32
Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address: Engineering School, Edifici-Q, Universitat Autònoma de Barcelona (UAB), Campus UAB, 08193 Bellaterra, Spain. Phone: +34 935814835 Email: Web:

Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

  • Upload
    others

  • View
    12

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

Guillermo Navarro-ArribasCurrículum VítaeNovember 8, 2019

Name: Guillermo Navarro-Arribas

Address: Engineering School, Edifici-Q,Universitat Autònoma de Barcelona (UAB),Campus UAB, 08193 Bellaterra, Spain.

Phone: +34 935814835Email: [email protected]: http://www.deic.uab.cat/~guille/

Page 2: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

Contents

1 Academic Education 3

2 Academic Positions 32.1 Other activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

3 Research Stages 4

4 Scholarships and Grants 4

5 Research Projects 45.1 Technology transfer contracts and activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

6 Publications 96.1 ISI JCR Journals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96.2 LNCS/LNAI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116.3 Proceedings, book chapters, and non SCI JCR journals . . . . . . . . . . . . . . . . . . . . . . . . . 146.4 Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196.5 Reviewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

7 PhD. Theses Advised 20

8 Participation in PhD. Examination Boards 20

9 Colaboration in conferences and journals 219.1 Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219.2 Conference / committee chair . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229.3 Program committee member . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

10 Invited speaker 24

11 Teaching Experience 2511.1 Teaching assessments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2511.2 Teaching positions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2511.3 Subjects taught . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

11.3.1 Undergraduate teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2511.3.2 Graduate and masters teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2611.3.3 Other teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

11.4 Teaching courses as listener . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2711.5 Bachelor’s theses advised . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2811.6 Master’s theses advised . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

12 Teaching related publications 31

13 Other Merits 3213.1 Academic Spanish/Catalan Assessments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3213.2 Scientific associations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

2

Page 3: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

1 Academic Education

2006 PhD by the Universitat Autònoma de Barcelona. Thesis: Contributions to Access Control and AuthorisationManagement in Mobile Agent Systems. Supervised by Dr. Joan Borrell. Grade: A cum laude. Received an“Outstanding PhD Award” in Computer Sciences, and the European doctoral mention, from the UniversitatAutònoma de Barcelona (UAB).

2003 Advanced Studies Diploma (DEA). Thesis: Access Control and Mobile Agents. Universitat Autònoma deBarcelona. Supervised by Dr. Joan Borrell. Grade: Excel.lent.

2001 Computer Engineering Degree. Universitat Autònoma de Barcelona. Final graduate project carried atUniversity of Bedfordshire (former University of Luton) (UK) with an Erasmus grant. Thesis: An studyand implementation of encryption algorithms for a client server architecture suitable for a mobile phoneapplication. Supervised by Des Stephens.

2 Academic Positions

2018-current Associate Professor (agregat / contratado doctor)ORGANIZATION: Universitat Autònoma de Barcelona, in the Department of Information and Communi-cations Engineering.KNOWLEDGE ÀREA: Computer Science and Artificial Intelligence.DATES: from April 3, 2018.

2014-2018 Associate Professor (agregat interí / contratado doctor interino)ORGANIZATION: Universitat Autònoma de Barcelona, in the Department of Information and Communi-cations Engineering.KNOWLEDGE ÀREA: Computer Science and Artificial Intelligence.DATES: from September 15, 2014, to April 2, 2018.

2010-2014 Assistant Professor (lector / ayudante doctor)ORGANIZATION: Universitat Autònoma de Barcelona, in the Department of Information and Communi-cations Engineering.KNOWLEDGE ÀREA: Computer Science and Artificial Intelligence.DATES: from September 15, 2010, to September 14, 2014.

2008-2010 Postdoctoral researcherORGANIZATION: Artificial Intelligence Research Institute (IIIA) from the Scientific Spanish ResearchCouncil (CSIC).DATES: from September 15, 2008, to September 14 2010.

2004-2008 Assistant Professor (ayudante)ORGANIZATION: Universitat Autònoma de Barcelona, in the Department of Information and Communi-cations Engineering.KNOWLEDGE ÀREA: Computer Science and Artificial Intelligence.DATESfrom September 15, 2004 to September 14 2008.

2001-2004 FPI PhD. scholarship holder.ORGANIZATION: group of Digital Communications and Combinatorial of the Computer Science Depart-ment. Universitat Autonoma de Barcelona.DATES: from September 15, 2001, to September 14, 2004.

2.1 Other activities

2010-2017 Adjunct Researcher in the Artificial Intelligence Research Institute (IIIA) from the Scientific SpanishResearch Council (CSIC).

3

Page 4: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

2001 XYNetwork Ltd. (London, UK). Position: junior developer. Development of content management systemsfor Web and WAP portals. Java (J2SE,J2EE) and Oracle.

3 Research Stages

2009 Cork Constraint Computation Centre (4C), Univeristy College Cork (Ireland). Four months stage withDr. Simon N. Foley.

2004 Computer Science Department, University College Cork (Ireland). Three months stage with the securitygroup leaded by Dr. Simon N. Foley.

2003 Swedish Institute of Computer Science (Sweden). Three months stage with the Policy Based ReasoningGroup, leaded by Dr. Babak Sadhigi-Firozabadi.

2002 University of Murcia (Spain). Short stage with Dr. Óscar Cánovas.

4 Scholarships and Grants

2011 “Ramon y Cajal”, I was awarded a Ramon y Cajal scholarship (the most competitive grant in Spain),with the second position in the field of “Computer Science and Computer Technology” with 99 pointsover 100. I declined this grant due to personal and labour reasons.

2009-2010 Postdoctoral grant “Juan de la Cierva” at the Artificial Intelligence Research Institute (IIIA), SpanishResearch Council (CSIC). Founded by Ministry of Science and Innovation, Spanish Government (3 yeargrant). Duration: 1/1/2009 – 14/9/2010.

2009 “José Castillejo” grant (Abroad stages for young doctors program). Awarded a four months stage inthe University College Cork, with Dr. Simon N. Foley. Founded by the Ministry of Education, SpanishGovernment.

2009 Gran for research stages outside Catalonia (BE) for 4 months in the University College Cork, granted bythe Catalan Goverment. I declined this grant in favor of the “José Castillejo” grant.

2005 Grant for conference attendance. Attended to The 1st Secure Mobile Ad-hoc Networks and SensorsWorkshop in Singapore. Founded by the Universitat Autonoma de Barcelona.

2001-2004 PhD scholarship holder (FPI). Computer Science Dept., Universitat Autònoma de Barcelona.

2004 Grant for research stages abroad. Three months stage at the University College Cork (Ireland), with Dr.Simon N. Foley (see Section 3 for more details). Founded by Universitat Autònoma de Barcelona.

2004 Grant for conference attendance. Attended to The 9th Nordic Workshop on Secure IT-systems (NordSec2004)in Helsinki. Founded by the Universitat Autonoma de Barcelona.

2003 Grant for research stages abroad. Three months stage at the Swedish Institute of Computer Science(Sweden), with Dr. Babak Sadighi-Firozabadi (see Section 3 for more details). Founded by UniversitatAutònoma de Barcelona.

2000 Socrates/Erasmus Grant. Six months stage at the University of Luton (now University of Bedfordshire)(UK). Founded by European Union.

5 Research Projects

1. 2018-2020 Plataforma Segura Crowd2Crowd para Aplicaciones de Tranporte Inteligente Oportunistas yDescentralizadas.FUNDING ENTITY: Ministerio de Economía y Competitividad (MINECO)PRINCIPAL INVESTIGATOR: Sergi Robles.REFERENCE: ref. TIN2017-87211-RDATES: 01/01/2018 – 31/12/2020FUNDING: 73,810.00 EUR

4

Page 5: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

PARTICIPANTS: Univ. Autónoma de Barcelona.DEDICATION: full time.

2. 2017-2020 Codificació, Compressió i Seguretat (CCS) / Coding, Compression and Security (CCS) Consoli-dated Research Group recognized by the Generalitat de Catalunya. FUNDING ENTITY: Generalitat deCatalunyaREFERENCE: 2017 SGR 00463PRINCIPAL INVESTIGATOR: Joan Serra-SagristàDATES: 01/01/2017 – 31/12/2020

3. 2015-2017 Seguridad para Mobile Crowd Sensing con Protocolos Oportunistas (Security for MobileCrowd Sensing with Opportunistic Protocols, MCSEC)FUNDING ENTITY: Ministerio de Economía y Competitividad (MINECO) (Programa Estatal de Fomento dela Investigación Científica y Técnica de Excelencia, Subprograma Estatal de Generación de Conocimiento,convocatoria 2014, modalidad 1: Proyectos de I+D).REFERENCE: ref. TIN2014-55243-PDATES: 01/01/2015 – 30/06/2018.FUNDING: 72,358.00 EUR, and one FPI grant (3 to 4 years doctoral grant).PARTICIPANTS: Univ. Autónoma de Barcelona.PRINCIPAL INVESTIGATOR 1: Guillermo Navarro-Arribas.PRINCIPAL INVESTIGATOR 2: Sergi Robles.DEDICATION: full time.

4. 2014-2016 MobileKey. Desarrollo de un mecanismo de aprovisionamiento de certificados digitales paraentornos móvilesFUNDING ENTITY: Ministerio de Economía y Competitividad (MINECO), RETOS-COLABORACION 2014.REFERENCE: ref. RTC-2014-2552-7DATES: 01/02/2014 – 31/07/2016.FUNDING: 2.026.765,20 EUR (463.717, 00 as grant, 859.671,00 as loan).Rovira i Virgili, Univ. Autónoma de Barcelona, Scytl Secure Electronic Voting.PRINCIPAL INVESTIGATOR: Scytl Electronic Voting S.A..PRINCIPAL INVESTIGATOR AT THE UAB: Guillermo Navarro-Arribas.DEDICATION: full time.

5. 2014-2016 Crowd eAssessment: Sistema de crowdsourcing para observación electoral basado en conec-tividad oportunista que garantice el anonimato de los participantes y la veracidad de las observaciones.FUNDING ENTITY: Ministerio de Economía y Competitividad (MINECO), RETOS-COLABORACION 2014.REFERENCE: ref. RTC-2014-2546-7DATES: 01/02/2014 – 31/07/2016.FUNDING: 1.398.346,42 EUR (343.246, 00 as grant, 580.300,00 as loan).PARTICIPANTS: Univ. Autónoma de Barcelona, Scytl Secure Electronic Voting.PRINCIPAL INVESTIGATOR: Scytl Electronic Voting S.A..PRINCIPAL INVESTIGATOR AT DEIC-UAB: Guillermo Navarro-Arribas.DEDICATION: full time.

