Personal information

Verified email domains

network security

Biography

Miguel Soriano was born in Barcelona in 1967. He received the M.S. degree in Telecommunications Engineering from the Universitat Politècnica de Catalunya (UPC) in 1992 and the Ph.D. degree in 1996. In 1991, he joined the Cryptography and Network Security Group at the Department of Applied Mathematics and Telematics. Now, he works with the Information Security Workgroup within the Telematics Services Research Group at the Department of Telematics Engineering of the UPC.

His research interests include network security, electronic voting and information hiding for copyright protection. He has been member of the program committee of many security conferences, and he is editor of the International Journal of Information Security (Springer-Verlag)
Currently he works as a professor at the Telecommunications Engineering School in Barcelona - ETSETB

Activities

Employment (2)

Universitat Politècnica de Catalunya: Barcelona, Catalunya, ES

2007-11-02 to present | Full professor (Telematics Engineering)
Employment
Source: Self-asserted source
Miguel Soriano

Universitat Politècnica de Catalunya: Barcelona, Catalunya, ES

1997-11-20 to 2007-12-01 | Associate professor (Telematics Engineering)
Employment
Source: Self-asserted source
Miguel Soriano

Education and qualifications (2)

Universitat Politècnica de Catalunya: Barcelona, Catalunya, ES

1992-09-15 to 1996-06-30 | Ph. D. on Telematics Engineering (Telematics Engineering)
Education
Source: Self-asserted source
Miguel Soriano

Universitat Politècnica de Catalunya: Barcelona, Catalunya, ES

1985-09-01 to 1992-07-14 | Telecommunication Engineering (Telecommunication Engineering School )
Education
Source: Self-asserted source
Miguel Soriano

Works (50 of 127)

Items per page:
Page 1 of 3

Comprehensive IoT-Driven Fleet Management System for Industrial Vehicles

IEEE Access
2024 | Journal article
Part of ISSN: 2169-3536
Contributors: Mohammadali Farahpoor; Oscar Esparza; Miguel C. Soriano
Source: Self-asserted source
Miguel Soriano

Transmissió de dades : problemes resolts

2024-06 | Book
Contributors: Mónica Aguilar Igartua; Jorge Forné Muñoz; Jorge Mata Diaz; Francisco José Rico Novella; Alfonso Rojas Espinosa; Miguel Soriano Ibáñez
Source: check_circle
Crossref

Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis

Information Sciences
2019-11 | Journal article
Part of ISSN: 0020-0255
Contributors: David Rebollo Monedero; Ahmad Mohamad Mezher; Xavier Casanova Colomé; Jordi Forné; Miguel Soriano
Source: Self-asserted source
Miguel Soriano via Crossref Metadata Search
grade
Preferred source (of 2)‎

Incremental k-Anonymous Microaggregation in Large-Scale Electronic Surveys With Optimized Scheduling

IEEE Access
2018-10 | Journal article
Part of ISSN: 2169-3536
Source: Self-asserted source
Miguel Soriano
grade
Preferred source (of 3)‎

p-Probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation

Information Sciences
2017 | Journal article
EID:

2-s2.0-85007552064

Contributors: Rebollo-Monedero, D.; Forné, J.; Soriano, M.; Puiggalí Allepuz, J.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

k-Anonymous microaggregation with preservation of statistical dependence

Information Sciences
2016 | Journal article
EID:

2-s2.0-84962135623

Contributors: Rebollo-Monedero, D.; Forné, J.; Soriano, M.; Puiggalí Allepuz, J.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

Providing k-anonymity and revocation in ubiquitous VANETs

Ad Hoc Networks
2016 | Journal article
EID:

2-s2.0-84933556417

Contributors: Caballero-Gil, C.; Molina-Gil, J.; Hernández-Serrano, J.; León, O.; Soriano-Ibañez, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

Attribute-based authorization for structured Peer-to-Peer (P2P) networks

Computer Standards and Interfaces
2015 | Journal article
EID:

2-s2.0-84937622256

Contributors: Touceda, D.S.; Cámara, J.M.S.; Zeadally, S.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

Managing privacy in the internet of things: DocCloud, a use case

Studies in Computational Intelligence
2015 | Book
EID:

2-s2.0-84927145469

Contributors: del Campo, J.V.; Pegueroles, J.; Serrano, J.H.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

Private surveys on VoIP

Computer Communications
2015 | Journal article
EID:

2-s2.0-84941875023

Contributors: Vera-Del-Campo, J.; Guasch, S.; Pegueroles, J.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

DocCloud: A document recommender system on cloud computing with plausible deniability

Information Sciences
2014 | Journal article
EID:

2-s2.0-84889090038

Contributors: Vera-Del-Campo, J.; Pegueroles, J.; Hernández-Serrano, J.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

