantly addresses the incorporation of PQC in Internet communication protocols such as HTTP and DNS; nevertheless, the focus on embedded devices has been limited to evaluating PQC’s integration within TLS/DTLS in isolation. Hence, there is a notable gap in understanding how PQC impacts IoT-specific communication protocols. This paper presents the integration of PQC into two communication protocols specifically tailored for IoT devices, the Constrained Application Protocol (CoAP) and MQTT for Sensor Networks (MQTT-SN), via the wolfSSL library. These two integrations contribute to the understanding of PQC’s implications for IoT communication protocols.},
keywords = {coap, compromise, cryptography, I-Shaper, IoT, MQTT-SN, Post-Quantum Cryptography, PQC, Protocols, Qursa},
pubstate = {published},
tppubtype = {conference}
}
2019
@article{8704893,
title = {TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications},
author = {Daniel Díaz-Sánchez and Andrés Marín-López and Florina Almenárez-Mendoza and Patricia Arias-Cabarcos and R. Simon-Sherratt},
url = {https://doi.org/10.1109/COMST.2019.2914453
https://ieeexplore.ieee.org/document/8704893
https://phpmyadmin.pervasive.it.uc3m.es/download/TLC-PKI-challenges-certificate-pinning.pdf},
doi = {10.1109/COMST.2019.2914453},
issn = {1553-877X},
year = {2019},
date = {2019-05-02},
urldate = {2019-05-02},
journal = {IEEE Communications Surveys and Tutorials},
volume = {21},
issue = {4},
pages = {3502-3531},
abstract = {Transport layer security (TLS) is becoming the de facto standard to provide end-to-end security in the current Internet. IoT and M2M scenarios are not an exception since TLS is also being adopted there. The ability of TLS for negotiating any security parameter, its flexibility and extensibility are responsible for its wide adoption but also for several attacks. Moreover, as it relies on public key infrastructure (PKI) for authentication, it is also affected by PKI problems. Considering the advent of IoT/M2M scenarios and their particularities, it is necessary to have a closer look at TLS history to evaluate the potential challenges of using TLS and PKI in these scenarios. According to this, this paper provides a deep revision of several security aspects of TLS and PKI, with a particular focus on current certificate pinning solutions in order to illustrate the potential problems that should be addressed.},
keywords = {authentication, certificate pinning, cynamon, DTLS, Internet of Things, Machine to Machine, magos, PKI, Protocols, TLS, Trusted Third Party, Tutorials},
pubstate = {published},
tppubtype = {article}
}
2016
@inproceedings{pa002,
title = {Wi-Fi Direct: Lessons learned},
author = {Andrés Marín-López and Florina Almenáres-Mendoza and Patricia Arias-Cabarcos and Daniel Díaz-Sánchez},
url = {https://ieeexplore.ieee.org/document/7528493
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7528493},
doi = {10.1109/MedHocNet.2016.7528493},
isbn = {978-1-5090-1984-7},
year = {2016},
date = {2016-08-04},
urldate = {2016-08-04},
booktitle = {2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Adhoc networking was initially designed for military application area. But adhoc networks have been found also appealing for autonomous computing. The adhoc mode of IEEE 802.11 (Independent Basic Service Set (IBSS) has not been successful due to several reasons. Within this article we explore and compare two alternatives for adhoc network formation in heterogeneous environments: Wi-Fi P2P also known as Wi-Fi Direct, and Wi-Fi Hotspot. The comparison shows that there are usability, security and performance reasons to favor Hotspot for application development.},
keywords = {Protocols, Security, usability},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa004,
title = {Proxy re-encryption schemes for IoT and crowd sensing},
author = {Daniel Díaz-Sánchez and Simon Sherratt and Patricia Arias and Florina Almenares and Andrés Marín-López},
url = {https://ieeexplore.ieee.org/document/7430505},
doi = {https://doi.org/10.1109/ICCE.2016.7430505},
issn = {2158-4001},
year = {2016},
date = {2016-04-01},
urldate = {2016-04-01},
publisher = {IEEE},
abstract = {IoT, crowd sensing and smart cities will be a traffic challenge. New communication paradigms as asynchronous messaging carry and forward, scheduled delivery and temporary storage will be needed to manage network resources dynamically. Since traditional end to end security will require keeping security associations among devices for a long time draining valuable resources, we propose and evaluate the use of proxy re-encryption protocols in these scenarios as a solution for reliable and flexible security.},