6. 2012-2014 Ubiquitous Secure Electronic Voting (u-SEV): Sistema de voto electrónico seguro para en-tornos sin infraestructuras de telecomunicaciones fiables.FUNDING ENTITY: Ministerio de Economía y Competitividad, INNPACTO 2012.REFERENCE: ref. IPT-2012-0598-430000DATES: 20/5/2012 – 31/12/2014.FUNDING: 212,967.00 EUR.PARTICIPANTS: Univ. Autónoma de Barcelona, Scytl Secure Electronic Voting.PRINCIPAL INVESTIGATOR: Scytl Electronic Voting S.A..PRINCIPAL INVESTIGATOR AT THE UAB: Joan Borrell.DEDICATION: full time.

5

Page 6: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

7. 2012-2015 CO-PRIVACY. Sustainable Privacy for a Sustainable Information Society. Subproject DBPRI-VACY.FUNDING ENTITY: Ministerio de Ciencia e InnovacionREFERENCE: TIN2011-27076-C03-03DATES: 01/01/2012 AL 31/12/2014PRINCIPAL INVESTIGATOR DEL SUBPROYECTO: Vincenç Torra (CSIC)COORDINADOR: Josep Domingo-Ferrer (URV).FUNDING: 40000.00 EURPARTICIPANTS: IIIA-CSIC, Univ. Rovira i Virgili, Univ. Oberta de Catalunya.NÚMERO DE INVESTIGADORES PARTICIPANTES 4.DEDICATION: shared.

8. 2011-2015 Data without Boundaries (DwB).FUNDING ENTITY: European Union (IST) FP7.REFERENCE: FP7 Call 6: FP7-INFRA-2010-1, Theme INFRA-2010-1.1.3DATES: 01/05/2011 – 30/04/2015PRINCIPAL INVESTIGATOR: Roxanne Silberman (CNRS-Réseau Quetelet).PRINCIPAL INVESTIGATOR EN IIIA-CSIC: Vicenç Torra.FUNDING: 84,572.00 EURDEDICATION: full time.

9. 2011-2013 SGE2, desarrollo de un sistema de gestión de procesos electorales de manera electrónica.REFERENCE: IPT-2011-0874-430000FUNDING ENTITY: Ministerio de Ciencia e Innovación (INNPACTO).DATES: 20-5-2011 a 31-12-2013.PRINCIPAL INVESTIGATOR: Scytl Electronic Voting S.A.PRINCIPAL INVESTIGATOR AT THE UAB: Joan Borrell.FUNDING: 233322.00 EUR.PARTICIPANTS: Scytl, UAB.DEDICATION: full time.

10. 2011-2013 TrustedCloud, entorno para verificar la integridad de los sistemas de ejecución en un entornode Cloud Computing. REFERENCE: IPT-2011-1166-430000.FUNDING ENTITY: Ministerio de Ciencia e Innovación (INNPACTO).DATES: 20-5-2011 a 31-12-2013.PRINCIPAL INVESTIGATOR: Scytl Secure Electronic Voting S.A.PRINCIPAL INVESTIGATOR AT THE UAB: Joan Borrell.FUNDING: 277575.00 EUR.PARTICIPANTS: Scytl, UAB.DEDICATION: full time

11. 2010-2013 Security in mobile environments with intermittent connectivity for their medical and aerospaceapplications, N-KHRONOUS.FUNDING ENTITY: Ministerio de Ciencia e Innovación.REFERENCE: TIN2010-15764DATES: 01/01/2011 – 31/12/2013PRINCIPAL INVESTIGATOR: Joan Borrell (UAB).FUNDING: 110352 EUR.DEDICATION: shared.

12. 2009-2013 Grupo de Investigación Consolidado de Cataluña.FUNDING ENTITY: Generalitat de Catalunya.REFERENCE: 2009 SGR 1224PRINCIPAL INVESTIGATOR: Josep Rifà i Coma (UAB).DATES: 01/10/2009 – 1/10/2013.

6

Page 7: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

DEDICATION: full time.NOTE: my membership started the 1/1/2013.

13. 2009-2013 Grupo de Investigación Consolidado de Cataluña.FUNDING ENTITY: Generalitat de Catalunya.REFERENCE: 2009 SGR 7PRINCIPAL INVESTIGATOR: Vicenç Torra (IIIA-CSIC).DATES: 01/10/2009 – 1/10/2013.DEDICATION: full time.NOTE: I had to quit this project in 1/1/2013, to join the project 2009 SGR 1224.

14. 2008-2013 ARES: Team for Advanced Research on Information Security and Privacy. ARES - CON-SOLIDER INGENIO 2010.FUNDING ENTITY: Ministerio de Educación y Ciencia. CONSOLIDER INGENIO 2010.REFERENCE: ref. CSD2007-00004 (CONSOLIDER INGENIO 2010).DATES: 01/10/2007 – 09/09/2014PRINCIPAL INVESTIGATOR: Josep Domingo-Ferrer (URV)PRINCIPAL INVESTIGATOR SUBPROYECTO: Vicenç Torra (IIIA-CSIC)FUNDING: 5,458, 000.00 EURPARTICIPANTS: 6 (Univ. Rovira i Virgili, Univ. de Málaga, Univ. de les Illes Balears, Univ. Politécnica deCatalunya, IIIA-CSIC, Univ. Oberta de Catalunya)DEDICATION: full time.NOTE: my membership in this project started the 19/12/2008.

15. 2007-2012 e-AEGIS: Electronic AEGIS for conciliating consumer privacy and transaction security in theInformation Society. Subproject DB-PRIVACY.FUNDING ENTITY: Ministerio de Educación y Ciencia.REFERENCE: TSI2007-65406-C03-02DATES: 01/10/2007–03/08/2012PRINCIPAL INVESTIGATOR: Josep Domingo-Ferrer (URV).PRINCIPAL INVESTIGATOR SUBPROYECTO: Vicenç Torra (IIIA-CSIC).FUNDING: 51000.00 EURPARTICIPANTS: Univ. Rovira i Virgili, IIIA-CSIC, Univ. Oberta de Catalunya.DEDICATION: shared.NOTA: my membership in this project started the 15/09/2008.

16. 2006-2009 Design and Implementation of a global solution supporting critical services (Diseño e imple-mentación de una solución global para el soporte de servicios críticos en situaciones de emergencia)FUNDING ENTITY: Ministerio de Educación y Ciencia.REFERENCE: TSI2006-03481.DATES: 1/12/2006 – 30/11/2009PRINCIPAL INVESTIGATOR: Sergi Robles Martínez (UAB)FUNDING: 139755.00 EURDEDICATION: full time / shared.NOTA: The 15/09/2008 I changed my dedication from full time to shared due to my membership inproject e-AEGIS.

17. 2006-2007 Red Temática Nacional de Tecnología de Agentes y Sistemas Multi-Agente, 2006 (NationalTematic Network on Agents and Multi-Agent Technology) FUNDING ENTITY: Ministerio de Ciencia y Tec-nología.DATES: 1/6/2006 – 31/12/2007.PRINCIPAL INVESTIGATOR: Antonio Moreno Ribas (URV).FUNDING: 12,000.00 EUR.DEDICATION: full time.

7

Page 8: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

18. 2005-2009 Grupo de Investigación Consolidado de Cataluña.FUNDING ENTITY: Generalitat de Catalunya (DURSI).REFERENCE: SGR2005-00319.DATES: 01-10-2005 – 30-10-2009.PRINCIPAL INVESTIGATOR: Josep Rifà (UAB).DEDICATION: full time.

19. 2005–2006 Creation of an innovative environment for the communication of intelligent agents (agentci-ties.es).FUNDING ENTITY: Gobierno de España.REFERENCE: TIN2004-20447-E.DATES: 1-6-2005 – 31-5-2006.PRINCIPAL INVESTIGATOR: Antonio Moreno Ribas (URV).FUNDING: 12,000.00 EUR.DEDICATION: full time.

20. 2005-2006 Equipamiento de infraestructura para un cluster.REFERENCE: 2005PEIR0050/26.FUNDING ENTITY: Generalitat de Catalunya, AGAUR.DATES: 15-12-2005 – 15-12-2006.PRINCIPAL INVESTIGATOR: Josep Rifà (UAB).FUNDING: 29989.77 EUR.DEDICATION: full time.

21. 2004-2005 Agentlink III: A Co-ordination Network for Agent-Based Computing, 2004.FUNDING ENTITY: European Commission (FP6).REFERENCE: IST-1-002006-CA (FP6).DATES: 01/01/2004 – 31/12/2005.PRINCIPAL INVESTIGATOR: Terry R. Payne (Univ. of Southampton).DEDICATION: full time.

22. 2003–2006 Development of Secure and Decisive Applications in a Lightweight Mobile Agent Platform(Desarrollo de aplicaciones decisivas y seguras sobre una plataforma de desarrollo de aplicaciones decisi-vas y seguras sobre una plataforma ligera de agentes moviles)FUNDING ENTITY: Ministerio de Ciencia y Tecnología.REFERENCE: TIC2003-02041.DATES: 1-12-2003 – 30-11-2006.PRINCIPAL INVESTIGATOR: Sergi Robles (UAB)FUNDING: 110400.00 EUR.DEDICATION: full time.

23. 2003–2005 Creation of an innovative environment for the communication of intelligent agents (agentci-ties.es)FUNDING ENTITY: Ministerio de Ciencia y Teconología.REFERENCE: TIC2001-5108-E.DATES: 24-3-2003 – 23-3-2005.PRINCIPAL INVESTIGATOR: Antonio Moreno Ribas (URV).FUNDING: 40000 EURDEDICATION: full time.

24. 2003] Wirelessnetwork and masive storage devicesFUNDING ENTITY: Generalitat de Catalunya DURSI.REFERENCE: PIR-210-2002.DATES: 1-1-2003 – 31-12-2003.PRINCIPAL INVESTIGATOR: Josep Rifà (UAB).

8

Page 9: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

FUNDING: 24875.00 EUR.DEDICATION: full time.

25. 2002–2005 iTrust: Working Group on Trust Management in Dynamic Open System.FUNDING ENTITY: European Commission.REFERENCE: IST-2001-34910.DATES: 1-8-2002 to 31-7-2005.PRINCIPAL INVESTIGATOR: Christos Nikolau (Univ of Crete).PRINCIPAL INVESTIGATOR AT THE UAB: Joan Borrell.FUNDING: 20000.00 EUR.DEDICATION: full time.

26. 2002–2004 Grupo de Investigación Consolidado: Combinatorics and Digital Communications group.FUNDING ENTITY: Generalitat de Catalunya.REFERENCE: 2001SGR-219.DATES: 1-1-2002 TO 31-12-2004.PRINCIPAL INVESTIGATOR: Josep Rifà (UAB).DEDICATION: full time.

27. 2001–2003 Development of two secure e-commerce applications: B2G voting, and B2B auctions.FUNDING ENTITY: Govierno de España.REFERENCE: TIC2000-0232-P4-02.DATES: 1-10-2001 to 30-9-2003.PRINCIPAL INVESTIGATOR: Joan Borrell (UAB).FUNDING: 98008.22 EUR.DEDICATION: full time.