Reconciling privacy and efficient utility management in smart cities

European Transactions on Telecommunications
2014 | Journal article
EID:

2-s2.0-84900633329

Contributors: Rebollo-Monedero, D.; Bartoli, A.; Hernández-Serrano, J.; Forné, J.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

Securing identity assignment using implicit certificates in P2P overlays

IFIP Advances in Information and Communication Technology
2013 | Book
EID:

2-s2.0-84979018970

Contributors: Caubet, J.; Esparza, O.; Alins, J.; Mata-Díaz, J.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

WiMAX-based robust localization in the presence of misbehaving and/or malicious base stations

Computers and Electrical Engineering
2013 | Journal article
EID:

2-s2.0-84885628192

Contributors: Hernández-Serrano, J.; León, O.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

Cooperative detection of primary user emulation attacks in CRNs

Computer Networks
2012 | Journal article
EID:

2-s2.0-84865750361

Contributors: León, O.; Hernández-Serrano, J.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems

Peer-to-Peer Networking and Applications
2012 | Journal article
EID:

2-s2.0-84857656158

Contributors: Touceda, D.S.; Cámara, J.M.S.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

Design of a P2P content recommendation system using affinity networks

Computer Communications
2012 | Journal article
EID:

2-s2.0-84869079906

Contributors: Vera-Del-Campo, J.; Pegueroles, J.; Hernández-Serrano, J.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

On the relationship between the traceability properties of Reed-Solomon codes

Advances in Mathematics of Communications
2012 | Journal article
EID:

2-s2.0-84870178188

Contributors: Moreira, J.; Fernández, M.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

Optimizing energy-efficiency of PHY-Layer authentication in machine-to-machine networks

2012 IEEE Globecom Workshops, GC Wkshps 2012
2012 | Conference paper
EID:

2-s2.0-84875645025

Contributors: Bartoli, A.; Hernandez-Serrano, J.; Soriano, M.; Dohler, M.; Kountouris, A.; Barthel, D.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers

Data and Knowledge Engineering
2011 | Journal article
EID:

2-s2.0-80051799598

Contributors: Rebollo-Monedero, D.; Forné, J.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking

Wireless Communications and Mobile Computing
2011 | Journal article
EID:

2-s2.0-82055163114

Contributors: Esparza, O.; Muñoz, J.L.; Tomãs-Buliart, J.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

Identifying traitors using the Koetter - Vardy algorithm

IEEE Transactions on Information Theory
2011 | Journal article
EID:

2-s2.0-79251500976

Contributors: Fernandez, M.; Moreira, J.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

Modeling the lion attack in cognitive radio networks

Eurasip Journal on Wireless Communications and Networking
2011 | Journal article
EID:

2-s2.0-78249248944

Contributors: Hernandez-Serrano, J.; León, O.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

Private audio streaming for an automated phone assistance system

Proceedings - 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2011
2011 | Conference paper
EID:

2-s2.0-84855853457

Contributors: Vera-Del-Campo, J.; Gómez-Muro, A.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

Robust detection of primary user emulation attacks in IEEE 802.22 networks

ACM International Conference Proceeding Series
2011 | Conference paper
EID:

2-s2.0-84856342346

Contributors: León, O.; Hernández-Serrano, J.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

Secure lossless aggregation over fading and shadowing channels for smart grid M2M networks

IEEE Transactions on Smart Grid
2011 | Journal article
EID:

2-s2.0-82155185165

Contributors: Bartoli, A.; Hernanádez-Serrano, J.; Soriano, M.; Dohler, M.; Kountouris, A.; Barthel, D.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

Use of turbo codes with low-rate convolutional constituent codes in fingerprinting scenarios

2011 IEEE International Workshop on Information Forensics and Security, WIFS 2011
2011 | Conference paper
EID:

2-s2.0-84856501389

Contributors: Tomàs-Buliart, J.; Gómez-Muro, A.; Fernandez, M.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

A note about the identifier parent property in Reed-Solomon codes

Computers and Security
2010 | Journal article
EID:

2-s2.0-77955718305

Contributors: Fernandez, M.; Cotrina, J.; Soriano, M.; Domingo, N.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

Distributed group security for wireless sensor networks

Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice
2010 | Book
EID:

2-s2.0-84898141561

Contributors: Hernández-Serrano, J.; Vera-del-Campo, J.; Pegueroles, J.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

Genetic algorithms for designing network security protocols

Advances in artificial intelligence for privacy protection and security
2010 | Book chapter
Part of ISBN: 978-981-279-032-3
Source: Self-asserted source
Miguel Soriano

Information and Communications Security

Source: Self-asserted source
Miguel Soriano

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010 | Book
EID:

2-s2.0-78049406346

Contributors: Katsikas, S.; Lopez, J.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