keywords = {encryption, Protocols, secret key},
pubstate = {published},
tppubtype = {inproceedings}
}
2015
@article{ariascabarcos002,
title = {Blended Identity: Pervasive IdM for Continuous Authentication},
author = {Patricia Arias-Cabarcos and Florina Almenárez and Rubén Trapero and Daniel Díaz-Sánchez and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/7118079},
doi = {https://doi.org/10.1109/MSP.2015.62},
issn = {1540-7993},
year = {2015},
date = {2015-06-04},
urldate = {2015-06-04},
journal = {IEEE Xplore},
volume = {13},
issue = {3},
pages = {32-39},
abstract = {A proper identity management approach is necessary for pervasive computing to be invisible to users. Federated identity management is key to achieving efficient identity blending and natural integration in the physical and online layers where users, devices, and services are present.},
keywords = {blended identity, emrisco, identity management, IdM, Pervasive computing, Protocols, risk assessment, Security},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{pa005,
title = {P2P-based data layer for mobile Media Cloud},
author = {Daniel Díaz-Sanchez and Patricia Arias-Cabarcos and Florina Almenarez and Andrés Marín-López},
url = {https://ieeexplore.ieee.org/document/7066362},
doi = {https://doi.org/10.1109/ICCE.2015.7066362},
issn = {2158-3994},
year = {2015},
date = {2015-03-26},
urldate = {2015-03-26},
publisher = {IEEE},
abstract = {This paper focus in an emerging concept called Elastic Personal Computing that is the ability to distribute data processing among multiple personal devices that constitute a mobile cloud. Among the most complex challenges is to provide data layer for the system to exchange input data transparently among nodes considering the data partitioning is application specific. Implementing data layers with replication and load distribution strategies is not feasible due to mobility, intermittent availability and the distributed character of mobile cloud systems. This article reasons about the problem and presents a P2P based data layer for distributed computing using personal devices.},
keywords = {Cloud computing, emrisco, Protocols},
pubstate = {published},
tppubtype = {inproceedings}
}
2013
@inproceedings{pa020,
title = {A model for dimensioning a secure event-driven health care system},
author = {Rosa Sánchez-Guerrero and Florina Almenárez and Daniel Díaz-Sánchez and Patricia Arias and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/6416152},
doi = {https://doi.org/10.1109/WMNC.2012.6416152},
isbn = {978-1-4673-2993-4},
year = {2013},
date = {2013-01-24},
urldate = {2013-01-24},
booktitle = {2012 5th Joint IFIP Wireless and Mobile Networking Conference (WMNC)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Privacy is close to the user information and thus, present in any ubiquitous computing scenario. In this sense, privacy in identity management is gaining more importance, since IdM systems deal with services that requires sharing attributes belonging to users' identity with different entities across security domains. However, the effective revocation consent -considered as a privacy rule in sensitive scenarios- has not been fully addressed. This article builds on the flexible event-based user consent-revocation mechanism defined in [4] for health care scenarios. In this article we analyze the network dimensioning to calculate the overhead of activating/deactivating attributes and privileges, as subscription and notification event messages exchanged. We consider two main simulation scenarios: a large hospital, and a small-medium hospital.},
keywords = {privacy, Protocols, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
2012
@inproceedings{pa014,
title = {Privacy enhanced cloud services home aggregator},
author = {F. Sanvido and D. Díaz-Sánchez and R. Sánchez-Guerrero and F. Almenares and P. Arias},
url = {https://ieeexplore.ieee.org/document/6162012},
doi = {https://doi.org/10.1109/ICCE.2012.6162012},
issn = {2158-3994},
year = {2012},
date = {2012-03-01},
urldate = {2012-03-01},
