No photo of Esther Palomar Ganzalex

Esther Palomar Ganzalex

Dr.

Accepting PhD Students

20062024

Research activity per year

Filter
Conference contribution

Search results

  • 2020

    Performance Evaluation of a Collaborative IoT Framework for Energy-Efficient Communities

    Palomar, E., Cruz, C., Bravo, I. & Gardel, A., Dec 2020, Proceedings - 2020 IEEE 22nd International Conference on High Performance Computing and Communications, IEEE 18th International Conference on Smart City and IEEE 6th International Conference on Data Science and Systems, HPCC-SmartCity-DSS 2020. Institute of Electrical and Electronics Engineers Inc., p. 861-866 6 p. 9407956. (Proceedings - 2020 IEEE 22nd International Conference on High Performance Computing and Communications, IEEE 18th International Conference on Smart City and IEEE 6th International Conference on Data Science and Systems, HPCC-SmartCity-DSS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2019

    Cooperative System and Scheduling Algorithm for Sustainable Energy-Efficient Communities

    Palomar, E., Cruz, C., Bravo, I. & Gardel, A., 2019, How AI Impacts Urban Living and Public Health - 17th International Conference, ICOST 2019, Proceedings. Pagán, J., Mokhtari, M., Aloulou, H., Abdulrazak, B. & Cabrera, M. F. (eds.). Springer, p. 197-203 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11862 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2018

    On security in encrypted computing

    Breuer, P. T., Bowen, J. P., Palomar, E. & Liu, Z., 2018, Information and Communications Security - 20th International Conference, ICICS 2018, Proceedings. Blanc, G., Qing, S., Lu, R., Zhang, Z., Meddahi, A., Naccache, D., Xu, S. & Samarati, P. (eds.). Springer Verlag, p. 192-211 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11149 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • Superscalar Encrypted RISC: The Measure of a Secret Computer

    Breuer, P., Bowen, J., Palomar, E. & Liu, Z., 5 Sept 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc., p. 1336-1341 6 p. 8456053. (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • The Secret Processor Will Go to the Ball: Benchmark Insider-Proof Encrypted Computing

    Breuer, P. T., Bowen, J. P., Palomar, E. & Liu, Z., 6 Jul 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy Workshops, EURO S and PW 2018. Institute of Electrical and Electronics Engineers Inc., p. 145-152 8 p. (Proceedings - 3rd IEEE European Symposium on Security and Privacy Workshops, EURO S and PW 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Towards an anonymity supported platform for shared cyber threat intelligence

    Wagner, T. D., Palomar, E., Mahbub, K. & Abdallah, A. E., 2018, Risks and Security of Internet and Systems - 12th International Conference, CRiSIS 2017, Revised Selected Papers. Cuppens, N., Cuppens, F., Legay, A., Lanet, J-L. & Garcia-Alfaro, J. (eds.). Springer Verlag, p. 175-183 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10694 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Citations (SciVal)
  • 2017

    A middleware enforcing location privacy in mobile platform

    Patel, A. & Palomar, E., 2017, Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Proceedings. Lopez, J., Fischer-Hubner, S. & Lambrinoudakis, C. (eds.). Springer Verlag, p. 32-45 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10442 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Encrypted computing: Speed, security and provable obfuscation against insiders

    Breuer, P. T., Bowen, J. P., Palomar, E. & Liu, Z., 5 Dec 2017, Proceedings - 2017 International Carnahan Conference on Security Technology, ICCST 2017. Ortega-Garcia, J., Morales, A., Fierrez, J., Vera-Rodriguez, R. & Lazzeretti, R. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. (Proceedings - International Carnahan Conference on Security Technology; vol. 2017-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • On obfuscating compilation for encrypted computing

    Breuer, P. T., Bowen, J. P., Palomar, E. & Liu, Z., 2017, SECRYPT. Samarati, P., Obaidat, M. S. & Cabello, E. (eds.). SciTePress, p. 247-254 8 p. (ICETE 2017 - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    7 Citations (Scopus)
  • Protecting Smartphone Users’ Private Locations Through Caching

