SERVEIS

recerTIC UPC - Study of UPC science communication in COMPUTER SECURITY (2007-2017)

Publicacions Autors i coautors Institucions Matèries Revistes
Congressos Citacions Autors Més citats Matèries de citacions

 

This study is part of recerTIC UPC, a set of studies prepared by the Rector Gabriel Ferraté Library (BRGF) that aim to offer a representative view of the UPC’s scientific output on emerging topics in the field of ICT. In the recerTIC UPC study in computer security, we have considered all of the journal articles and conference publications indexed in the Web of Science (WoS) database between 2007 and 2017 and authored by UPC researchers. The query date was June 7, 2018.

More information about the methodology used for recerTIC UPC can be found clicking on this link.

The data on which this study is based are freely accessible and can be downloaded clicking on this link.recerTIC UPC

Notice: WoS allows a very extensive extraction of authors and subjects related to computer security. Unfortunately, an exhaustive recovery is not possible. Any possible absence of authors and topics at recerTIC UPC would be caused by this limitation.

UPC scientific output for 2007–2017 and its time distribution

 

# WoS UPC records
Conference papers Journal articles Others Total
137 142 2 281

 

 

Interactive map of the output of UPC authors and their co-authorships

  • Due to its complexity, this map takes some time to load. Please be patient.
  • Each node is dedicated to an author who has published on the subject examined in this survey. The edges indicate the number of documents co-authored by the authors referred to. Blue indicates a UPC author, orange an author from a research entity associated with the UPC and grey an author who is not linked to the UPC. In the case of authors with more than one affiliation, the system chooses the color of the institution that appears more times associated with the author. In the case of an author having the same number of publications associated with two or more institutions, the system chooses the color of the institution that comes first in alphabetical order.
  • This map includes researchers that have authored at least 1 publications. UPC staff may request customised maps with nodes that have a value other than 1 from the Rector Gabriel Ferraté Library.
  • Due to the fact that the documents with more than 50 authors make it impossible to create the next interactive map, these articles have been deleted to draw the graph.
  • Once the map has opened, refer to the instructions for use to make the most of the possibilities it offers.

 

Institutions with the highest number of co-authorships with UPC researchers

 

Interactive map of the WoS subject categories assigned to the output of UPC authors

  • Each node indicates the number of journal articles and conference papers indexed under the specified subject category. The edges indicate the number of documents related to the linked topics.
  • Once the map has opened, refer to the instructions for use to make the most of the possibilities it offers.

 

 

List of the 15 journals with the most publications by UPC authors

 

Journal title # docs h5 index
INFORMATION SCIENCES 3 94
COMPUTER NETWORKS 12 58
AD HOC NETWORKS 3 52
COMPUTER COMMUNICATIONS 5 48
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS 3 42
JOURNAL OF SUPERCOMPUTING 4 41
THEORETICAL COMPUTER SCIENCE 3 35
COMPUTER STANDARDS INTERFACES 3 28
INFORMATION PROCESSING LETTERS 6 23
APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING 3 12
LECTURE NOTES IN COMPUTER SCIENCE 41 --
FRONTIERS IN ARTIFICIAL INTELLIGENCE AND APPLICATIONS 3 --
INFORMATION THEORETIC SECURITY 3 --
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY 3 --
ADVANCES IN ARTIFICIAL INTELLIGENCE FOR PRIVACY PROTECTION AND SECURITY 2 --
Note: The source of information used for the h5 index is Google Scholar

 

List of the 15 conferences with the most publications by UPC authors

 