5.1 Technology transfer contracts and activities

2009 “Convenio de colaboración para la protección de microdatos” (Co-operation agreement for microdataprotection), Technology transfer contract wit Idescat. Financing entity: Official Statistics of Catalonia(Idescat), financing: 6000 EUR.. Project Chairman: Dr. Vicenç Torra. Participant researchers: 2. Duration6 months (ended december 2009).

6 Publications

This section is divided mainly between publications indexed by Thomson’s JCR SCI and the rest of publications.Publications related to teaching innovation and experience are listed in Section 12.

6.1 Articles in ISI JCR Journals

1. D. Chen, G. Navarro-Arribas, C. Perez-Sola, and J. Borrell, “Message anonymity on predictable op-portunistic networks,” Journal of Ambient Intelligence and Humanized Computing, 2019, JCR2018SCI:1.910 (Q3), ISSN: 1868-5137. DOI: 10.1007/s12652-019-01393-0. [Online]. Available: https://link.springer.com/article/10.1007/s12652-019-01393-0

2. C. Perez-Sola, S. Delgado-Segura, G. Navarro-Arribas, and J. Herrera-Joancomarti, “Another coin bitesthe dust: An analysis of dust in utxo-based cryptocurrencies,” Royal Society Open Science, vol. 6, no. 1, Jan.2019, JCR2018SCI: 2.515 (Q2), ISSN: 2054-5703. DOI: 10.1098/rsos.180817. [Online]. Available:https://royalsocietypublishing.org/doi/10.1098/rsos.180817

3. C. Perez-Sola, S. Delgado-Segura, G. Navarro-Arribas, and J. Herrera-Joancomarti, “Double-spendingprevention for bitcoin zero-confirmation transactions,” International Journal of Information Security,2018, JCR2018SCI: 1.822 (Q2), ISSN: 1615-5262. DOI: 10.1007/s10207-018-0422-4

9

Page 10: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

4. V. Torra, A. Jonsson, G. Navarro-Arribas, and J. Salas, “Synthetic generation of spatial graphs,” Interna-tional Journal of Intelligent Systems, 2018, JCR2018SCI: 7.229 (Q1). DOI: 10.1002/int.22034

5. S. Delgado-Segura, C. Pérez-Solà, J. Herrera-Joancomartí, G. Navarro-Arribas, and J. Borrell, “Cryp-tocurrency networks: A new p2p paradigm,” Mobile Information Systems, vol. 2018, 16 pages, 2018,JCR2018SCI: 1.635 (Q3). DOI: 10.1155/2018/2159082. [Online]. Available: https://www.hindawi.com/journals/misy/2018/2159082/

6. S. Delgado-Segura, C. Pérez-Solà, J. Herrera-Joancomartí, and G. Navarro-Arribas, “Bitcoin private keylocked transactions,” Information Processing Letters, vol. 140, pp. 37–41, 2018, JCR2018SCI: 0.914(Q4), ISSN: 0020-0190. DOI: 10.1016/j.ipl.2018.08.004. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0020019018301698

7. S. Delgado-Segura, C. Pérez-Solà, G. Navarro-Arribas, and J. Herrera-Juancomartí, “A fair protocolfor data trading based on bitcoin transactions,” Future Generation Computer Systems, 2017, (In Press),JCR2017SCI: 4.639 (Q1), ISSN: 0167-739X. DOI: 10.1016/j.future.2017.08.021. [Online].Available: http://www.sciencedirect.com/science/article/pii/S0167739X17318344

8. D. Abril, V. Torra, and G. Navarro-Arribas, “Supervised learning using a symmetric bilinear form for recordlinkage,” Information Fusion, vol. 26, pp. 144–153, 2015, JCR2015SCI: 4.353 (Q1), ISSN: 1566-2535.DOI: 10.1016/j.inffus.2014.11.004. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1566253514001286

9. D. Abril, G. Navarro-Arribas, and V. Torra, “Spherical microaggregation: Anonymizing sparse vectorspaces,” Computers & Security, vol. 49, no. 0, pp. 28–44, 2015, JCR2015SCI: 1.640 (Q2), ISSN: 0167-4048.DOI: 10.1016/j.cose.2014.11.005. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0167404814001679

10. V. Torra and G. Navarro-Arribas, “Data privacy,” Wiley Interdisciplinary Reviews: Data Mining and Knowl-edge Discovery, vol. 4, no. 4, pp. 269–280, 2014, JCR2014SCI: 1.594 (Q1), JCR2016SCI: 2.111 (Q2),ISSN: 1942-4787. DOI: 10.1002/widm.1129. [Online]. Available: http://onlinelibrary.wiley.com/doi/10.1002/widm.1129/abstract

11. S. N. Foley and G. Navarro-Arribas, “A bloom filter based model for decentralized authorization,”en, International Journal of Intelligent Systems, vol. 28, no. 6, pp. 565–582, 2013, ISSN: 0884-8173,JCR2013SCI: 1.411 (Q2), ISSN: 1098-111X. DOI: 10.1002/int.21593. [Online]. Available: http://onlinelibrary.wiley.com/doi/10.1002/int.21593/abstract (visited on 07/18/2013)

12. G. Navarro-Arribas and V. Torra, “Information fusion in data privacy: A survey,” Information Fusion,vol. 13, no. 4, 235–244, 2012, ISSN 1566-2535, JCR2012SCI: 2.262 (Q1). Choosen as the number6th article in the Top 25 Hottest Articles of the Information Fusion Journal in 2012., ISSN: 1566-2535.DOI: 10.1016/j.inffus.2012.01.001. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1566253512000024

13. D. Abril, G. Navarro-Arribas, and V. Torra, “Improving record linkage with supervised learning fordisclosure risk assessment,” Information Fusion, vol. 13, no. 4, pp. 274–284, 2012, ISSN 1566-2535,JCR2009SCI: 2.212 (Q1), JCR2010SCI: 1.621 (Q1), ISSN: 1566-2535. DOI: 10.1016/j.inffus.2011.05.001

14. G. Navarro-Arribas, V. Torra, A. Erola, and J. Castellà-Roca, “User k-anonymity for privacy preserv-ing data mining of query logs,” Information Processing and Management, vol. 48, no. 3, pp. 476–487, 2012, ISSN 0306-4573, JCR2012SCI: 0.817 (Q3), ISSN: 0306-4573. DOI: 10.1016/j.ipm.2011.01.004. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0306457311000057

15. D. Abril, G. Navarro-Arribas, and V. Torra, “Choquet integral for record linkage,” Annals of OperationsResearch, vol. 195, no. 1, pp. 97–110, 2012, ISSN: 0254-5330, JCR2012SCI: 1.029 (Q2), ISSN: 0254-5330. DOI: 10.1007/s10479-011-0989-x. [Online]. Available: http://dx.doi.org/10.1007/s10479-011-0989-x

16. C. Martínez-García, G. Navarro-Arribas, S. Foley, V. Torra, and J. Borrell, “Flexible security inter-domaininteroperability through attribute conversion,” Information Sciences, vol. 181, no. 16, pp. 3491–3507,Aug. 2011, ISSN 0020-0255, JCR2009SCI: 3.291 (Q1), JCR2010SCI: 2.836 (Q1), ISSN: 0020-0255.

10

Page 11: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

DOI: 10.1016/j.ins.2011.04.023. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0020025511001976

17. A. Erola, J. Castellà-Roca, G. Navarro-Arribas, and V. Torra, “Semantic microaggregation for the anonymiza-tion of query logs using the open directory project,” SORT - Statistics and Operations Research Transactions,pp. 41–58, 2011, ISSN 1696-2281, eISSN 2013-8830, JCR2009SCI: 0.368 (Q4), JCR2010SCI: 0.250(Q4), ISSN: 1696-2281

18. C. Martínez-García, G. Navarro-Arribas, and J. Borrell, “Fuzzy role-based access control,” InformationProcessing Letters, vol. 111, no. 10, pp. 483–487, Apr. 2011, ISSN 0020-0190, JCR2009SCI: 0.764 (Q3),JCR2010SCI: 0.612 (Q4), ISSN: 0020-0190. DOI: doi:10.1016/j.ipl.2011.02.010

19. V. Torra, G. Navarro-Arribas, and D. Abril, “Supervised learning for database integration through weightedmeans and OWA operators,” Control and Cybernetics, vol. 39, no. 4, pp. 1011–1026, 2010, ISSN 0324-8569, JCR2009SCI: 0.378 (Q4), JCR2010SCI: 0.300 (Q4), ISSN: 0324-8569

20. J. Cucurull, R. Martí, G. Navarro-Arribas, S. Robles, J. Borrell, and G. Suades, “Fragment transfer protocol:An IEEE-FIPA based efficient transfer protocol for mobile agents,” Computer Communications, vol. 33,no. 18, pp. 2203–2214, Dec. 2010, ISSN 0140-3664, JCR2009SCI: 0.933 (Q2), JCR2010SCI: 0.816 (Q2),ISSN: 0140-3664. DOI: 10.1016/j.comcom.2010.08.005

21. G. Navarro-Arribas and V. Torra, “Privacy-preserving data-mining through micro-aggregation for web-based e-commerce,” Internet Research, vol. 20, no. 3, pp. 366–384, 2010, ISSN 1066-2243, JCR2009SCI:0.844 (Q3), JCR2010SCI: 1.150 (Q2), ISSN: 1066-2243. DOI: 10.1108/10662241011050759

22. C. Garrigues, S. Robles, J. Borrell, and G. Navarro-Arribas, “Promoting the development of secure mobileagent applications,” Journal of Systems and Software, vol. 83, no. 6, pp. 959–971, Jun. 2010, ISSN0164-1212, JCR2009SCI: 1.340 (Q2), JCR2010SCI: 1.293 (Q2), ISSN: 0164-1212. DOI: 10.1016/j.jss.2009.11.001

23. J. Cucurull, G. Navarro-Arribas, R. Martí, S. Robles, and J. Borrell, “An efficient and secure agent codedistribution service,” Software: Practice and Experience, vol. 40, no. 4, pp. 363–386, 2010, ISSN 0038-0644,JCR2009SCI: 0.667 (Q3), JCR2010SCI: 0.573 (Q4), ISSN: 0038-0644. DOI: 10.1002/spe.963

24. J. Cucurull, R. Martí, G. Navarro-Arribas, S. Robles, and J. Borrell, “Full mobile agent interoperability inan ieee-fipa context,” Journal of Systems and Software, vol. 82, no. 12, pp. 1927–1940, Dec. 2009, ISSN:0164-1212, JCR2009SCI: 1.340 (Q2), JCR2010SCI: 1.293 (Q2), ISSN: 0164-1212. DOI: 10.1016/j.jss.2009.06.038

25. J. Cucurull, R. Martí, G. Navarro-Arribas, S. Robles, B. Overeinder, and J. Borrell, “Agent mobilityarchitecture based on IEEE-FIPA standards,” Computer Communications, vol. 32, no. 4, pp. 712–729, Mar.2009, JCR2009SCI: 0.933 (Q2), ISSN: 0140-3664. DOI: 10.1016/j.comcom.2008.11.038

26. P. Vieira-Marques, S. Robles, J. Cucurull, R. Cruz-Correia, G. Navarro-Arribas, and R. Martí, “Secureintegration of distributed medical data using mobile agents,” IEEE Intelligent Systems, vol. 21, no. 6,pp. 47–54, 2006, JCR2006SCI: 2.413 (Q1); JCR2009SCI: 3.144 (Q1), ISSN: 1541-1672, ISSN: 1541-1672.DOI: 10.1109/MIS.2006.120

6.2 Articles Lecture Notes in Computer Science

The Lecture Notes in Computer Science, LNCS (including their sub-series Lecture Notes in Artificial Intelligence,LNAI). Have been included in the Journal Citation Report from ISI intermittently (years: 1992, 1993, 1994,1999, 2001, 2002, 2004, and 2005). Although, in computer science, they are normally comparable to ISI JCRjournals, they are presented separately.

