This study is part of recerTIC UPC, a set of studies prepared by the Rector Gabriel Ferraté Library (BRGF) that aim to offer a representative view of the UPC’s scientific output on emerging topics in the field of ICT. In the recerTIC UPC study in computer security, we have considered all of the journal articles and conference publications indexed in the Web of Science (WoS) database between 2007 and 2017 and authored by UPC researchers. The query date was June 7, 2018.
More information about the methodology used for recerTIC UPC can be found clicking on this link.
The data on which this study is based are freely accessible and can be downloaded clicking on this link.
Journal title | # docs | h5 index |
INFORMATION SCIENCES | 3 | 94 |
COMPUTER NETWORKS | 12 | 58 |
AD HOC NETWORKS | 3 | 52 |
COMPUTER COMMUNICATIONS | 5 | 48 |
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 3 | 42 |
JOURNAL OF SUPERCOMPUTING | 4 | 41 |
THEORETICAL COMPUTER SCIENCE | 3 | 35 |
COMPUTER STANDARDS INTERFACES | 3 | 28 |
INFORMATION PROCESSING LETTERS | 6 | 23 |
APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING | 3 | 12 |
LECTURE NOTES IN COMPUTER SCIENCE | 41 | -- |
FRONTIERS IN ARTIFICIAL INTELLIGENCE AND APPLICATIONS | 3 | -- |
INFORMATION THEORETIC SECURITY | 3 | -- |
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY | 3 | -- |
ADVANCES IN ARTIFICIAL INTELLIGENCE FOR PRIVACY PROTECTION AND SECURITY | 2 | -- |
Conference name | # docs | h5 index |
ANNUAL INTERNATIONAL CRYPTOLOGY CONFERENCE CRYPTO | 2 | 62 |
ANNUAL INTERNATIONAL CONFERENCE ON THEORY AND APPLICATIONS OF CRYPTOGRAPHIC TECHNIQUES | 2 | 53 |
IEEE GLOBAL COMMUNICATIONS CONFERENCE GLOBECOM | 2 | 51 |
IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA | 5 | 26 |
INTERNATIONAL CONFERENCE ON AVAILABILITY RELIABILITY AND SECURITY | 3 | 19 |
INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS INCOS | 3 | 16 |
INTERNATIONAL CONFERENCE ON COMPLEX INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS CISIS | 2 | 16 |
INTERNATIONAL CONFERENCE ON NETWORK BASED INFORMATION SYSTEMS NBIS | 4 | 13 |
INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY SECRYPT | 4 | 13 |
INTERNATIONAL CONFERENCE ON P2P PARALLEL GRID CLOUD AND INTERNET COMPUTING PGCIC | 3 | 13 |
INTERNATIONAL CONFERENCE ON AUTOMATED PRODUCTION OF CROSS MEDIA CONTENT FOR MULTI CHANNEL DISTRIBUTION | 3 | -- |
INTERNATIONAL CONFERENCE ON INFORMATION THEORETIC SECURITY | 3 | -- |
EUROPEAN WORKSHOP ON TECHNOLOGICAL AND SECURITY ISSUES IN DIGITAL RIGHTS MANAGEMENT | 2 | -- |
IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM IPDPS | 2 | -- |
INTERNATIONAL CONFERENCE OF THE CATALAN ASSOCIATION FOR ARTIFICIAL INTELLIGENCE CCIA | 2 | -- |
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors By: Cramer, Ronald; Dodis, Yevgeniy; Fehr, Serge; et al. Conference: 27th Annual International Conference on Theory and Applications of Cryptographic Techniques Location: Istanbul, TURKEY Date: APR 13-17, 2008 ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008 Book Series: Lecture Notes in Computer Science Volume: 4965 Pages: 471-+ Published: 2008 Times Cited: 74 DOI: https://doi.org/10.1007/978-3-540-78967-3_27 |
Constant Size Ciphertexts in Threshold Attribute-Based Encryption By: Herranz, Javier; Laguillaumie, Fabien; Rafols, Carla Conference: 13th International Conference on Practice and Theory in Public Key Cryptography Location: Ecole Normale Superieure, Paris, FRANCE Date: MAY 26-28, 2010 Sponsor(s): Google; Ingenico; Technicolor PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS Book Series: Lecture Notes in Computer Science Volume: 6056 Pages: 19-+ Published: 2010 Times Cited: 73 DOI: https://doi.org/10.1007/978-3-642-13013-7_2 |
