default search action
Helena Rifà-Pous
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues:
A Signature-Based Wireless Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks. IEEE Access 12: 23096-23121 (2024) - [i4]Helena Rifà-Pous, Victor Garcia-Font, Carlos Núñez-Gómez, Julián Salas:
Security, Trust and Privacy challenges in AI-driven 6G Networks. CoRR abs/2409.10337 (2024) - 2023
- [j23]Juan Ignacio Iturbe Araya, Helena Rifà-Pous:
Anomaly-based cyberattacks detection for smart homes: A systematic literature review. Internet Things 22: 100792 (2023) - [j22]Joan Manuel Marquès Puig, Helena Rifà-Pous, Samia Oukemeni:
From False-Free to Privacy-Oriented Communitarian Microblogging Social Networks. ACM Trans. Multim. Comput. Commun. Appl. 19(2s): 83:1-83:23 (2023) - [c14]Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues:
Multi-channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks and Their Attack Signatures. ICCCSP 2023: 269-285 - 2022
- [j21]Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues:
Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks: A state of the art review. Expert Syst. Appl. 210: 118401 (2022) - [i3]Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues:
Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State of the Art Review. CoRR abs/2203.00579 (2022) - 2021
- [j20]Amna Qureshi, Victor Garcia-Font, Helena Rifà-Pous, David Megías:
Collaborative and efficient privacy-preserving critical incident management system. Expert Syst. Appl. 163: 113727 (2021)
2010 – 2019
- 2019
- [j19]Amna Qureshi, David Megías, Helena Rifà-Pous:
SeVEP: Secure and Verifiable Electronic Polling System. IEEE Access 7: 19266-19290 (2019) - [j18]Samia Oukemeni, Helena Rifà-Pous, Joan Manuel Marquès Puig:
IPAM: Information Privacy Assessment Metric in Microblogging Online Social Networks. IEEE Access 7: 114817-114836 (2019) - [j17]Samia Oukemeni, Helena Rifà-Pous, Joan Manuel Marquès Puig:
Privacy Analysis on Microblogging Online Social Networks: A Survey. ACM Comput. Surv. 52(3): 60:1-60:36 (2019) - 2018
- [j16]Victor Garcia-Font, Carles Garrigues, Helena Rifà-Pous:
Difficulties and Challenges of Anomaly Detection in Smart Cities: A Laboratory Analysis. Sensors 18(10): 3198 (2018) - [c13]Amna Qureshi, David Megías, Helena Rifà-Pous:
VSPReP: Verifiable, Secure and Privacy-Preserving Remote Polling with Untrusted Computing Devices. FNSS 2018: 61-79 - 2017
- [j15]Victor Garcia-Font, Carles Garrigues, Helena Rifà-Pous:
Attack Classification Schema for Smart City WSNs. Sensors 17(4): 771 (2017) - [c12]Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Helena Rifà-Pous:
On Improving Automated Self-assessment with Moodle Quizzes: Experiences from a Cryptography Course. TEA 2017: 176-189 - [i2]Amna Qureshi, David Megías, Helena Rifà-Pous:
PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting. CoRR abs/1703.01820 (2017) - 2016
- [j14]Amna Qureshi, David Megías, Helena Rifà-Pous:
PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting. J. Netw. Comput. Appl. 66: 180-197 (2016) - [j13]Victor Garcia-Font, Carles Garrigues, Helena Rifà-Pous:
A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks. Sensors 16(6): 868 (2016) - [c11]Amna Qureshi, Helena Rifà-Pous, David Megías:
State-of-the-art, challenges and open issues in integrating security and privacy in P2P content distribution systems. ICDIM 2016: 1-9 - [c10]Amna Qureshi, Helena Rifà-Pous, David Megías:
Enabling Collaborative Privacy in User-Generated Emergency Reports. PSD 2016: 255-271 - 2015
