scispace - formally typeset
F

Florina Almenarez

Researcher at Charles III University of Madrid

Publications -  47
Citations -  584

Florina Almenarez is an academic researcher from Charles III University of Madrid. The author has contributed to research in topics: Authentication & Ubiquitous computing. The author has an hindex of 12, co-authored 45 publications receiving 554 citations. Previous affiliations of Florina Almenarez include Carlos III Health Institute.

Papers
More filters
Proceedings ArticleDOI

Developing a model for trust management in pervasive devices

TL;DR: A simple trust management model is proposed to enhance security support forasive devices, allowing them interact in ad hoc networks and peer-to-peer applications in a secure way.
Book ChapterDOI

TrustAC: trust-based access control for pervasive devices

TL;DR: A distributed solution for access control, making use of the autonomy and cooperation capability of the devices, since in open dynamic environments is very difficult to depend on central server.
Journal ArticleDOI

PDP: a lightweight discovery protocol for local-scope interactions in wireless ad hoc networks

TL;DR: A new service discovery protocol specifically designed for ad hoc networks, the pervasive discovery protocol (PDP), which reduces power consumption of the most limited devices by prioritising the replies of the less limited ones, allowing the others to abort their answers.
Journal ArticleDOI

Seamless human-device interaction in the internet of things

TL;DR: The solution posited in this article allows Internet of Things devices to offload Natural Language processing to a system that improves the use of Natural Language and alleviates the need to learn or remember specific words or terms intended for triggering device actions.
Journal ArticleDOI

Trust management for multimedia P2P applications in autonomic networking

TL;DR: This paper proposes an evolutionary model of trust management that captures dynamic entities' behaviour over time and explains protection mechanisms against several attacks, which are based on the cooperative behaviour of the entities, trust relationship properties, and trust rules.