Attribute-based encryption schemes with constant-size ciphertexts By: Attrapadung, Nuttapong; Herranz, Javier; Laguillaumie, Fabien; et al. THEORETICAL COMPUTER SCIENCE Volume: 422 Pages: 15-38 Published: MAR 9 2012 Times Cited: 63 DOI: https://doi.org/10.1016/j.tcs.2011.12.004 |
Short Attribute-Based Signatures for Threshold Predicates By: Herranz, Javier; Laguillaumie, Fabien; Libert, Benoit; et al. Conference: 12th Cryptographers' Track - RSA Conference Location: San Francisco, CA Date: FEB 27-MAR 02, 2012 Sponsor(s): RSA TOPICS IN CRYPTOLOGY - CT-RSA 2012 Book Series: Lecture Notes in Computer Science Volume: 7178 Pages: 51-+ Published: 2012 Times Cited: 46 DOI: https://doi.org/10.1007/978-3-642-27954-6_4 |
BiosecurID: a multimodal biometric database By: Fierrez, J.; Galbally, J.; Ortega-Garcia, J.; et al. PATTERN ANALYSIS AND APPLICATIONS Volume: 13 Issue: 2 Pages: 235-246 Published: MAY 2010 Times Cited: 45 DOI: https://doi.org/10.1007/s10044-009-0151-4 |
An Algebraic Framework for Diffie-Hellman Assumptions By: Escala, Alex; Herold, Gottfried; Kiltz, Eike; et al. Conference: 33rd Annual International Cryptology Conference (CRYPTO) Location: Univ Calif Santa Barbara, Santa Barbara, CA Date: AUG 18-22, 2013 Sponsor(s): Int Assoc Cryptol Res; Univ Calif Santa Barbara, Comp Sci Dept; IEEE Comp Soc Tech Comm Secur & Privacy ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II Book Series: Lecture Notes in Computer Science Volume: 8043 Pages: 129-147 Published: 2013 Times Cited: 42 DOI: https://doi.org/10.1007/978-3-642-40084-1_8 |
Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation By: Antolino Rivas, David; Barcelo-Ordinas, Jose M.; Guerrero Zapata, Manel; et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS Volume: 34 Issue: 6 Pages: 1942-1955 Published: NOV 2011 Times Cited: 34 DOI: https://doi.org/10.1016/j.jnca.2011.07.006 |
A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks By: Karami, Amin; Guerrero-Zapata, Manel NEUROCOMPUTING Volume: 149 Pages: 1253-1269 Part: C Published: FEB 3 2015 Times Cited: 30 DOI: https://doi.org/10.1016/j.neucom.2014.08.070 |
Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model By: Escala, Alex; Herranz, Javier; Morillo, Paz Conference: 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa (AFRICACRYPT) Location: Dakar, SENEGALDate: JUL 05-07, 2011 Sponsor(s): Univ Cheikh Anta Diop Dakar, LACGAA Team; Presidence Republique - Serv Tech Cent Chiffres Securite Telecommunicat, STCC Team PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2011 Book Series: Lecture Notes in Computer Science Volume: 6737 Pages: 224-241 Published: 2011 Times Cited: 30 DOI: https://doi.org/10.1007/978-3-642-21969-6_14 |
SECURING UNDERWATER WIRELESS COMMUNICATION NETWORKS By: Carmen Domingo, Mari IEEE WIRELESS COMMUNICATIONS Volume: 18 Issue: 1 Pages: 22-28 Published: FEB 2011 Times Cited: 27 DOI: https://doi.org/10.1109/MWC.2011.5714022 |
Improved certificate-based encryption in the standard model By: Galindo, David; Morillo, Paz; Rafols, Carla JOURNAL OF SYSTEMS AND SOFTWARE Volume: 81 Issue: 7 Pages: 1218-1226 Published: JUL 2008 Times Cited: 27 DOI: https://doi.org/10.1016/j.jss.2007.09.009 |
Private location-based information retrieval through user collaboration By: Rebollo-Monedero, David; Forne, Jordi; Solanas, Agusti; et al. COMPUTER COMMUNICATIONS Volume: 33 Issue: 6 Pages: 762-774 Published: APR 15 2010 Times Cited: 24 DOI: https://doi.org/10.1016/j.comcom.2009.11.024 |
Optimal Route, Spectrum, and Modulation Level Assignment in Split-Spectrum-Enabled Dynamic Elastic Optical Networks By: Pages, Albert; Perello, Jordi; Spadaro, Salvatore; et al. JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING Volume: 6 Issue: 2 Pages: 114-126 Published: FEB 1 2014 Times Cited: 23 DOI: https://doi.org/10.1364/JOCN.6.000114 |
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing By: Li, Jin; Liu, Zheli; Chen, Xiaofeng; et al. KNOWLEDGE-BASED SYSTEMS Volume: 79 Pages: 18-26 Published: MAY 2015 Times Cited: 21 DOI: https://doi.org/10.1016/j.knosys.2014.04.010 |
Matroids can be far from ideal secret sharing By: Beimel, Amos; Livne, Noam; Padro, Carles Conference: 5th Theory of Cryptography Conference Location: New York Univ, New York, NY Date: MAR 19-21, 2008 Sponsor(s): Int Assoc Cryptolog Res; New York Univ, Dept Comp Sci; Courant Inst Math Sci; DE Shaw Grp; IBM; Microsoft THEORY OF CRYPTOGRAPHY Book Series: Lecture Notes in Computer Science Volume: 4948 Pages: 194-+ Published: 2008 Times Cited: 21 DOI: https://doi.org/10.1007/978-3-540-78524-8_12 |
Biometric Applications Related to Human Beings: There Is Life beyond Security By: Faundez-Zanuy, Marcos; Hussain, Amir; Mekyska, Jiri; et al. COGNITIVE COMPUTATION Volume: 5 Issue: 1 Pages: 136-151 Published: MAR 2013 Times Cited: 20 DOI: https://doi.org/10.1007/s12559-012-9169-9 |
Synchronization in semiconductor laser rings By: Buldu, Javier Martin; Torrent, M. C.; Garcia-Ojalvo, Jordi JOURNAL OF LIGHTWAVE TECHNOLOGY Volume: 25 Issue: 6 Pages: 1549-1554 Published: JUN 2007 Times Cited: 20 DOI: https://doi.org/10.1109/JLT.2007.895555 |
CCA2-secure threshold broadcast encryption with shorter ciphertexts By: Daza, Vanesa; Herranz, Javier; Morillo, Paz; et al. Conference: 1st International Conference on Provable Security Location: Wollongong, AUSTRALIA Date: NOV 01-02, 2007 Sponsor(s): iCORE Informat Security Lab; RNSA PROVABLE SECURITY, PROCEEDINGS Book Series: Lecture Notes in Computer Science Volume: 4784 Pages: 35-+ Published: 2007 Times Cited: 20 DOI: https://doi.org/10.1007/978-3-540-75670-5_3 |
An efficient PHR service system supporting fuzzy keyword search and fine-grained access control |
On the large-eddy simulations for the flow around aerodynamic profiles using unstructured grids By: Lehmkuhl, O.; Rodriguez, I.; Baez, A.; et al. COMPUTERS & FLUIDS Volume: 84 Pages: 176-189 Published: SEP 15 2013 Times Cited: 18 DOI: https://doi.org/10.1016/j.compfluid.2013.06.002 |
OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices By: Li, Jin; Tan, Xiao; Chen, Xiaofeng; et al. IEEE TRANSACTIONS ON CLOUD COMPUTING Volume: 3 Issue: 2 Pages: 195-205 Published: APR-JUN 2015 Times Cited: 16 DOI: https://doi.org/10.1109/TCC.2014.2366148 |
Improvement of JXTAOverlay P2P Platform: Evaluation for Medical Application and Reliability By: Liu, Yi; Sakamoto, Shinji; Matsuo, Keita; et al. INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES Volume: 6 Issue: 2 Pages: 45-62 Published: APR-JUN 2015 Times Cited: 15 DOI: https://doi.org/10.4018/IJDST.2015040104 |
MODERN APPROACHES TO MODELING USER REQUIREMENTS ON RESOURCE AND TASK ALLOCATION IN HIERARCHICAL COMPUTATIONAL GRIDS By: Kolodziej, Joanna; Xhafa, Fatos INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE Volume: 21 Issue: 2 Pages: 243-257 Published: JUN 2011 Times Cited: 15 DOI: https://doi.org/10.2478/v10006-011-0018-x |
Secure deduplication storage systems supporting keyword search By: Li, Jin; Chen, Xiaofeng; Xhafa, Fatos; et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES Volume: 81 Issue: 8 Pages: 1532-1541 Published: DEC 2015 Times Cited: 13 DOI: https://doi.org/10.1016/j.jcss.2014.12.026 |
On content-based recommendation and user privacy in social-tagging systems |