booktitle = {2012 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {During the past years we have assisted to the huge diffusion of Cloud based Services, but security and privacy are still an issue in the Cloud due to a problem of trust endemic in the Cloud paradigm; users who have subscribed some kind of Cloud service must fully trust their providers. In this paper we propose a new, yet simple way to guarantee privacy for end user's data and operations. We propose to use an application inside an STB as single point of concentration for user's Cloud services accounts. Thus, a higher degree of privacy could be achieved by splitting user's data and operations over multiple identities and even over multiple providers' networks. In this article we depict, as example, the case of on-line storage and synchronization service.},
keywords = {Cloud computing, emadrid, privacy, Protocols, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
@article{almenarez003,
title = {Enhancing privacy and dynamic federation in IdM for consumer cloud computing},
author = {Rosa Sánchez and Florina Almenares and Patricia Arias and Daniel Díaz-Sánchez and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/6170060
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6170060},
doi = {https://doi.org/10.1109/TCE.2012.6170060},
issn = {0098-3063},
year = {2012},
date = {2012-02-01},
urldate = {2012-02-01},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {58},
issue = {1},
pages = {95-103},
abstract = {Consumer cloud computing paradigm has emerged as the natural evolution and integration of advances in several areas including distributed computing, service oriented architecture and consumer electronics. In this complex ecosystem, security and identity management challenges have cropped up, given their dynamism and heterogeneity. As a direct consequence, dynamic federated identity management with privacy improvements has arisen as an indispensable mechanism to enable the global scalability and usability that are required for the successful implantation of Cloud technologies. With these requirements in mind, we present an IdM architecture based on privacy and reputation extensions compliance with the SAMLv2/ID-FF standards.},
keywords = {authentication, Cloud computing, Computer architecture, context, desarrollodespliegue, privacy, Protocols},
pubstate = {published},
tppubtype = {article}
}
2011
@inproceedings{pa027,
title = {Consumer electronics for social video services},
author = {Andres Marin and Daniel Díaz-Sánchez and Florina Almenárez-Mendoza and Patricia Arias-Cabarcos and Rosa Sánchez-Guerrero and Fabio Sanvido
},
url = {https://ieeexplore.ieee.org/document/6031884},
doi = {https://doi.org/10.1109/ICCE-Berlin.2011.6031884},
issn = {2166-6814},
year = {2011},
date = {2011-09-29},
booktitle = {2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Video conference services have been there for quite a long time. First commercial services, enabled by ISDN, where mainly operated by Telcos, then IP enabled video conference and multiconference through the session description protocol (IETF RFC 4566). The common explanation why these services were not massively adopted was price, bandwidth limitation and poor usability. Today bandwidth has greatly improved thanks to ADSL penetration, and many free and commercial providers offer more usable video conference services. Still these services are not massively adopted by domestic users. We also base on the hypothesis that video conference integration with social networks and home networks, will dramatically improve usability and market, but we consider that both integration and usability will be greatly increased through flexible consumer electronics. In this article we explain the requirements of such a device, its architecture, and the advantages for users and technology adoption.},
keywords = {bluetooth, Protocols, usability},
pubstate = {published},
tppubtype = {inproceedings}
}
@article{diazsanchez007,
title = {Achieving IPTV Service Portability through Delegation},
author = {Davide Proserpio and Daniel Díaz-Sánchez and Florina Almenárez and Andrés Marín and Rosa Sánchez Guerrero},
url = {https://ieeexplore.ieee.org/document/5955184
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5955184},
doi = {https://doi.org/10.1109/TCE.2011.5955184},
issn = {0098-3063},
year = {2011},
date = {2011-05-03},
urldate = {2011-05-03},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {57},
issue = {2},
pages = {492 - 498},
abstract = {IPTV Set-top boxes rely on tamper proof hardware to cope with content protection but hampers enjoying an IPTV subscription in other devices. There are solutions that share the IPTV subscription using the home network but there is no approach to make the IPTV subscription portable. This article describes a solution to delegate IPTV rights to any STB using an inexpensive piece of hardware and the OAuth protocol.},