- [j12]Amna Qureshi, David Megías, Helena Rifà-Pous:
Framework for preserving security and privacy in peer-to-peer content distribution systems. Expert Syst. Appl. 42(3): 1391-1408 (2015) - [j11]Olga León, Juan Hernández-Serrano, Carles Garrigues, Helena Rifà-Pous:
A Cognitive-Radio-Based Method for Improving Availability in Body Sensor Networks. Int. J. Distributed Sens. Networks 11: 272869:1-272869:13 (2015) - [c9]Victor Garcia-Font, Carles Garrigues, Helena Rifà-Pous:
An architecture for the analysis and detection of anomalies in smart city WSNs. ISC2 2015: 1-6 - 2012
- [j10]Helena Rifà-Pous, Carles Garrigues:
Authenticating hard decision sensing reports in cognitive radio networks. Comput. Networks 56(2): 566-576 (2012) - [j9]Helena Rifà-Pous, Emmanouil A. Panaousis, Christos Politis:
Recipients' Anonymity in Multihop Ad-Hoc Networks. IEICE Trans. Inf. Syst. 95-D(1): 181-184 (2012) - [j8]Daniel Lázaro Iglesias, Joan Manuel Marquès, Guillem Cabrera, Helena Rifà-Pous, Albert Montane:
HorNet: Microblogging for a Contributory Social Network. IEEE Internet Comput. 16(3): 37-45 (2012) - [j7]Helena Rifà-Pous, Mercedes Jimenez Blasco, Carles Garrigues:
Review of Robust Cooperative Spectrum Sensing Techniques for Cognitive Radio Networks. Wirel. Pers. Commun. 67(2): 175-198 (2012) - 2011
- [j6]Helena Rifà-Pous, Josep Rifà, Lorena Ronquillo:
ℤ2ℤ4-additive perfect codes in Steganography. Adv. Math. Commun. 5(3): 425-433 (2011) - [j5]Helena Rifà-Pous, Jordi Herrera-Joancomartí:
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices. Future Internet 3(1): 31-48 (2011) - [j4]Helena Rifà-Pous, Mercedes Jimenez Blasco, Jose Carlos Mut Rojas:
Robust Detection of Incumbents in Cognitive Radio Networks Using Groups. IEICE Trans. Commun. 94-B(9): 2558-2564 (2011) - [j3]Helena Rifà-Pous, Jordi Herrera-Joancomartí:
A Fair and Secure Cluster Formation Process for Ad Hoc Networks. Wirel. Pers. Commun. 56(3): 625-636 (2011) - [c8]Helena Rifà-Pous:
Anonymous reputation based reservations in e-commerce (amnesic). ICEC 2011: 17:1-17:10 - [c7]Helena Rifà-Pous, Josep Rifà:
Spectrum Sharing Models in Cognitive Radio Networks. CyberC 2011: 503-510 - [c6]Helena Rifà-Pous, Carles Garrigues:
A secure and anonymous cooperative sensing protocol for cognitive radio networks. SIN 2011: 127-132 - 2010
- [i1]Helena Rifà, Josep Rifà, Lorena Ronquillo:
Perfect Z2Z4-linear codes in Steganography. CoRR abs/1002.0026 (2010)
2000 – 2009
- 2009
- [j2]Helena Rifà-Pous, Josep Rifà:
Product perfect codes and steganography. Digit. Signal Process. 19(4): 764-769 (2009) - [j1]Helena Rifà-Pous, Jordi Herrera-Joancomartí:
Cryptographic Energy Costs Are Assumable in Ad Hoc Networks. IEICE Trans. Inf. Syst. 92-D(5): 1194-1196 (2009) - [c5]Helena Rifà-Pous:
A Secure Mobile-Based Authentication System for e-Banking. OTM Conferences (2) 2009: 848-860 - 2007
- [c4]Helena Rifà-Pous, Jordi Herrera-Joancomartí:
Secure Dynamic MANET On-demand (SEDYMO) Routing Protocol. CNSR 2007: 372-380 - [c3]Helena Rifà-Pous, Jordi Herrera-Joancomartí:
An Interdomain PKI Model Based on Trust Lists. EuroPKI 2007: 49-64 - [c2]Helena Rifà-Pous, Jordi Herrera-Joancomartí:
A Forwarding Spurring Protocol for Multihop Ad Hoc Networks (FURIES). NEW2AN 2007: 281-293 - 2006
- [c1]Helena Rifà, Francisco Jordan:
A Service Oriented Trust Development Platform. ISSE 2006: 344-355
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-14 23:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint