Francisco Rico-Novella

ORCID: 0000-0003-1025-5181
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Authentication Protocols Security
  • Cryptography and Data Security
  • User Authentication and Security Systems
  • Chaos-based Image/Signal Encryption
  • Digital Rights Management and Security
  • Network Security and Intrusion Detection
  • Distributed systems and fault tolerance
  • Cryptographic Implementations and Security
  • Security in Wireless Sensor Networks
  • Biometric Identification and Security
  • Administrative Law and Governance
  • Multimedia Communication and Technology
  • Mobile Ad Hoc Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Steganography and Watermarking Techniques
  • Context-Aware Activity Recognition Systems
  • Mobile Crowdsensing and Crowdsourcing
  • Advanced Data Storage Technologies
  • Media and Digital Communication
  • Technology's Impact on Media
  • Knowledge Societies in the 21st Century
  • Wireless Networks and Protocols
  • Green IT and Sustainability
  • Engineering and Information Technology
  • Bluetooth and Wireless Communication Technologies

Universitat Politècnica de Catalunya
2003-2023

Polytechnic University of Puerto Rico
2013

Universidad Autónoma de Occidente
2010

Universitat de Barcelona
2008

The application areas of multi-hop wireless networks are expected to experience sustained growth in the next years. This will be further supported by current possibility providing low-cost communication capabilities any device. One main issues consider with this type is congestion control, that is, avoiding an excessive volume data traffic could lead a loss performance. In work, distributed control mechanism proposed for generic networks. Different categories taken into account, each them...

10.1016/j.comnet.2023.109813 article EN cc-by Computer Networks 2023-05-12

Perfect secrecy can only be achieved in multicast groups by ciphering data sent to the group with a different key every time member joins or leaves group. A server must send new all remaining members so bandwidth efficiency concerns appear. Logical tree algorithms reduce number of messages sent, but many scenarios, rekeying after each membership change has no sense. Batch are proposed as solution these problems. However such methods need maintain logical balanced on order achieve maximum...

10.1109/iscc.2003.1214218 article EN 2004-03-30

Smart Grid (SG) networks include an associated data network for the transmission and reception of control related to electric power supply service. A subset this is SG Neighborhood Area Network (SG NAN), whose objective interconnect subscribers' homes with supplier center. The flows transmitted through these NANs belong different applications, giving rise need quality service requirements. Additionally, other subscriber appliances could use communicate over Internet. To avoid congestion, as...

10.1109/access.2020.3041690 article EN cc-by IEEE Access 2020-01-01

Major advances in information and communication technologies (ICTs) make citizens to be considered as sensors motion. Carrying their mobile devices, moving connected vehicles or actively participating social networks, provide a wealth of that, after properly processing, can support numerous applications for the benefit community. In context smart communities, INRISCO [1] proposal intends (i) early detection abnormal situations cities (i.e., incidents), (ii) analysis whether, according...

10.1109/access.2020.2987483 article EN cc-by IEEE Access 2020-01-01

A problem with transaction system which requires an open network to carry out operations using a smart card is that the user does not know information signs his card. In addition, users do have any proof about reader authenticity. Architecture of trustworthy guarantee correct proposed. secure coprocessor integrated inside provide safe place in order store sensitive data and support different level security services. The design includes barrier substrate, X-ray sensor, temperature sensor...

10.1109/isce.2008.4559492 article EN 2008-04-01

Certification path validation is a complex task that implies high computational cost. In this process necessary to verify the binding between owner ofthe certificate and his public key. SET protocol, customer merchant require certification of their certificates trust each other. The carry out several cryptographic operations complete protocol including authentication process. Because mobile devices are limited in terms processing storage capacities, it relevant reduce cost required by...

10.1109/ares.2008.101 article EN 2008-03-01

Mobile payment protocols must provide security services (e.g., authentication, authorisation, integrity, privacy and non-repudiation), but the features of mobile devices make it a difficult task, especially when service requires to perform public key operations. It is very well known, that operations require high execution time CPU battery consumption. In this paper, we computed computational cost required by each entity in five protocols. addition, transmission message among different...