keywords = {Authorization, Hardware, IPTV, Protocols, prototiposNFC, Servers, Subscription},
pubstate = {published},
tppubtype = {article}
}
@article{diazsanchez008,
title = {Media Cloud: An Open Cloud Computing Middleware for Content Management},
author = {Daniel Díaz-Sánchez and Florina Almenarez and Andrés Marín and Davide Proserpio and Patricia Arias Cabarcos.},
url = {https://ieeexplore.ieee.org/document/5955247
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5955247},
doi = {https://doi.org/10.1109/TCE.2011.5955247},
issn = {0098-3063},
year = {2011},
date = {2011-05-03},
urldate = {2011-05-03},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {57},
issue = {2},
pages = {970 - 978},
abstract = {Cloud computing allows accessing resources across Internet transparently: requiring no expertise in, or control over the underlying infrastructure. There is an increasing interest in sharing media files with family and friends. However, UPnP or DLNA were not designed for media distribution beyond the boundaries of a local network and manage media files through web applications can be tedious. To overcome this problem, we propose Media Cloud, a middleware for Set-top boxes for classifying, searching, and delivering media inside home network and across the cloud that interoperates with UPnP and DLNA.},
keywords = {Cloud computing, Home Automation, Indexes, Media, netlab, Protocols, Social network services},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{pa029,
title = {IPTV meets delegation: Achieving IPTV service portability},
author = {Davide Proserpio and Fabio Sanvido and Daniel Diaz-Sanchez and Andrés Marin},
url = {https://ieeexplore.ieee.org/document/5722630},
doi = {https://doi.org/10.1109/ICCE.2011.5722630},
issn = {2158-3994},
year = {2011},
date = {2011-03-03},
urldate = {2011-03-03},
booktitle = {2011 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {IPTV Set-top boxes rely on tamper proof hardware to cope with content protection but hampers enjoying an IPTV subscription in other devices. There are solutions that share the IPTV subscription using the home network but there is no approach to make the IPTV subscription portable. This article describes a solution to delegate IPTV rights to any STB using an inexpensive piece of hardware and the OAuth protocol.},
keywords = {Access control, emadrid, home network, IPTV, Protocols},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa031,
title = {Personal networks federation in mobile DTV},
author = {Florina Almenares and Andrés Marin and Daniel Diaz-Sanchez and Patricia Arias},
url = {https://ieeexplore.ieee.org/document/5722641},
doi = {https://doi.org/10.1109/ICCE.2011.5722641},
issn = {2158-3994},
year = {2011},
date = {2011-03-03},
urldate = {2011-03-03},
booktitle = {2011 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Mobile and online DTV encourages new scenarios and applications to dynamically share content or delegate services between user's personal devices and networks. This requires the establishment of federations in a dynamic way, emerging the trust management as an important facet for that. Such trust management should be autonomous, user-centric, and dynamic to cope with forthcoming applications. This article addresses the mentioned requirements, by defining a SAML-compliant enhanced client to support federated environments for cooperation in mobile DTV scenarios. Such client is extended with a trust layer inside consumer electronic devices' software.},
keywords = {authentication, Digital TV, Protocols},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa024,
title = {Introducing Infocards in NGN to Enable User-Centric Identity Management},
author = {Davide Proserpio and Fabio Sanvido and Patricia Arias-Cabarcos and Rosa Sánchez-Guerrero and Florina Almenárez-Mendoza and Daniel Díaz-Sánchez and Andrés Marín-López },
url = {https://ieeexplore.ieee.org/document/5683383},
doi = {https://doi.org/10.1109/GLOCOM.2010.5683383},
issn = {1930-529X},
year = {2011},
date = {2011-01-10},