1. S. Delgado-Segura, C. Perez-Sola, J. Herrera-Joancomarti, and G. Navarro-Arribas, “Analysis of thebitcoin UTXO set,” in Financial Cryptography and Data Security. FC 2018 (The 5th Workshop on Bitcoinand Blockchain Research, Financial Crypto 2018), ser. Lecture Notes in Computer Science, vol. 10958,Springer, 2019, ISBN: 978-3-662-58819-2. DOI: 10.1007/978-3-662-58820-8_6

11

Page 12: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

2. V. Torra and G. Navarro-Arribas, “Probabilistic metric spaces for privacy by design machine learningalgorithms: Modeling database changes,” in Data Privacy Management, Cryptocurrencies and BlockchainTechnology. DPM 2018, CBT 2018, ser. Lecture Notes in Computer Science, vol. 11025, Springer, 2018,ISBN: 978-3-030-00304-3. DOI: 10.1007/978-3-030-00305-0_30. [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-030-00305-0_30

3. V. Torra, G. Navarro-Arribas, D. Sanchez-Charles, and V. Muntés-Mulero, “Provenance and privacy,”in Modeling Decisions for Artificial Intelligence: 14th International Conference, MDAI 2017, Kitakyushu,Japan, October 18-20, 2017, Proceedings, V. Torra, Y. Narukawa, A. Honda, and S. Inoue, Eds., SpringerInternational Publishing, 2017, pp. 3–11, ISBN: 978-3-319-67422-3. DOI: 10.1007/978-3-319-67422-3_1. [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-319-67422-3_1

4. V. Torra and G. Navarro-Arribas, “Integral privacy,” in Cryptology and Network Security, CANS 2016,S. Foresti and G. Persiano, Eds., ser. Lecture Notes in Computer Science, vol. 20052, Springer, 2016,pp. 661–669, ISBN: 978-3-319-48964-3. DOI: 10.1007/978-3-319-48965-0_44. [Online]. Available:https://link.springer.com/chapter/10.1007/978-3-319-48965-0_44

5. A. Antunez-Veas and G. Navarro-Arribas, “Onion routing in deterministic delay tolerant networks,” inFoundations and Practice of Security, J. Garcia-Alfaro, E. Kranakis, and G. Bonfante, Eds., ser. LectureNotes in Computer Science, Springer International Publishing, 2016, pp. 303–310, ISBN: 978-3-319-30302-4 978-3-319-30303-1. DOI: 10.1007/978-3-319-30303-1_21. [Online]. Available: http://link.springer.com/chapter/10.1007/978-3-319-30303-1_21

6. G. Navarro-Arribas and V. Torra, “Rank swapping for stream data,” in Modeling Decisions for ArtificialIntelligence, V. Torra, Y. Narukawa, and Y. Endo, Eds., ser. Lecture Notes in Artificial Intelligence, vol. 8825,Springer International Publishing, 2014, pp. 217–226, ISBN: 978-3-319-12053-9. DOI: 10.1007/978-3-319-12054-6_19. [Online]. Available: http://link.springer.com/chapter/10.1007/978-3-319-12054-6_19

7. J. Jiménez, G. Navarro-Arribas, and V. Torra, “Jpeg-based microdata protection,” in Privacy in Statis-tical Databases, J. Domingo-Ferrer, Ed., ser. Lecture Notes in Computer Science, vol. 8744, SpringerInternational Publishing, 2014, pp. 117–129, ISBN: 978-3-319-11256-5. DOI: 10.1007/978-3-319-11257-2_10. [Online]. Available: http://link.springer.com/chapter/10.1007/978-3-319-11257-2_10

8. G. Navarro-Arribas, D. Abril, and V. Torra, “Dynamic anonymous index for confidential data,” in DataPrivacy Management, ser. Lecture Notes in Computer Science, CORE(2013) B, vol. 8247, 2013, pp. 362–368, ISBN: 978-3-642-54567-2. DOI: 10.1007/978-3-642-54568-9_23. [Online]. Available:http://link.springer.com/chapter/10.1007/978-3-642-54568-9_23

9. C. Martínez-García, G. Navarro-Arribas, and J. Borrell, “Intra-role progression in rbac: An rpg-like accesscontrol scheme,” in Data Privacy Management and Autonomous Spontaneus Security, ser. Lecture Notes inComputer Science, vol. 7122, Springer Berlin / Heidelberg, 2012, pp. 221–234, ISBN: 978-3-642-28878-4.DOI: 10.1007/978-3-642-28879-1_15. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-28879-1_15

10. D. Abril, G. Navarro-Arribas, and V. Torra, “On the declassification of confidential documents,” in ModelingDecisions for Artificial Intelligence, MDAI 2011, ser. Lecture Notes in Artificial Intelligence, ISSN 0302-9743, CORE(2008) B, CORE(2013) B, vol. 6820, Springer Berlin / Heidelberg, 2011, pp. 235–246,ISBN: 978-3-642-22588-8. DOI: 10.1007/978-3-642-22589-5_22. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-22589-5_22

11. A. Erola, J. Castellà-Roca, G. Navarro-Arribas, and V. Torra, “Semantic microaggregation for the anonymiza-tion of query logs,” in Privacy in Statistical Databases, ser. Lecture Notes in Computer Science, ISSN0302-9743, CORE(2008) C, CORE(2013) B, vol. 6344, Springer Berlin / Heidelberg, 2011, pp. 127–137.DOI: 10.1007/978-3-642-15838-4_12. [Online]. Available: https://link.springer.com/chapter/10.1007%2F978-3-642-15838-4_12

12. D. Abril, G. Navarro-Arribas, and V. Torra, “Towards semantic microaggregation of categorical data forconfidential documents,” in Modeling Decisions for Artificial Intelligence, MDAI 2010, ser. Lecture Notesin Artificial Intelligence, ISSN 0302-9743, CORE(2008) B, CORE(2013) B, vol. 6408, 2010, pp. 266–

12

Page 13: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

276, ISBN: 978-3-642-16291-6. DOI: 10.1007/978-3-642-16292-3_26. [Online]. Available:https://link.springer.com/chapter/10.1007/978-3-642-16292-3_26

13. J. Garcia-Alfaro and G. Navarro-Arribas, “Prevention of cross-site scripting attacks on current webapplications,” in On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS,ser. Lecture Notes in Computer Science, ISSN 0302-9743, CiteSeer VIP(2007) 0.01 (472/581), vol. 4804,Springer Berlin / Heidelberg, 2007, pp. 1770–1784, ISBN: 978-3-540-76835-7. DOI: 10.1007/978-3-540-76843-2

14. J. Garcia-Alfaro and G. Navarro-Arribas, “A survey on detection techniques to prevent cross-site scriptingattacks on current web applications,” in Critical Information Infrastructures Security, ser. Lecture Notes inComputer Science, (acceptance rate: 38%), ISSN 0302-9743, CORE(2008) C, CORE(2013) C, vol. 5141,Malaga, Spain (3-5 October, 2007), 2007, pp. 287–298, ISBN: 978-3-540-89095-9. DOI: 10.1007/978-3-540-89173-4_24

15. J. Cucurull, R. Marti, S. Robles, J. Borrell, and G. Navarro-Arribas, “Fipa-based interoperable agentmobility,” in Multi-Agent Systems and Applications V (CEEMAS 2007), ser. Lecture Notes in ArtificialIntelligence, (acceptance rate: 34 %), ISSN 0302-9743, CiteSeer VIP(2007) 0.01 (462/581), vol. 4696,Leipzig, Germany (September 25-27, 2007): Springer Berlin / Heidelberg, Sep. 2007, pp. 319–321,ISBN: 978-3-540-75253-0. DOI: 10.1007/978-3-540-75254-7_37. [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-540-75254-7_37

16. J. García-Alfaro, S. Castillo, J. Castella-Roca, G. Navarro-Arribas, and J. Borrell, “Smartcop a smart cardbased access control for the protection of network security components,” in On the Move to MeaningfulInternet Systems 2006: OTM 2006 Workshops, ser. Lecture Notes in Computer Science, ISSN 0302-9743,CiteSeer VIP(2007) 0.01 (472/581), OTM 2006, vol. 4277, Montpellier, France (October 29 - November 3,2006): Springer Verlag, Oct. 2006, pp. 415–424, ISBN: 978-3-540-48269-7. DOI: 10.1007/11915034_65

17. J. García-Alfaro, S. Castillo, J. Castella-Roca, G. Navarro-Arribas, and J. Borrell, “Protection of componentsbased on a smart-card enhanced security module,” in Critical Information Infrastructures Security, J. Lopez,Ed., ser. Lecture Notes in Computer Science, (acceptance rate: 38%), ISSN 0302-9743, CORE(2008)C, CORE(2008) C, CRITIS 2006, vol. 4347, Samos, Greece (August 31 - September 1, 2006): SpringerVerlag, Sep. 2006, pp. 128–139, ISBN: 978-3-540-69083-2. DOI: 10.1007/11962977_11

18. J. Ametller, J. Cucurull, R. Martí, G. Navarro-Arribas, and S. Robles, “Enabling mobile agents interoper-ability through fipa standards,” in Cooperative Information Agents X, M. Klusch, M. Rovatsos, and T. R.Payne, Eds., ser. Lecture Notes in Artificial Intelligence, ISSN 0302-9743, CIA 2006, vol. 4149, Edinburgh,UK (September 11-13, 2006): Springer Verlag, Sep. 2006, pp. 388–401, ISBN: 978-3-540-38569-1. DOI:10.1007/11839354_28

19. G. Navarro-Arribas and J. Borrell, “An XML standards based authorization framework for mobile agents,”in Secure Mobile Ad-hoc Networks and Sensors, M. Burmester and A. Yasinsac, Eds., ser. Lecture Notes inComputer Science, (acceptance rate: 36%), ISSN 0302-9743, vol. 4075, Singapore: Springer Verlag, Sep.2006, pp. 54–66, ISBN: 978-3-540-36646-1. DOI: 10.1007/11801412_6