    Patel, A. & Palomar, E., 2017, E-Business and Telecommunications - 13th International Joint Conference, ICETE 2016, Revised Selected Papers. Obaidat, M. S. (ed.). Springer Verlag, p. 316-337 22 p. (Communications in Computer and Information Science; vol. 764).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Relevance filtering for shared cyber threat intelligence (short paper)

    Wagner, T. D., Palomar, E., Mahbub, K. & Abdallah, A. E., 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings. Liu, J. K. & Samarati, P. (eds.). Springer Verlag, p. 576-586 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10701 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Citations (Scopus)
  • 2016

    ALOC: Attribute level of confidence for a user-centric attribute assurance

    Rmeileh, S. A., Palomar, E. & Shah, H., 2016, Privacy and Identity Management: Time for a Revolution? - 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Revised Selected Papers. Hansen, M., Fischer-Hubner, S., Aspinall, D., Raab, C. & Camenisch, J. (eds.). Springer New York, p. 239-252 14 p. (IFIP Advances in Information and Communication Technology; vol. 476).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A practical encrypted microprocessor

    Breuer, P. T., Bowen, J. P., Palomar, E. & Liu, Z., 2016, ICETE 2016 - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications. Callegari, C., van Sinderen, M., Cabello, E., Samarati, P., Lorenz, P., Obaidat, M. S. & Sarigiannidis, P. (eds.). SciTePress, p. 239-250 12 p. (ICETE 2016 - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    11 Citations (Scopus)
  • LP-Caché: Privacy-aware cache model for location-based apps

    Patel, A. & Palomar, E., 2016, ICETE 2016 - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications. Callegari, C., van Sinderen, M., Sarigiannidis, P., Samarati, P., Cabello, E., Lorenz, P. & Obaidat, M. S. (eds.). SciTePress, p. 183-194 12 p. (ICETE 2016 - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    2 Citations (Scopus)
  • 2014

    Component-based modelling for sustainable and scalable smart meter networks

    Palomar, E., Liu, Z., Bowen, J. P., Zhang, Y. & Maharjan, S., 8 Oct 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, WoWMoM 2014. Institute of Electrical and Electronics Engineers Inc., 6918927. (Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, WoWMoM 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • Privacy preservation in location-based mobile applications: Research directions

    Patel, A. & Palomar, E., 9 Dec 2014, Proceedings - 9th International Conference on Availability, Reliability and Security, ARES 2014. Institute of Electrical and Electronics Engineers Inc., p. 227-233 7 p. 6980286. (Proceedings - 9th International Conference on Availability, Reliability and Security, ARES 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Citations (Scopus)
  • 2013

    Coalitional games for the management of anonymous access in online social networks

    Palomar, E., Alcaide, A., Molina, E. & Zhang, Y., 2013, 2013 11th Annual Conference on Privacy, Security and Trust, PST 2013. p. 1-10 10 p. 6596030. (2013 11th Annual Conference on Privacy, Security and Trust, PST 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Citations (Scopus)
  • 2011

    Artificial immunity-based correlation system

    Suarez-Tangil, G., Palomar, E., Pastrana, S. & Ribagorda, A., 2011, SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography. p. 422-425 4 p. (SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • Cooperation in ad hoc network security services: Classification and survey

    Montero-Castillo, J. & Palomar, E., 2011, UBICOMM 2011 - 5th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies; PECES 2011 - 3rd International Workshop on Pervasive Computing in Embedded Systems. p. 175-179 5 p. (UBICOMM 2011 - 5th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies; PECES 2011 - 3rd International Workshop on Pervasive Computing in Embedded Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Privacy-enhancing cryptography-based materials

    Alcaide, A., Palomar, E., Barroso-Perez, I. & Abdallah, A. E., 2011, SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography. p. 379-382 4 p. (SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2010

    An experimental comparison of source location privacy methods for power optimization in WSNs

    Suarez-Tangil, G., Palomar, E., Ramos, B. & Ribagorda, A., 2010, Advances in Sensors, Signals and Materials - 3rd WSEAS International Conference on Sensors and Signals, SENSIG'10, 3rd WSEAS International Conference on Materials Science, MATERIALS'10. p. 79-84 6 p. (Advances in Sensors, Signals and Materials - 3rd WSEAS International Conference on Sensors and Signals, SENSIG'10, 3rd WSEAS International Conference on Materials Science, MATERIALS'10).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Citations (Scopus)
  • Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security