booktitle = {2010 IEEE Global Telecommunications Conference GLOBECOM 2010},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {With the rapid evolution of networks and the widespread penetration of mobile devices with increasing capabilities, that have already become a commodity, we are getting a step closer to ubiquity. Thus, we are moving a great part of our lives from the physical world to the online world, i.e. social interactions, business transactions, relations with government administrations, etc. However, while identity verification is easy to handle in the real world, there are many unsolved challenges when dealing with digital identity management, especially due to the lack of user awareness when it comes to privacy. Thus, with the aim to enhance the navigation experience and security in multiservice and multiprovider environments the user must be empowered to control how her attributes are shared and disclosed between different domains.With these goals on mind, we leverage the benefits of the Infocard technology and introduce this usercentric paradigm into the emerging NGN architectures. This paper proposes a way to combine the gains of a SAML federation between service and identity providers with the easiness for the final user of the Inforcard System using the well known architectural schema of IP Multimedia Subsystem.},
keywords = {authentication, cryptography, IP networks, Protocols},
pubstate = {published},
tppubtype = {inproceedings}
}
2010
@inproceedings{pa037,
title = {Extended DLNA protocol: Sharing protected pay TV contents},
author = {Daniel Díaz-Sánchez and Fabio Sanvido and Davide Proserpio and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/5418687},
doi = {https://doi.org/10.1109/ICCE.2010.5418687},
issn = {2158-3994},
year = {2010},
date = {2010-02-10},
booktitle = {2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {DLNA can be considered as a good candidate for sharing protected contents among authorized devices. There is a important penetration of DLNA certified devices, and it offers link protection. We identify problems on DLNA's link protection, DTCP-IP, and we propose to improve the authentication and key derivation mechanism. DLNA sharing can be extended to include pre and post acquisition protection content at the price of inexpensive descrambler.},
keywords = {cryptography, Protection, Protocols},
pubstate = {published},
tppubtype = {inproceedings}
}
Publications
Integrating Post-Quantum Cryptography into CoAP and MQTT-SN Protocols Conference 2024 IEEE Symposium on Computers and Communications (ISCC), IEEE, 2024, ISBN: 979-8-3503-5424-9. TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications Journal Article In: IEEE Communications Surveys and Tutorials, vol. 21, iss. 4, pp. 3502-3531, 2019, ISSN: 1553-877X. Wi-Fi Direct: Lessons learned Proceedings Article In: 2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), Institute of Electrical and Electronics Engineers (IEEE), 2016, ISBN: 978-1-5090-1984-7. Proxy re-encryption schemes for IoT and crowd sensing Proceedings Article In: IEEE, 2016, ISSN: 2158-4001. Blended Identity: Pervasive IdM for Continuous Authentication Journal Article In: IEEE Xplore, vol. 13, iss. 3, pp. 32-39, 2015, ISSN: 1540-7993. P2P-based data layer for mobile Media Cloud Proceedings Article In: IEEE, 2015, ISSN: 2158-3994. A model for dimensioning a secure event-driven health care system Proceedings Article In: 2012 5th Joint IFIP Wireless and Mobile Networking Conference (WMNC), Institute of Electrical and Electronics Engineers (IEEE), 2013, ISBN: 978-1-4673-2993-4. Privacy enhanced cloud services home aggregator Proceedings Article In: 2012 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2012, ISSN: 2158-3994. Enhancing privacy and dynamic federation in IdM for consumer cloud computing Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 58, iss. 1, pp. 95-103, 2012, ISSN: 0098-3063. Consumer electronics for social video services Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2166-6814. Achieving IPTV Service Portability through Delegation Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 57, iss. 2, pp. 492 - 498, 2011, ISSN: 0098-3063. Media Cloud: An Open Cloud Computing Middleware for Content Management Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 57, iss. 2, pp. 970 - 978, 2011, ISSN: 0098-3063. IPTV meets delegation: Achieving IPTV service portability Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2158-3994. Personal networks federation in mobile DTV Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2158-3994. Introducing Infocards in NGN to Enable User-Centric Identity Management Proceedings Article In: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 1930-529X. Extended DLNA protocol: Sharing protected pay TV contents Proceedings Article In: 2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2010, ISSN: 2158-3994.2024
2019
2016
2015
2013
2012
2011
2010