20. G. Navarro-Arribas, J. Ortega-Ruiz, J Ametller, and S Robles, “Distributed authorization framework formobile agents,” in Mobility Aware Technologies and Applications, T. Magendanz, K. Ahmed, and I. Venieris,Eds., ser. Lecture Notes in Computer Science, SCI-JCR(2005): 0.4 (Q4), ISSN 0302-9743, vol. 3744,Montreal, Canada: Springer, Oct. 2005, pp. 127–136, ISBN: 3-540-29410-4. DOI: 10.1007/11569510_13

21. J. García-Alfaro, F. Autrel, J. Borrell, S. Castillo, F. Cuppens, and G. Navarro-Arribas, “Decentralizedpublish-subscribe system to prevent coordinated attacks via alert correlation,” in 6th InternationalConference on Information and communications Security, J. López, S. Qing, and E. Okamoto, Eds., ser. Lec-ture Notes in Computer Science, SCI-JCR(2004): 0.51 (Q3), (acceptance rate: 17%),ISSN 0302-9743,CORE(2008) B, CORE(2008) C, CiteSeer VIP(2007) 0.02 (371/581), vol. 3269, Springer Verlag, Oct.2004, pp. 223–235. DOI: http://dx.doi.org/10.1007/b101042. [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-540-30191-2_18

22. G. Navarro-Arribas, S. Robles, and J. Borrell, “Role-based access control for e-commerce sea-of-dataapplications,” in Information Security. 5th International Conference, ISC 2002, A. Hui and V. Gligor, Eds.,

13

Page 14: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

ser. Lecture Notes in Computer Science, SCI-JCR(2002): 0.515 (Q3), ISSN 0302-9743, CORE(2008) B,CORE(2013) B CiteSeer VIP(2007) 0.04 (172/581), CiteSeer VIP(2002) 0.11 (320/800), vol. 2433, SaoPaulo: Springer Verlag, 2002, pp. 102–116, ISBN: 978-3-540-44270-7

6.3 Proceedings, book chapters, and non SCI JCR journals

2019

1. J. Herrera-Joancomartí, G. Navarro-Arribas, A. Ranchal-Pedrosa, C. Pérez-Solà, and J. Garcia-Alfaro, “Onthe difficulty of hiding the balance of lightning network channels,” in Proceedings of the 2019 ACM AsiaConference on Computer and Communications Security, ser. Asia CCS ’19, Auckland, New Zealand: ACM,2019, pp. 602–612, ISBN: 978-1-4503-6752-3. DOI: 10.1145/3321705.3329812. [Online]. Available:http://doi.acm.org/10.1145/3321705.3329812

2. D. Chen, G. Navarro-Arribas, C. Pérez-Solà, and J. Borrell, “A review of message anonymity on predictableopportunistic networks,” in Actas de las V Jornadas Nacionales de Investigacióon en Ciberseguridad (JNIC2019), Cáceres, Spain: Universidad de Extremadura. Servicio de Publicaciones, Jun. 2019, pp. 316–317,ISBN: 978-84-09-12121-2. [Online]. Available: https://2019.jnic.es/Actas_JNIC2019.pdf#section.0.53,

3. V. Torra, G. Navarro-Arribas, and K. Stokes, “Data privacy,” in Data Science in Practice, ser. Studies in BigData, A. Said and V. Torra, Eds., vol. 46, Springer, 2019, ISBN: 978-3-319-97555-9. DOI: 10.1007/978-3-319-97556-6_7. [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-319-97556-6_7

2018

4. C. Perez-Sola, S. Delgado-Segura, J. Herrera-Joancomarti, and G. Navarro-Arribas, “Analysis of theSegWit adoption in Bitcoin,” in XV Reunión Española sobre Criptología y Seguridad de la Información,P. Garcia Teodoro and R. Barragán Gil and N.M. Fuentes Garcia, Eds., Universidad de Granada, 2018,pp. 230–233, ISBN: 978-84-09-02463-6. [Online]. Available: https://nesg.ugr.es/recsi2018/docs/ActasXVRECSI.pdf

5. S. Delgado-Segura, C. Perez-Sola, G. Navarro-Arribas, and J. Herrera-Joancomarti, “A review of a fairprotocol for data trading based on bitcoin transactions,” in Actas de las Cuartas Jornadas Nacionales deInvestigación en Ciberseguridad, U. Zurutuza, M. Iturbe, E. Ezpeleta, and I. Garitan, Eds., Servicio Editorialde Mondragon Unibertsitatea, 2018, pp. 105–106, ISBN: 978-84-09-02697-5

2017

6. D. Chen, G. Navarro-Arribas, and J. Borrell, “On the applicability of onion routing on predictable delay-tolerant networks,” in 2017 IEEE 42nd Conference on Local Computer Networks (LCN), 2017, pp. 575–578.DOI: 10.1109/LCN.2017.17

7. V. Torra, D. Abril, and G. Navarro-Arribas, “Fuzzy meets privacy,” in The 14th International Conference onModeling Decisions for Artificial Intelligence. USB Proceedings., Kitakyushu, Japan (October 18 - 20, 2017),2017, pp. 108–117, ISBN: 978-84-697-6794-8

8. V. Torra and G. Navarro-Arribas, “Big data privacy and anonymization,” in Privacy and Identity Management.Facing up to Next Steps, ser. IFIP AICT Tutorials, A. Lehmann, D. Whitehouse, S. Fischer-Hübner, L. Fritsch,and C. Raab, Eds., vol. 498, Springer, 2017, pp. 15–26, ISBN: 978-3-319-55783-0. DOI: 10.1007/978-3-319-55783-0_2. [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-319-55783-0_2

2016

9. V. Torra, G. Navarro-Arribas, and K. Stokes, “An overview of the use of clustering for data privacy,”in Unsupervised Learning Algorithms, M. Celebi and K. Aydin, Eds., Springer, Apr. 2016, pp. 237–251,ISBN: 978-3-319-24209-5. DOI: 10.1007/978-3-319-24211-8. [Online]. Available: http://link.springer.com/chapter/10.1007/978-3-319-24211-8_10

2015

14

Page 15: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

10. G. Navarro-Arribas and V. Torra, “Advanced research on data privacy in the ARES project,” in AdvancedResearch in Data Privacy, ser. Studies in Computational Intelligence, G. Navarro-Arribas and V. Torra,Eds., vol. 567, Springer International Publishing, 2015, pp. 3–14, ISBN: 978-3-319-09884-5. DOI:10.1007/978-3-319-09885-2_1. [Online]. Available: http://dx.doi.org/10.1007/978-3-319-09885-2_1

11. V. Torra and G. Navarro-Arribas, “Data privacy: A survey of results,” in Advanced Research in Data Privacy,ser. Studies in Computational Intelligence, G. Navarro-Arribas and V. Torra, Eds., vol. 567, SpringerInternational Publishing, 2015, pp. 27–37, ISBN: 978-3-319-09884-5. DOI: 10.1007/978-3-319-09885-2_3. [Online]. Available: http://dx.doi.org/10.1007/978-3-319-09885-2_3

12. D. Abril, G. Navarro-Arribas, and V. Torra, “Data privacy with R,” in Advanced Research in Data Privacy,ser. Studies in Computational Intelligence, G. Navarro-Arribas and V. Torra, Eds., vol. 567, SpringerInternational Publishing, 2015, pp. 63–82, ISBN: 978-3-319-09884-5. DOI: 10.1007/978-3-319-09885-2_5. [Online]. Available: http://dx.doi.org/10.1007/978-3-319-09885-2_5

2014

13. J. Cucurull, S. Guasch, A. Escala, G. Navarro-Arribas, and V. Acin, “Qr steganography - a threat to newgeneration electronic voting systems,” in SECRYPT 2014 - Proceedings of the 11th International Conferenceon Security and Cryptography, Vienna, Austria, 28-30 August, 2014, SciTePress, 2014, pp. 484–491, ISBN:978-989-758-045-1. DOI: 10.5220/0005120404840491

14. D. Abril, G. Navarro-Arribas, and V. Torra, “Aprendizaje supervisado para el enlace de registros a traves dela media ponderada,” in Actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información,Publicaciones Universidad de Alicante, 2014, pp. 281–284, ISBN: 978-84-9717-323-0

2013

15. D. Abril, G. Navarro-Arribas, and V. Torra, “Vector space model anonymization,” in Artificial IntelligenceResearch and Development (Proceedings of the 16th International Conference of the Catalan Association forArtificial Intelligence), ser. Frontiers in Artificial Intelligence and Applications, ISBN 978-1-61499-319-3(print) | 978-1-61499-320-9 (online), DOI 10.3233/978-1-61499-320-9-141, vol. 256, 2013, pp. 141–150, ISBN: 978-1-61499-319-3. DOI: 10.3233/978-1-61499-320-9-141

16. D. Abril, G. Navarro-Arribas, and V. Torra, “Towards a private vector space model for confidentialdocuments,” in Proceedings of the 28th Annual ACM Symposium on Applied Computing, ser. SAC ’13, NewYork, NY, USA: ACM, 2013, 944–945, ISBN: 978-1-4503-1656-9. DOI: 10.1145/2480362.2480543.[Online]. Available: http://doi.acm.org/10.1145/2480486.2480543 (visited on 07/18/2013)

2012

17. E. Mercadal, G. Navarro-Arribas, S. Foley, and J. Borrell, “Towards efficient access control in a mobile agentbased wireless sensor network,” in 2012 7th International Conference on Risk and Security of Internet andSystems (CRiSIS), 2012, pp. 1–4, ISBN: 978-1-4673-3089-3. DOI: 10.1109/CRISIS.2012.6378940

18. C. Garrigues, H. Rifà-Pous, and G. Navarro-Arribas, “Fully distributed cooperative spectrum sensing forcognitive radio networks,” in Actas XII Reunión Española sobre Criptología y Seguridad de la Información,ISBN 978-84-615-9933-2, Servicio Editorial de Mondragon Unibertsitatea, Jul. 2012, pp. 327–332, ISBN:978-84-615-9933-2

19. E. Mercadal, A. Freijó, G. Navarro-Arribas, and J. Borrell, “Gestión eficiente de permisos en redes desensores inalámbricos,” in Actas XII Reunión Española sobre Criptología y Seguridad de la Información,ISBN 978-84-615-9933-2, Servicio Editorial de Mondragon Unibertsitatea, Jul. 2012, pp. 321–326, ISBN:978-84-615-9933-2

2011

20. V. Torra, D. Abril, and G. Navarro-Arribas, “Supervised learning approach for distance based record linkageas disclosure risk evaluation,” in Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality,Tarragona, Spain, Oct. 2011

21. D. Abril, V. Torra, and G. Navarro-Arribas, “Supervised learning using mahalanobis distance for recordlinkage,” in Proceedings of 6th International Summer School on Aggregation Operators (AGOP 2011), ISBN978-1-4477-7019-0, Jul. 2011, pp. 223–228, ISBN: 978-1-4477-7019-0

