F
Florina Almenarez
Researcher at Charles III University of Madrid
Publications - 47
Citations - 584
Florina Almenarez is an academic researcher from Charles III University of Madrid. The author has contributed to research in topics: Authentication & Ubiquitous computing. The author has an hindex of 12, co-authored 45 publications receiving 554 citations. Previous affiliations of Florina Almenarez include Carlos III Health Institute.
Papers
More filters
Proceedings ArticleDOI
Developing a model for trust management in pervasive devices
TL;DR: A simple trust management model is proposed to enhance security support forasive devices, allowing them interact in ad hoc networks and peer-to-peer applications in a secure way.
Book ChapterDOI
TrustAC: trust-based access control for pervasive devices
TL;DR: A distributed solution for access control, making use of the autonomy and cooperation capability of the devices, since in open dynamic environments is very difficult to depend on central server.
Journal ArticleDOI
PDP: a lightweight discovery protocol for local-scope interactions in wireless ad hoc networks
TL;DR: A new service discovery protocol specifically designed for ad hoc networks, the pervasive discovery protocol (PDP), which reduces power consumption of the most limited devices by prioritising the replies of the less limited ones, allowing the others to abort their answers.
Journal ArticleDOI
Seamless human-device interaction in the internet of things
Eugenio Rubio-Drosdov,Daniel Diaz-Sanchez,Florina Almenarez,Patricia Arias-Cabarcos,Andrés Marín +4 more
TL;DR: The solution posited in this article allows Internet of Things devices to offload Natural Language processing to a system that improves the use of Natural Language and alleviates the need to learn or remember specific words or terms intended for triggering device actions.
Journal ArticleDOI
Trust management for multimedia P2P applications in autonomic networking
TL;DR: This paper proposes an evolutionary model of trust management that captures dynamic entities' behaviour over time and explains protection mechanisms against several attacks, which are based on the cooperative behaviour of the entities, trust relationship properties, and trust rules.