Conference name # docs h5 index
ANNUAL INTERNATIONAL CRYPTOLOGY CONFERENCE CRYPTO 2 62
ANNUAL INTERNATIONAL CONFERENCE ON THEORY AND APPLICATIONS OF CRYPTOGRAPHIC TECHNIQUES 2 53
IEEE GLOBAL COMMUNICATIONS CONFERENCE GLOBECOM 2 51
IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 5 26
INTERNATIONAL CONFERENCE ON AVAILABILITY RELIABILITY AND SECURITY 3 19
INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS INCOS 3 16
INTERNATIONAL CONFERENCE ON COMPLEX INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS CISIS 2 16
INTERNATIONAL CONFERENCE ON NETWORK BASED INFORMATION SYSTEMS NBIS 4 13
INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY SECRYPT  4 13
INTERNATIONAL CONFERENCE ON P2P PARALLEL GRID CLOUD AND INTERNET COMPUTING PGCIC 3 13
INTERNATIONAL CONFERENCE ON AUTOMATED PRODUCTION OF CROSS MEDIA CONTENT FOR MULTI CHANNEL DISTRIBUTION 3 --
INTERNATIONAL CONFERENCE ON INFORMATION THEORETIC SECURITY 3 --
EUROPEAN WORKSHOP ON TECHNOLOGICAL AND SECURITY ISSUES IN DIGITAL RIGHTS MANAGEMENT 2 --
IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM IPDPS 2 --
INTERNATIONAL CONFERENCE OF THE CATALAN ASSOCIATION FOR ARTIFICIAL INTELLIGENCE CCIA 2 --
Note: The source of information used for the h5 index is Google Scholar

 

Citations of UPC scientific output for 2007–2017 and their time distribution

 

Total UPC documents

Total of received citations

Average of citations per UPC document # documents with citations of UPC authors
603 4666 7,74 4292
Note: the table of citations above the line graph collected data from January 2007 until July 2018. The chart does not include citations generated from January 2018..

Interactive map of the 50 most cited UPC authors

  • Each node indicates the number of citations received by the referenced author.
  • Once the map has opened, refer to the instructions for use to make the most of the possibilities it offers.

 

 