    Peris-Lopez, P., Hernandez-Castro, J. C., Tapiador, J. M. E., Palomar, E. & Van Der Lubbe, J. C. A., 2010, RFID 2010: International IEEE Conference on RFID. p. 45-52 8 p. 5467258. (RFID 2010: International IEEE Conference on RFID).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    22 Citations (SciVal)
  • Formal proof of cooperativeness in a multi-party P2P content authentication protocol

    Alcaide, A., Palomar, E., González-Tablas, A. I. & Ribagorda, A., 2010, Trust, Privacy and Security in Digital Business - 7th International Conference, TrustBus 2010, Proceedings. p. 141-152 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6264 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2009

    Automatic rule generation based on genetic programming for event correlation

    Suarez-Tangil, G., Palomar, E., De Fuentes, J. M., Blasco, J. & Ribagorda, A., 2009, Computational Intelligence in Security for Information Systems, CISIS 2009 - 2nd International Workshop, Proceedings. p. 127-134 8 p. (Advances in Intelligent and Soft Computing; vol. 63 AISC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    19 Citations (SciVal)
  • Effects of cooperation-based peer-to-peer authentication on system performance

    Palomar, E., Ribagorda, A., Tapiador, J. E. & Hernandez-Castro, J., 2009, 1st International Conference on Multimedia Information Networking and Security, MINES 2009. p. 444-448 5 p. 5371027. (1st International Conference on Multimedia Information Networking and Security, MINES 2009; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2007

    Bayesian analysis of secure P2P sharing protocols

    Palomar, E., Alcaide, A., Estevez-Tapiador, J. M. & Hernandez-Castro, J. C., 2007, On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS - OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Proceedings. PART 2 ed. Springer Verlag, p. 1701-1717 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4804 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • Dealing with sporadic strangers, or the (Un)suitability of trust for mobile P2P security

    Palomar, E., Tapiador, J. M. E., Hernandez-Castro, J. C. & Ribagorda, A., 2007, Proceedings DEXA 2007 18th International Workshop on Database and Expert Systems Applications. p. 779-783 5 p. 4313000. (Proceedings - International Workshop on Database and Expert Systems Applications, DEXA).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • 2006

    A P2P content authentication protocol based on byzantine agreement

    Palomar, E., Estevez-Tapiador, J. M., Hernandez-Castro, J. C. & Ribagorda, A., 2006, Emerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Proceedings. Springer Verlag, p. 60-72 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3995 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • A protocol for secure content distribution in pure P2P networks

    Palomar, E., Estevez-Tapiador, J. M., Hernandez-Castro, J. C. & Ribagorda, A., 2006, Proceedings - 17th International Conference on Database and Expert Systems Applications, DEXA 2006. p. 712-716 5 p. 1698436. (Proceedings - International Workshop on Database and Expert Systems Applications, DEXA).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • Certificate-based access control in Pure P2P networks

    Palomar, E., Estevez-Tapiador, J. M., Hernandez-Castro, J. C. & Ribagorda, A., 2006, Proceedings - 6th IEEE International Conference on Peer-to-Peer Computing, P2P 2006. Montresor, A., Wierzbicki, A. & Shahmehri, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 177-184 8 p. 1698608. (Proceedings - 6th IEEE International Conference on Peer-to-Peer Computing, P2P 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Citations (Scopus)
  • Security in P2P networks: Survey and research directions

    Palomar, E., Estevez-Tapiador, J. M., Hernandez-Castro, J. C. & Ribagorda, A., 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Zhou, X., Sokolsky, O., Yan, L., Yan, L., Jung, E-S., Shao, Z., Mu, Y., Lee, D-C., Kim, D., Jeong, Y-S. & Xu, C-Z. (eds.). Springer Verlag, p. 183-192 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    5 Citations (SciVal)
Your message has successfully been sent.
Your message was not sent due to an error.