Preface

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010 | Book
EID:

2-s2.0-85036582984

Part of ISSN: 16113349 03029743
Contributors: López, J.; Soriano, M.; Qing, S.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

Preface

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010 | Book
EID:

2-s2.0-85037711344

Part of ISSN: 16113349 03029743
Contributors: Katsikas, S.; Lopez, J.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

Private Location-Based Information Retrieval via k-Anonymous Clustering

Internet of Things
2010 | Journal article
WOSUID:

WOS:000281143600041

Contributors: Rebollo-Monedero, David; Forne, Jordi; Soriano, Miguel; Giusto, D; Iera, A; Morabito, G; Atzori, L
Source: Self-asserted source
Miguel Soriano via ResearcherID

Secure Lossless Aggregation for Smart Grid M2M Networks

2010 Ieee 1st International Conference on Smart Grid Communications (Smartgridcomm)
2010 | Journal article
WOSUID:

WOS:000330185100057

Contributors: Bartoli, A.; Hernandez-Serrano, J.; Soriano, M.; Dohler, M.; Kountouris, A.; Barthel, D.; IEEE
Source: Self-asserted source
Miguel Soriano via ResearcherID

Securing cognitive radio networks

International Journal of Communication Systems
2010 | Journal article
EID:

2-s2.0-77951855384

Contributors: León, O.; Hernández-Serrano, J.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

Traitor tracing over YouTube video service - Proof of concept

Telecommunication Systems
2010 | Journal article
EID:

2-s2.0-77955307807

Contributors: Tomàs-Buliart, J.; Fernández, M.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

Transmisión de datos : problemas resueltos

2010-01 | Book
Contributors: Mónica Aguilar Igartua; Jorge Forné Muñoz; Jorge Mata Diaz; Francisco José Rico Novella; Alfonso Rojas Espinosa; Miguel Soriano Ibáñez
Source: check_circle
Crossref

A new cross-layer attack to TCP in cognitive radio networks

2009 2nd International Workshop on Cross Layer Design, IWCLD '09
2009 | Conference paper
EID:

2-s2.0-77950157431

Contributors: León, O.; Hernández-Serrano, J.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

A note on the equivalence of the traceability properties of reed-solomon codes for certain coalition sizes

Proceedings of the 2009 1st IEEE International Workshop on Information Forensics and Security, WIFS 2009
2009 | Conference paper
EID:

2-s2.0-77949781981

Contributors: Moreira, J.; Fernandez, M.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

Improvement of collusion secure convolutional fingerprinting information codes

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009 | Book
EID:

2-s2.0-70549113051

Contributors: Tomàs-Buliart, J.; Fernandez, M.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

Improvement of Collusion Secure Convolutional Fingerprinting Information Codes

Information Theoretic Security
2009 | Journal article
WOSUID:

WOS:000278041600006

Contributors: Tomas-Buliart, Joan; Fernandez, Marcel; Soriano, Miguel; Desmedt, Y
Source: Self-asserted source
Miguel Soriano via ResearcherID

New voter verification scheme using pre-encrypted ballots

Computer Communications
2009 | Journal article
EID:

2-s2.0-67349267314

Contributors: Morales-Rocha, V.; Soriano, M.; Puiggalí, J.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 2)‎

On the IPP properties of Reed-Solomon codes

IFIP Advances in Information and Communication Technology
2009 | Book
EID:

2-s2.0-77949820743

Contributors: Fernandez, M.; Cotrina, J.; Soriano, M.; Domingo, N.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

Protection of mobile agents execution using a modified self-validating branch-based software watermarking with external sentinel

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009 | Book
EID:

2-s2.0-70349312703

Contributors: Tomàs-Buliart, J.; Fernández, M.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

New considerations about the correct design of turbo fingerprinting codes

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008 | Book
EID:

2-s2.0-57049187167

Contributors: Tomàs-Buliart, J.; Fernández, M.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 3)‎

New multi-channel voting scheme: Towards remote e-voting over the internet

International Journal of Electronic Governance
2008 | Journal article
EID:

2-s2.0-84887688875

Contributors: Morales-Rocha, V.; Soriano, M.; Martínez-Peláez, R.; Rico, F.J.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

Secure remote voter registration

Electronic Voting 2008, EVOTE08 - 3rd International Conference
2008 | Conference paper
EID:

2-s2.0-84870192289

Contributors: Morales-Rocha, V.; Puiggalí, J.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier

Securing agents against malicious host in an intrusion detection system

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008 | Book
EID:

2-s2.0-77953715478

Contributors: Páez, R.; Tomàs-Buliart, J.; Forné, J.; Soriano, M.
Source: Self-asserted source
Miguel Soriano via Scopus - Elsevier
grade
Preferred source (of 3)‎
Items per page:
Page 1 of 3