Most cited UPC documents

Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
By: Cramer, Ronald; Dodis, Yevgeniy; Fehr, Serge; et al.
Conference: 27th Annual International Conference on Theory and Applications of Cryptographic Techniques Location: Istanbul, TURKEY Date: APR 13-17, 2008
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008   Book Series: Lecture Notes in Computer Science   Volume: 4965   Pages: 471-+   Published: 2008
Times Cited: 74
DOI: https://doi.org/10.1007/978-3-540-78967-3_27
Constant Size Ciphertexts in Threshold Attribute-Based Encryption
By: Herranz, Javier; Laguillaumie, Fabien; Rafols, Carla
Conference: 13th International Conference on Practice and Theory in Public Key Cryptography Location: Ecole Normale Superieure, Paris, FRANCE Date: MAY 26-28, 2010
Sponsor(s): Google; Ingenico; Technicolor
PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS   Book Series: Lecture Notes in Computer Science   Volume: 6056   Pages: 19-+   Published: 2010
Times Cited: 73
DOI: https://doi.org/10.1007/978-3-642-13013-7_2
Attribute-based encryption schemes with constant-size ciphertexts
By: Attrapadung, Nuttapong; Herranz, Javier; Laguillaumie, Fabien; et al.
THEORETICAL COMPUTER SCIENCE   Volume: 422   Pages: 15-38   Published: MAR 9 2012
Times Cited: 63
DOI: https://doi.org/10.1016/j.tcs.2011.12.004
Short Attribute-Based Signatures for Threshold Predicates
By: Herranz, Javier; Laguillaumie, Fabien; Libert, Benoit; et al.
Conference: 12th Cryptographers' Track - RSA Conference Location: San Francisco, CA Date: FEB 27-MAR 02, 2012
Sponsor(s): RSA
TOPICS IN CRYPTOLOGY - CT-RSA 2012   Book Series: Lecture Notes in Computer Science   Volume: 7178   Pages: 51-+   Published: 2012
Times Cited: 46
DOI: https://doi.org/10.1007/978-3-642-27954-6_4
BiosecurID: a multimodal biometric database
By: Fierrez, J.; Galbally, J.; Ortega-Garcia, J.; et al.
PATTERN ANALYSIS AND APPLICATIONS   Volume: 13   Issue: 2   Pages: 235-246   Published: MAY 2010
Times Cited: 45
DOI: https://doi.org/10.1007/s10044-009-0151-4
An Algebraic Framework for Diffie-Hellman Assumptions
By: Escala, Alex; Herold, Gottfried; Kiltz, Eike; et al.
Conference: 33rd Annual International Cryptology Conference (CRYPTO) Location: Univ Calif Santa Barbara, Santa Barbara, CA Date: AUG 18-22, 2013
Sponsor(s): Int Assoc Cryptol Res; Univ Calif Santa Barbara, Comp Sci Dept; IEEE Comp Soc Tech Comm Secur & Privacy
ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II   Book Series: Lecture Notes in Computer Science   Volume: 8043   Pages: 129-147   Published: 2013
Times Cited: 42
DOI: https://doi.org/10.1007/978-3-642-40084-1_8
Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation
By: Antolino Rivas, David; Barcelo-Ordinas, Jose M.; Guerrero Zapata, Manel; et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS   Volume: 34   Issue: 6   Pages: 1942-1955   Published: NOV 2011
Times Cited: 34
DOI: https://doi.org/10.1016/j.jnca.2011.07.006
A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks
By: Karami, Amin; Guerrero-Zapata, Manel
NEUROCOMPUTING   Volume: 149   Pages: 1253-1269   Part: C   Published: FEB 3 2015
Times Cited: 30
DOI: https://doi.org/10.1016/j.neucom.2014.08.070
Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model
By: Escala, Alex; Herranz, Javier; Morillo, Paz
Conference: 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa (AFRICACRYPT) Location: Dakar, SENEGALDate: JUL 05-07, 2011
Sponsor(s): Univ Cheikh Anta Diop Dakar, LACGAA Team; Presidence Republique - Serv Tech Cent Chiffres Securite Telecommunicat, STCC Team
PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2011   Book Series: Lecture Notes in Computer Science   Volume: 6737   Pages: 224-241   Published: 2011
Times Cited: 30
DOI: https://doi.org/10.1007/978-3-642-21969-6_14
SECURING UNDERWATER WIRELESS COMMUNICATION NETWORKS
By: Carmen Domingo, Mari
IEEE WIRELESS COMMUNICATIONS   Volume: 18   Issue: 1   Pages: 22-28   Published: FEB 2011
Times Cited: 27
DOI: https://doi.org/10.1109/MWC.2011.5714022
Improved certificate-based encryption in the standard model
By: Galindo, David; Morillo, Paz; Rafols, Carla
JOURNAL OF SYSTEMS AND SOFTWARE   Volume: 81   Issue: 7   Pages: 1218-1226   Published: JUL 2008
Times Cited: 27
DOI: https://doi.org/10.1016/j.jss.2007.09.009
Private location-based information retrieval through user collaboration
By: Rebollo-Monedero, David; Forne, Jordi; Solanas, Agusti; et al.
COMPUTER COMMUNICATIONS   Volume: 33   Issue: 6   Pages: 762-774   Published: APR 15 2010
Times Cited: 24
DOI: https://doi.org/10.1016/j.comcom.2009.11.024
Optimal Route, Spectrum, and Modulation Level Assignment in Split-Spectrum-Enabled Dynamic Elastic Optical Networks
By: Pages, Albert; Perello, Jordi; Spadaro, Salvatore; et al.
JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING   Volume: 6   Issue: 2   Pages: 114-126   Published: FEB 1 2014
Times Cited: 23
DOI: https://doi.org/10.1364/JOCN.6.000114
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing
By: Li, Jin; Liu, Zheli; Chen, Xiaofeng; et al.
KNOWLEDGE-BASED SYSTEMS   Volume: 79   Pages: 18-26   Published: MAY 2015
Times Cited: 21
DOI: https://doi.org/10.1016/j.knosys.2014.04.010
Matroids can be far from ideal secret sharing
By: Beimel, Amos; Livne, Noam; Padro, Carles
Conference: 5th Theory of Cryptography Conference Location: New York Univ, New York, NY Date: MAR 19-21, 2008
Sponsor(s): Int Assoc Cryptolog Res; New York Univ, Dept Comp Sci; Courant Inst Math Sci; DE Shaw Grp; IBM; Microsoft
THEORY OF CRYPTOGRAPHY   Book Series: Lecture Notes in Computer Science   Volume: 4948   Pages: 194-+   Published: 2008
Times Cited: 21
DOI: https://doi.org/10.1007/978-3-540-78524-8_12
Biometric Applications Related to Human Beings: There Is Life beyond Security
By: Faundez-Zanuy, Marcos; Hussain, Amir; Mekyska, Jiri; et al.
COGNITIVE COMPUTATION   Volume: 5   Issue: 1   Pages: 136-151   Published: MAR 2013
Times Cited: 20
DOI: https://doi.org/10.1007/s12559-012-9169-9
Synchronization in semiconductor laser rings
By: Buldu, Javier Martin; Torrent, M. C.; Garcia-Ojalvo, Jordi
JOURNAL OF LIGHTWAVE TECHNOLOGY   Volume: 25   Issue: 6   Pages: 1549-1554   Published: JUN 2007
Times Cited: 20
DOI: https://doi.org/10.1109/JLT.2007.895555
CCA2-secure threshold broadcast encryption with shorter ciphertexts
By: Daza, Vanesa; Herranz, Javier; Morillo, Paz; et al.
Conference: 1st International Conference on Provable Security Location: Wollongong, AUSTRALIA Date: NOV 01-02, 2007
Sponsor(s): iCORE Informat Security Lab; RNSA
PROVABLE SECURITY, PROCEEDINGS   Book Series: Lecture Notes in Computer Science   Volume: 4784   Pages: 35-+   Published: 2007
Times Cited: 20
DOI: https://doi.org/10.1007/978-3-540-75670-5_3