15

Page 16: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

22. V. Torra, D. Abril, and G. Navarro-Arribas, “Fuzzy methods for database protection,” in 7th conference of theEuropean Society for Fuzzy Logic and Technology (EUSFLAT-2011), Series: Advances in Intelligent SystemsResearch, Atlantis Press ISBN 978-90-78677-00-0. DOI doi:10.2991/eusflat.2011.143, Aix-les-Bains,France, 2011, pp. 439–443, ISBN: 978-90-78677-00-0. DOI: 10.2991/eusflat.2011.143

2010

23. D. Abril, G. Navarro-Arribas, and V. Torra, “Towards privacy preserving information retrieval throughsemantic microaggregation,” in Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM Inter-national Conference on, ISBN 978-0-7695-4191-4, CORE(2008) C, CORE(2013) B, CiteSeer VIP(2007)0.02 (376/581), York University, Toronto, Canada, 2010, pp. 296–299, ISBN: 978-0-7695-4191-4. DOI:10.1109/WI-IAT.2010.132

24. I. Cano, G. Navarro-Arribas, and V. Torra, “Last results on constrained microaggregation,” in III SimposioSobre Lógica Fuzzy y Soft Computing, CEDI 2010, 2010

25. G. Navarro-Arribas, V. Torra, A. Erola, and J. Castellà-Roca, “Microagregación para el k-anonimato enregistros de buscadores web,” in RECSI 2010. XI Reunión Española sobre Criptología y Seguridad de laInformación, Publicacions URV, 2010, pp. 135–140

26. C. Martínez-García, G. Navarro-Arribas, and J. García-Alfaro, “Despliegue de políticas condicionadaspara la protección de atributos en negociadores móviles,” in RECSI 2010. XI Reunión Española sobreCriptología y Seguridad de la Información, Publicacions URV, 2010, pp. 171–175

27. C. Martínez-García, A. Martín-Campillo, G. Navarro-Arribas, R. Martí, and J. Borrell, “Control de accesointeroperable para la mejora en la cooperación entre grupos de emergencias,” in RECSI 2010. XI ReuniónEspañola sobre Criptología y Seguridad de la Información, Publicacions URV, 2010, pp. 241–246

28. V. Torra, G. Navarro-Arribas, and D. Abril, “On the applications of aggregation operators in data privacy,”in Integrated Uncertainty Management and Applications, ser. Advances in Soft Computing, Ishikawa, Japan(9-11 April, 2010), vol. 68, Springer, 2010, pp. 479–488, ISBN: 978-3-642-11959-0. DOI: 10.1007/978-3-642-11960-6_44

2009

29. V. Torra, I. Cano, and G. Navarro-Arribas, “Dealing with edit constraints in microdata protection: Mi-croaggregation,” in Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality, Bilbao, Spain(2-4 December, 2009), Dec. 2009

30. I. Cano, G. Navarro-Arribas, and V. Torra, “A new framework to automate constrained microaggregation,”in Proceeding of the ACM first international workshop on Privacy and anonymity for very large databases(Conference on Information and Knowledge Management), Keynote, ISBN 978-1-60558-804-9, CIKMCORE(2008) A, CIKM CORE(2013) A, CIKM CiteSeer VIP(2007) 0.05 (152/581)., Hong Kong, China:ACM, Nov. 2009, pp. 1–8, ISBN: 978-1-60558-804-9. DOI: 10.1145/1651449.1651451

31. G. Navarro-Arribas and V. Torra, “Tree-based microaggregation for the anonymization of search logs,” inIEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, ISBN978-0-7695-3801-3, CORE(2008) C, CORE(2013) B, CiteSeer VIP(2007) 0.02 (376/581), vol. 3, Milano,Italy: IEEE Computer Society, Sep. 2009, pp. 155–158, ISBN: 978-0-7695-3801-3. DOI: 10.1109/WI-IAT.2009.251

32. G. Navarro-Arribas and V. Torra, “Towards microaggregation of log files for web usage mining inB2C e-commerce,” in The 28th North American Fuzzy Information Processing Society Annual Confer-ence (NAFIPS2009), ISBN 978-1-4244-4577-6, CORE(2008) C, CORE(2013) C, Cincinnati, OH, USA(14-17 June 2009): IEEE Press, Jun. 2009, pp. 1–6, ISBN: 978-1-4244-4577-6. DOI: 10.1109/NAFIPS.2009.5156452

33. G. Navarro-Arribas and J. Garcia-Alfaro, “A policy-based approach for the management of web browserresources to prevent anonymity attacks in Tor,” in Emerging Challenges for Security, Privacy, and Trust.International Information Security Conference (SEC-2009), ser. IFIP AICT, CORE(2013) B, vol. 297, Cyprus,Greece (18-20 May, 2009): Springer Verlag, May 2009, pp. 164–175, ISBN: 978-3-642-01243-3. DOI:10.1007/978-3-642-01244-0_15

16

Page 17: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

34. C. Martínez-García, G. Navarro-Arribas, J. Borrell, and A. Martín-Campillo, “An access control schemefor multi-agent systems over multi-domain environments,” in 7th International Conference on PracticalApplications of Agents and Multi-Agent Systems, ser. Advances in Intelligent and Soft Computing, ISSN1867-5662, CORE(2008) C, CORE(2013) C, vol. 55, Salamanca, Spain (25-27 March 2009): SpringerVerlag, 2009, pp. 401–410, ISBN: 978-3-642-00486-5. DOI: 10.1007/978-3-642-00487-2_43

2008

35. G. Navarro-Arribas, J. Garcia-Alfaro, O. Mula-Valls, and J. Herrera-Joancomartí, “Gestión de recursos deun navegador web para prevenir ataques contra la privacidad en tor,” in Actas de la X Reunión Españolasobre Criptología y Seguridad de la Información, L. Hernández-Encinas and A. Martín-del-Rey, Eds., ISBN978-84-691-5158-7, Salamanca, Spain, Sep. 2008, pp. 629–637

36. J. Garcia-Alfaro and G. Navarro-Arribas, “Prevención de ataques de Cross-Site Scripting en aplicacionesweb,” in Actas de la X Reunión Española sobre Criptología y Seguridad de la Información, L. Hernández-Encinas and A. Martín-del-Rey, Eds., Salamanca, Spain, Sep. 2008, pp. 369–377

37. C. Martinez-Garcia, G. Navarro-Arribas, J. Borrell, and A. Martin-Campillo, “Sistema impreciso de controlde acceso basado en la conversión cuantificada de atributos para escenarios de interoperabilidad,” inActas de la X Reunión Española sobre Criptología y Seguridad de la Información, L. Hernández-Encinas andA. Martín-del-Rey, Eds., Salamanca, Spain, Sep. 2008, pp. 357–367

2007

38. M. de Toro, S. Robles, R. Martí, G. Navarro-Arribas, and J. Borrell, “Hacia una solución global paraservicios médicos en situaciones de emergencia,” in Actas del II Simposio sobre Seguridad Informáticadel Congreso Español de Informática, Zaragoza, Spain (11-14 September, 2007): Thomson, Sep. 2007,pp. 217–224, ISBN: 978-84-9732-607-0

2006

39. G. Navarro-Arribas and S. N. Foley, “Aproximando saml con medidas de similitud,” in Actas de la IXReunión Española de Criptología y Seguridad de la Información, J. Borrell and J. Herrera, Eds., RECSI2006, Barcelona, Spain, Jul. 2006, pp. 238–263, ISBN: 84-9788-502-3

40. J. García-Alfaro, S. Castillo, J. Castella-Roca, and G. Navarro-Arribas, “Protección de componentes ydispositivos de seguridad mediante un control de acceso basado en kernel,” in Actas de la IX ReuniónEspañola de Criptología y Seguridad de la Información, J. Borrell and J. Herrera, Eds., RECSI 2006,Barcelona, Spain, Jul. 2006, pp. 773–787, ISBN: 84-9788-502-3

2005

41. J. García-Alfaro, S. Castillo, G. Navarro-Arribas, and J. Borrell, “Acaps: An access control mechanismto protect the components of an attack prevention system,” Journal of Computer Science and NetworkSecurity, vol. 5, no. 11, pp. 87–94, Nov. 2005, ISSN: 1738-7906

42. G. Navarro-Arribas and S. N. Foley, “Approximating saml using similarity based imprecision,” in Intelligencein Communication Systems (IFIP International Conference on Intelligence in Communication Systems, IN-TELLCOMM 2005), ser. IFIP International Federation for Information Processing Series, vol. 190, Montréal,Canada: Springer, Oct. 2005, pp. 77–86, ISBN: 978-0-387-29121-5. DOI: 10.1007/0-387-32015-6_18. [Online]. Available: http://www.springerlink.com/content/x8v850808l1626h5/

43. G. Navarro-Arribas, J Peñalver, J. Ametller, J. A. Ortega-Ruiz, J. García-Alfaro, and J. Borrell, “Amap-ola: A simple infrastructure for ubiquitous computing,” in Intelligence in Communication Systems (IFIPInternational Conference on Intelligence in Communication Systems, INTELLCOMM 2005), ser. IFIP In-ternational Federation for Information Processing Series, vol. 190, Montréal, Canada: Springer, Oct.2005, pp. 77–86, ISBN: 978-0-387-29121-5. DOI: 10.1007/0-387-32015-6_8. [Online]. Available:http://www.springerlink.com/content/c086q346th268t72/

44. J. García, F. Cuppens, F. Autrel, J. Castellà-Roca, J. Borrell, G. Navarro-Arribas, and J. Ortega-Ruiz,“Protecting on-line casinos against fraudulent player drop-out,” in International Conference on InformationTechnology, ISBN 0-7695-2315-3, CORE(2008) C, CORE(2013) C, vol. I, Nevada, USA: IEEE ComputerSociety Press, 2005, pp. 500–506, ISBN: 0-7695-2315-3. DOI: 10.1109/ITCC.2005.232

17

Page 18: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

45. J. Castellà-Roca, G. Navarro-Arribas, J. Ortega-Ruiz, and J. García, “Digital chips for an on-line casino,”in International Conference on Information Technology, ISBN 0-7695-2315-3, CORE(2008) C, CORE(2013)C, vol. I, Nevada, USA: IEEE Computer Society Press, Apr. 2005, pp. 494–499, ISBN: 0-7695-2315-3. DOI:10.1109/ITCC.2005.130

46. J. García-Alfaro, S. Castillo, G. Navarro-Arribas, and J. Borrell, “Mechanisms for attack protection on aprevention framework,” in Proceedings of the 39th Annual IEEE International Carnahan Conference onSecurity Technology, ISBN 0-7803-9245-0, Las Palmas de G.C., Spain: IEEE Press, Oct. 2005, pp. 137–140,ISBN: 0-7803-9245-0. DOI: 10.1109/CCST.2005.1594872

47. G. Navarro-Arribas and J. A. Ortega-Ruiz, “Secure agent-based management for pervasive computing,”in Proceedings of the 39th Annual IEEE International Carnahan Conference on Security Technology, ISBN0-7803-9245-0, Las Palmas de G.C., Spain: IEEE Press, Oct. 2005, pp. 133–136, ISBN: 0-7803-9245-0.DOI: 10.1109/CCST.2005.1594864