10.1504/ijitm.2010.030948 article EN International Journal of Information Technology and Management 2010-01-01

Storage, delivery and update of cryptographic keys are the most important items to study in multicast security. Traditionally a centralized trusted third party called key server (KS) performs these actions. Different works have been presented that address issue minimizing storage for KS required bandwidth updating keys. Our research group has working method rekeying using broadcast encryption technique pseudo-random functions order reduce number sent messages minimize store by KS. We apply...

10.1109/itre.2003.1270619 article EN 2003-01-01

In 2007, Liao-Wang proposed a dynamic ID-based remote user authentication scheme for multi-server environment using smart cards.However, Hsiang-Shih demonstrated that Liao-Wang's has security flaws.Moreover, an improvement which resolves the flaws of scheme.In this paper, we propose enhanced maintains merits Hsiang-Shih's scheme.Performance evaluation efficiency over related works.Security analysis proved is secure against known attacks.

10.5121/ijnsa.2010.2409 article EN International Journal of Network Security & Its Applications 2010-10-22

This paper presents an efficient and practical protocol to carry out micropayments, based on the use of anonymous mobile cash, that provides anonymity unlinkability customers. The cash used in can be different value denomination. It is official after a bank signs it with specific private key. stores relation between cash's its corresponding public scheme prevents double spending forgery attacks. A device supports Java applications Bluetooth technology required. Through pseudonym certificates...

10.1109/ntms.2008.ecp.61 article EN New Technologies, Mobility and Security 2008-11-01

Recently, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme claimed that their is secure. In this paper, we show Gulati's vulnerable to insider, masquerade, server spoofing attacks. Moreover, it fails provide mutual authentication. order remedy these drawbacks, paper proposes secure using smart cards. The performance evaluation security analysis our proposal feasible in terms of computational cost, storage capacity, the can resist several

10.1109/i-society16502.2010.6018817 article EN International Conference on Information Society 2010-06-01

In 2010, Sood-Sarje-Singh proposed two dynamic ID-based remote user authentication schemes. The first schemeis a security improvement of Liao et al.’s scheme and the second is Wang etal.’s scheme. both cases, authors claimed that their schemes can resist many attacks. However, we find thatboth have flaws. addition, require verification table time-synchronization,making unfeasible unsecured for electronic services. order to remedy flaws ofSood schemes, propose robust which resists well-known...

10.1016/s1665-6423(13)71583-9 article EN Journal of Applied Research and Technology 2013-10-01

Online mobile payment systems based on cash provide privacy to customers and are feasible for real point of sale, virtual person-to-person commerce scenarios.The merchant does not perform complex operations the bank verifies validity before delivers product.The must store spent in a database prevent double spending attack.In this paper, we propose an efficient scheme which customer attaches expiration date deposit date.This property reduces size bank's spend expiry.Moreover, merchant's...

10.4304/jsw.5.6.579-584 article EN Journal of Software 2010-06-01

Recently, Wang, Liu, Xiao and Dan proposed an efficient secure dynamic ID-based remote user authentication scheme claimed that their provides strong security. We demonstrate Wang et al.'s is vulnerable to insider, masquerade server spoofing attacks.

10.1016/j.protcy.2012.03.038 article EN Procedia Technology 2012-01-01

The increasing density of the electronic devices in everyday activities is turning system interoperability into an emerging research scenario with a clear impact on life quality. Interoperability architectures try to overcome complexity related heterogeneous procedures, interfaces and access protocols required operate by providing users single control point their environment. INREDIS project has addressed this challenge designing cloud based service-oriented architecture be deployed both...

10.1109/waina.2012.191 article EN 2012-03-01

Recently, Chen-Hsiang-Shih proposed a new dynamic ID-based remote user authentication scheme. The authors claimed that their scheme was more secure than previous works. However, this paper demonstrates theirscheme is still unsecured against different kinds of attacks. In order to enhance the security by Chen-Hsiang-Shih, proposed. achieves following goals: without verification table, each chooses and changes password freely, keeps secret, mutual authentication, establishes session key after...

10.17533/udea.redin.17038 article EN cc-by-nc-sa Revista Facultad de Ingeniería Universidad de Antioquia 2013-10-18
Coming Soon ...