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control
By: Xhafa, Fatos; Wang, Jianfeng; Chen, Xiaofeng; et al.
SOFT COMPUTING   Volume: 18   Issue: 9   Pages: 1795-1802   Published: SEP 2014
Times Cited: 19
DOI: https://doi.org/10.1007/s00500-013-1202-8

On the large-eddy simulations for the flow around aerodynamic profiles using unstructured grids
By: Lehmkuhl, O.; Rodriguez, I.; Baez, A.; et al.
COMPUTERS & FLUIDS   Volume: 84   Pages: 176-189   Published: SEP 15 2013
Times Cited: 18
DOI: https://doi.org/10.1016/j.compfluid.2013.06.002
OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
By: Li, Jin; Tan, Xiao; Chen, Xiaofeng; et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING   Volume: 3   Issue: 2   Pages: 195-205   Published: APR-JUN 2015
Times Cited: 16
DOI: https://doi.org/10.1109/TCC.2014.2366148
Improvement of JXTAOverlay P2P Platform: Evaluation for Medical Application and Reliability
By: Liu, Yi; Sakamoto, Shinji; Matsuo, Keita; et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES   Volume: 6   Issue: 2   Pages: 45-62   Published: APR-JUN 2015
Times Cited: 15
DOI: https://doi.org/10.4018/IJDST.2015040104
MODERN APPROACHES TO MODELING USER REQUIREMENTS ON RESOURCE AND TASK ALLOCATION IN HIERARCHICAL COMPUTATIONAL GRIDS
By: Kolodziej, Joanna; Xhafa, Fatos
INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE   Volume: 21   Issue: 2   Pages: 243-257   Published: JUN 2011
Times Cited: 15
DOI: https://doi.org/10.2478/v10006-011-0018-x
Secure deduplication storage systems supporting keyword search
By: Li, Jin; Chen, Xiaofeng; Xhafa, Fatos; et al.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES   Volume: 81   Issue: 8   Pages: 1532-1541   Published: DEC 2015
Times Cited: 13
DOI: https://doi.org/10.1016/j.jcss.2014.12.026

On content-based recommendation and user privacy in social-tagging systems
By: Puglisi, Silvia; Parra-Arnau, Javier; Forne, Jordi; et al.
COMPUTER STANDARDS & INTERFACES   Volume: 41   Pages: 17-27   Published: SEP 2015
Times Cited: 13
DOI: https://doi.org/10.1016/j.csi.2015.01.004

Note: no UPC authors appearing in a reference means that their names are included in “et al.”. To show the full information, click on the DOI.

 

Interactive map of the WoS subject categories assigned to documents containing citations of UPC authors

  • Each node indicates the number of journal articles and conference papers indexed under the specified subject category. The edges indicate the number of documents related to the linked topics.
  • Once the map has opened, refer to the instructions for use to make the most of the possibilities it offers.
     

The Rector Gabriel Ferraté Library is grateful for the collaboration of professors René Alquézar and Elisa Sayrol in the preparation of the recerTIC UPC reports.

Logotips


Darrera actualització: 06/03/2019