48. S. Castillo, J. García-Alfaro, G. Navarro-Arribas, and J. Borrell, “Protección de componentes en unaplataforma para la prevención de ataques coordinados,” in In Proceedings of the first Spanish Conferenceon Informatics (CEDI 2005), Information Security Symposium, ISBN 84-9732-447-1, Granada, Spain, Sep.2005, pp. 265–272, ISBN: 84-9732-447-1

49. G. Navarro-Arribas, J. Borrell, J. Ortega-Ruiz, and S. Robles, “Access control with safe role assignmentfor mobile agents,” in Proceedings of the Fourth International Joint Conference on Autonomous agents andMulti Agent Systems (AAMAS), F. Dignum, V. Dignum, S. Koenig, S. Kraus, M. Singh, and M. Wooldridge,Eds., ISBN 1-59593-094-9, CORE(2008) A, CORE(2013) A*, CiteSeer VIP(2007) 0.02 (361/581), vol. 3,Utrecht, The Netherlands: ACM Press, Jul. 2005, pp. 1235–1236, ISBN: 1-59593-094-9. DOI: http://doi.acm.org/10.1145/1082473.1082710

2004

50. J. García-Alfaro, F. Autrel, J. Borrell, Y. Bouzida, S. Castillo, F. Cuppens, and G. Navarro-Arribas, “Prevent-ing coordinated attacks via alert correlation,” in 9th Nordic Workshop on Secure IT Systems, T. V. SannaLiimatainen, Ed., ISSN 1456-7911, CORE(2008) C, CORE(2013) C, Departement of Computer Science atHelsinki University of Technology, Publications in Telecommunications Software and Multimedia, Nov.2004, pp. 110–117

51. G. Navarro-Arribas, J. García, and J. A. Ortega-Ruiz, “Chained and delegable authorization tokens,” in9th Nordic Workshop on Secure IT Systems, T. V. Sanna Liimatainen, Ed., ISSN 1456-7911, CORE(2008) C,CORE(2013) C, Departement of Computer Science at Helsinki university of Technology, Publications inTelecommunications Software and multimedia, Nov. 2004, pp. 8–14

52. G. Navarro-Arribas and J. García, “Cadat: Control de acceso basado en tokens y cadenas hash delegables,”in Avances en Criptología y Seguridad de la información, ISBN 84-7978-650-7, VIII RECSI, Leganés, Spain:Ediciones Díaz de Santos, Sep. 2004, pp. 425–435, ISBN: 84-7978-650-7

53. J. García-Alfaro, S. Castillo, G. Navarro-Arribas, and J. Borrell, “Diseño y desarrollo de un sistemacolaborativo para la prevención de ataques coordinados,” in In Avances en Criptología y Seguridad de laInformación, ISBN 84-7978-650-7, VIII RECSI, Leganés, Spain: Ediciones Díaz de Santos, Sep. 2004,pp. 475–493, ISBN: 84-7978-650-7

2003

54. G. Navarro-Arribas, B. S. Firozabadi, E. Rissanen, and J. Borrell, “Constrained delegation in xml-basedaccess control and digital rights management standards,” in CNIS03, Special Session on Architectures andLanguages for Digital Rights Management and Access Control, M. H. Hamza, Ed., New York, USA: ActaPress, Dec. 2003, pp. 271–276, ISBN: 0-88986-402-0

55. J. Ametller, J. Borrell, J. García, G. Navarro-Arribas, and S. Robles, “Framework for developing mobileagent applications,” in Actas X Conferencia de la Asociación Española para la Inteligencia Artificial (CAEPIA2003), A. Moreno, Ed., San Sebastian, Spain, Nov. 2003, pp. 66–67

56. G. Navarro-Arribas, S. Robles, and J. Borrell, “Assigning roles for access control in mobile agent appli-cations,” in The 3rd IFIP Conference on e-Commerce, e-Business, and e-Government, ser. IFIP ConferenceProceedings, Sao Paulo, Brazil: Kluwer Academic, Sep. 2003, pp. 30–41

18

Page 19: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

2002

57. S. Robles, G. Navarro-Arribas, J. Pons, J. Rifà, and J. Borrell, “Mobile agents supporting secure gridenvironments,” in Euroweb 2002 Conference, M. W. B. Matthews B. Hopgood, Ed., ISBN 1-902505-50-6,World Wide Web Consortium, Oxford, UK: British Computer Society, Dec. 2002, pp. 195–197, ISBN:1-902505-50-6

58. G. Navarro-Arribas, S. Robles, and J. Borrell, “An access control method for mobile agents in sea-of-dataapplications,” Upgrade: The European Journal for the Informatics Professional, vol. III, pp. 47–51, Dec.2002, ISSN: 1684-5285

59. G. Navarro-Arribas, S. Robles, and J. Borrell, “Un método de control de acceso para agentes móviles enaplicaciones mar-de-datos,” Novatica, no. 160, pp. 18–22, 2002, ISSN: 0211.2124

60. G. Navarro-Arribas, S. Robles, and J. Borrell, “Adapted role-based access control for marism-a using spkicertificates,” in 2nd. IW on Security of Mobile Multiagent Systems, ISSN 0946-008X, Bologna, Italy, Jul.2002, pp. 35–42

61. S. Robles, I. Luque, G. Navarro-Arribas, J. Pons, and J. Borrell, “Plataforma segura para la ejecución deagentes móviles con itinerario, código y datos protegibles,” in VII Reunión Española sobre Criptología ySeguridad de la Información, C. M. S. González, Ed., ISBN 84-699-8932-4, vol. II, Oviedo, Spain: Serviciode Publicaciones de la Universidad de Oviedo, Sep. 2002, pp. 765–778

62. G. Navarro-Arribas, S. Robles, and J. Borrell, “Spki para el control de acceso a recursos en entornosde agentes móviles,” in VII Reunión Española sobre Criptología y Seguridad de la Información, C. M.S. Gónzalez, Ed., ISBN 84-699-8932-4, vol. II, Oviedo, Spain: Servicio de Publicaciones de la Universidadde Oviedo, Sep. 2002, pp. 671–684

6.4 Editor

1. C. Pérez-Solà, G. Navarro-Arribas, A. Biryukov, and J. Garcia-Alfaro, Eds., Data Privacy Management,Cryptocurrencies and Blockchain Technology, vol. 11737, Lecture Notes in Computer Science (LNCS),and Security and Cryptology sub-series (LNSC), Springer Nature, 2019, ISBN: 978-3-030-31499-6. DOI:10.1007/978-3-030-31500-9. [Online]. Available: https://link.springer.com/book/10.1007/978-3-030-31500-9

2. J. Garcia-Alfaro, G. Navarro-Arribas, H. Hartenstein, and J Herrera-Joancomartí, Eds., Data PrivacyManagement, Cryptocurrencies and Blockchain Technology, vol. 10436, Lecture Notes in Computer Science,Springer, 2017, ISBN: 978-3-319-67815-3. DOI: 10.1007/978-3-319-67816-0. [Online]. Available:https://link.springer.com/book/10.1007/978-3-319-67816-0

3. V. Torra, Y. Narukawa, G. Navarro-Arribas, and C. Yañez, Eds., Modeling Decisions for Artificial Intelligence,vol. 9880, Lecture Notes in Computer Science, Springer International Publishing, 2016, ISBN: 978-3-319-45655-3. DOI: 10.1007/978-3-319-45656-0. [Online]. Available: http://link.springer.com/book/10.1007/978-3-319-45656-0

4. J. Garcia-Alfaro, G. Navarro-Arribas, A. Aldini, F. Martinelli, and N. Suri, Eds., Data Privacy Management,and Security Assurance, vol. 9481, Lecture Notes in Computer Science, Springer International Publishing,2016, ISBN: 978-3-319-29882-5 978-3-319-29883-2. DOI: 10.1007/978-3-319-29883-2. [Online].Available: http://link.springer.com/10.1007/978-3-319-29883-2

5. G. Navarro-Arribas and V. Torra, Eds., Advanced Research in Data Privacy, ser. Studies in ComputationalIntelligence. Springer International Publishing, 2015, vol. 567, ISBN: 978-3-319-09884-5. DOI: 10.1007/978-3-319-09885-2

6. V. Torra, Y. Narukawa, G. Navarro-Arribas, and D. Megias, Eds., Modelling Decisions for Artificial Intelligence(10th International Conference, MDAI 2013), vol. 8234, Lecture Notes in Artificial Intelligence, ISSN0302-9743 (Print) 1611-3349 (Online); ISBN 978-3-642-41549-4 (Print) 978-3-642-41550-0 (Online),Springer, 2013. DOI: 10.1007/978-3-642-41550-0. [Online]. Available: http://link.springer.com/book/10.1007/978-3-642-41550-0

7. V. Torra and G. Navarro-Arribas, Eds., Information fusion in the context of data privacy. Special Issue ofInformation Fusion, vol. 13, 4, JCR2011SCI: 1.47 (Q1), 2012

19

Page 20: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

8. J. Garcia-Alfaro, G. Navarro-Arribas, N Cuppens-Boulahia, and S. de Capitani di Vimercati, Eds., DataPrivacy Management and Autonomous Spontaneous Security, vol. 7122, Lecture Notes in ComputerScience, ISBN 978-3-642-28878-4, ISSN 0302-9743, Springer, Mar. 2012, ISBN: 978-3-642-28878-4.DOI: 10.1007/978-3-642-28879-1. [Online]. Available: http://www.springerlink.com/content/978-3-642-28878-4

9. J. Garcia-Alfaro, G. Navarro-Arribas, A. Cavalli, and J. Leneutre, Eds., Data Privacy Management andAutonomous Spontaneous Security. 5th International Workshop, DPM 2010 and 3rd International Workshop,SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers, vol. 6514, Lecture Notes inComputer Science, (ISBN 978-3-642-19347-7) (ISSN 0302-9743 (Print) 1611-3349 (Online)), SpringerBerlin / Heidelberg, Feb. 2011. DOI: 10.1007/978-3-642-19348-4

10. J. Garcia-Alfaro, G. Navarro-Arribas, N Cuppens-Boulahia, and Y. Roudier, Eds., Data Privacy Managementand Autonomous Spontaneous Security, vol. 5939, Lecture Notes in Computer Science, Springer, Jan.2010, ISBN: 978-3-642-11206-5. DOI: 10.1007/978-3-642-11207-2

6.5 Reviewer

• Journals:

– Transactions on Data Privacy.

– IEEE Transactions on Knowledge and Data Engineering.

– Information Sciences.

– Information Fusion (International Journal on Multi-Sensor, Multi-Source Information Fusion)

– Data & Knowledge Engineering (DKE) Journal.

– Journal of Systems and Software.

– Journal of Network and Computer Applications.

– Information Processing Letters.

– International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems.

– Journal of Communications.

7 PhD. Theses Advised

For Master’s and Bachelor’s theses advised see Section 11.6.

ongoing Depeng Chen. Privacy in dynamic networks, Universitat Autònoma de Barcelona. Co-advised with Dr.Joan Borrell.

2018 Sergi Delgado Segura. P2P networks for blockchain based cryptocurrencies, Universitat Autònoma deBarcelona, October 1, 2018. Co-advised with Dr. Jordi Herrera-Joancomartí.

2011 Carlos Martínez García. Contributions to access control: Continuous access and attribute-level interoperation.Universitat Autònoma de Barcelona. September 23, 2011. Grade A cum laude. Co-advised with Dr. JoanBorrell Viader.

2008 Jordi Cucurull Juan. Efficient Mobility and Interoperability of Software Agents. Universitat Autònoma deBarcelona. Defended: December 3, 2008. Grade A cum laude. Co-advised with Dr. Joan Borrell Viader.Jordi Cucurull recived an “Outstanding PhD Award” in Computer Sciences from the the UniversitatAutònoma de Barcelona (UAB).

8 Participation in PhD. Examination Boards

1. (Suplente / substitute) Nicolas Ruiz, Toward a universal privacy and information-preserving framework forindividual data exchange. Departament d’Enginyeria Informàtica i Matemàtiques, Universitat Rovira iVirgili. Doctoral Program: Computer Science and Mathematics of Security. Advisors: Josep Domingo-Ferrer, Krish Muralidhar. 25/09/2018, Tarragona.

20

Page 21: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

2. (Suplente / substitute) Joan Pahisa Sole, De lenguaje telegráfico a lenguaje natural: un sistema de expansiónen una aplicación de CAA basada en pictogramas. Dept. of Information and Communications Engineering,Universidad Autónoma de Barcelona. Advisor: Jordi Herrera Joancomartí. 11/12/2017, Bellaterra.

3. (Secretario / secretary) Sergio Castillo Perez, Contributions to Privacy and Anonymity on the Internet:Domain Name System and Second-Generation Onion Routing, Dept. of Information and CommunicationsEngineering, Universidad Autónoma de Barcelona. Advisors: Joaquin Garcia-Alfaro, Joan Borrell.07/04/2017, Bellaterra.

4. (Suplente / substitute) Víctor García Font, Anomaly detection in smart city wireless sensor networks,Universitat Oberta de Catalunya. Program: Network and Information Technologies. Advisors: CarlesGarrigues, Helena Rifà. 8/02/2017 Barcelona.

5. (Vocal / member) Malik Imran Daud, Ontology-based Access Control in Open Scenarios. Applicationsto Social Networks and the Cloud. Doctoral Program: Computer Science and Mathematics of SecurityDepartament d’Enginyeria Informàtica i Matemàtiques, Universitat Rovira i Virgili. Advisor: AlexandreViejo, David Sánchez. 14/07/2016, Tarragona.

6. (Suplente / substitute) Cristian Stefan Tanas. Plataforma per assegurar la fiabilitat de les dades i protegir laprivacitat dels usuaris en entorns de mobile crowd sensing. Dept. of Information and CommunicationsEngineering, Universidad Autónoma de Barcelona. Advisor: Jordi Herrera-Joancomartí. 2015, Bellaterra.

7. (Suplente / substitute) Ruben Martinez Vidal. Architectures for aeronautical opportunistic networking.Dept. of Information and Communications Engineering, Universidad Autónoma de Barcelona. Advisor:Joan Borrell. 2015, Bellaterra.

8. (Suplente / substitute) Roger Cadí Cedó. Enhancing Drivers’ Privacy in Urban Electronic Road PricingSystems. Departament d’Enginyeria Informàtica i Matemàtiques, Universitat Rovira i Virgili. 2015.Advisor: Alexandre Viejo Galicia, Jordi Castellà Roca. 17/09/2015, Tarragona.

9. (Secretario / secretary) Jordi Casas Roma. Privacy-preserving and data utility in graph mining. Dept. ofInformation and Communications Engineering, Universidad Autónoma de Barcelona. Advisor: JordiHerrera-Joancomartí, Vicenç Torra. 24/11/2014, Bellaterra.

10. (Secretario / secretary) Jordi Marés Soler. Categorical Data Protection on Statistical Datasets and SocialNetworks. Dept. of Information and Communications Engineering. Universidad Autónoma de Barcelona.Advisor: Vicenç Torra. 15/11/2013, Bellaterra.

11. (Suplente / substitute) Arnau Erola Cañellas. Contributions to privacy in web search engines. Dept.de Ingenieria Informática y Matemáticas. Universitat Rovira i Virgili. Advisor: Jordi Castellà-Roca.09/09/2013, Tarragona.

12. (Suplente / substitute) Sergio Martínez Lluís. Ontology Based Semantic Anonymisation of Microdata.Departament d‘Enginyeria Informàtica i Matemàtiques. Universitat Rovira i Virgili. Advisors: Aïda VallsMateu, David Sanchez Ruenes. 26/02/2013, Tarragona.

13. (Secretario / secretary) Alber Vico Oton. Collected results on semigroups, graphs and codes. Dept.d’Enginyeria Informàtica i Matemàtiques. Universitat Rovira i Virgili. Advisor: Maria Bras-Amoros.22/11/2012, Tarragona.

14. (Suplente / substitute) Klara Stokes. Combinatorial Structures for Anonymous Database Search. Dept.d’Enginyeria Informàtica i Matemàtiques. Universitat Rovira i Virgili. Advisor: Maria Bras-Amoros.18/10/2011, Tarragona.

9 Colaboration in conferences and journals

We detail here work related to conferences and journal organization.

9.1 Editor

• Transactions on Data Privacy: member of the Editorial Board since 2017. http://www.tdp.cat

• Information Fusion: member of the Editorial Board since January 2013. This journal is indexed by theJCR SCI in the first quartile. https://www.journals.elsevier.com/information-fusion

21

Page 22: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

9.2 Conference / committee chair

2017 PC Chair, DPM 2017, The 12th DPM International Workshop on Data Privacy Management. Co-locatedwith ESORICS 2017. Oslo, Norway, September 15-15. Co-chaired with Joaquin Garcia-Alfaro. http://deic.uab.cat/conferences/dpm/dpm2017/.

2016 General Chair, MDAI 2016, The 13th International Conference on Modeling Decisions for ArtificialIntelligence. Sant Julià de Lòria, Andorra September 19 - 21. Co-chaired with Cristina Yáñez. http://www.mdai.cat/mdai2016/.

2016 PC Chair, ATC 2016, The 13th IEEE Conference on Advanced and Trusted Computing, Track 3. PrivacyPreservation in Big Data. July 18-21, 2016, Toulouse, France. Co-chaired with Vicenç Torra. https://atc2016.sciencesconf.org/.

2015 PC Chair, DPM 2015, International Workshop on Data Privacy Management (DPM 2015). Co-locatedwith ESORICS 2015, September 21-22, 2015. Co-chaired with Joaquin Garcia-Alfaro.

2013 General Chair: MDAI 2013, The 10th International Conference on Modeling Decisions for ArtificialIntelligence. Barcelona, Spain, November 20-22, 2013. Co-chaired with David Megias.

2012 Special Session: Uncertainty in Privacy & Security @ IPMU 2012 at International Conference on Informa-tion Processing and Management of Uncertainty in Knowledge-Based Systems (IPMU). Catania, Italy,July 9–13, 2012. Co-organized with Vicenç Torra and Aïda Valls.

2011 PC Chair, DPM 2011: International Workshop on Data Privacy Management (DPM 2011). Co-locatedwith ESORICS 2011. Co-chaired with Nora Cuppens-Boulahia.

2010 PC Chair. DPM 2010: International Workshop on Data Privacy Management (DPM 2010). Co-locatedwith ESORICS, September 23, Athens, Greece. Co-chaired with Joaquin Garcia-Alfaro.

2010 Special Session: Uncertainty in Privacy & Security @ IPMU 2010 at International Conference on Infor-mation Processing and Management of Uncertainty in Knowledge-Based Systems (IPMU). Dortmund,Germany, June 28 - July 2, 2010. Co-organised with Vicenç Torra and Aïda Valls.

2009 PC Chair, DPM 2009: International Workshop on Data Privacy Management (DPM09). Co-located withESORICS, September 24-25, Saint Malo, France, 2009. Co-chaired with Joaquin Garcia-Alfaro.

9.3 Program committee member

2018

1. PC Member, FPS 2018, The 11th International Symposium on Foundations & Practice of Security,November 13-15, 2018, Montreal, Canada. http://fps2018.encs.concordia.ca/

2. PC Member, MDAI 2018, The 15th International Conference on Modeling Decisions for Artificial Intelli-gence, October 15-18, Mallorca, Spain. http://www.mdai.cat/mdai2018/

3. PC Member, 13th DPM International Workshop on Data Privacy Management, September 6-7, Barcelona,Spain. Co-located with ESORICS 2018. http://deic.uab.cat/conferences/dpm/dpm2018/

4. PC Member, International Workshop on Cryptocurrencies and Blockchain Technology - CBT’18, September6-7, Barcelona, Spain. Co-located with ESORICS 2018. http://deic.uab.cat/conferences/cbt/cbt2018/

5. PC Member, ATC2018, The 15th IEEE Conference on Advanced and Trusted Computing, October 8-12,2018, Guangzhou, China. http://www.smart-world.org/2018/atc/.

6. PC Member (privacy track), PST2018, 16th Annual conference on Privacy, Security and Trust, August28-30, 2018. Belfast, UK. http://pstnet.ca/pst2018/.

7. PC Member, Blockchain-2018, The 2018 IEEE International Conference on Blockchain, July 30 - August3, 2018. Halifax, Canada. http://cse.stfx.ca/~blockchain2018/

2017

22

Page 23: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

8. PC Member, FPS 2017, The 10th International Symposium on Foundations & Practice of Security, October23-25, 2017, Nancy, France. http://fps2017.loria.fr/.

9. International Workshop on Cryptocurrencies and Blockchain Technology - CBT’17, ESORICS 2017,September 11 - 15, 2017, Oslo, Norway. http://www.deic.uab.cat/~jherrera/CBT/

10. PC Member, ATC2017, The 14th IEEE Conference on Advanced and Trusted Computing, August 4-8,2017, San Francisco, USA. http://ieee-smartworld.org/2017/atc/.

11. PC Member, ISIS2017, The 18th International Symposium on Advanced Intelligent Systems, October11-14, 2017, at EXCO in Daegu, South Korea. http://isis2017.org/.

12. PC Member, MDAI 2017, The 14th International Conference on Modeling Decisions for Artificial Intelli-gence. October 18 - 20, 2017, Kitakyushu, Japan. http://www.mdai.cat/mdai2017/.

2016

13. PC Member, FPS 2016, The 9th International Symposium on Foundations & Practice of Security, October24-26, 2016, Québec City, Québec, Canada. http://www.fps2016.fsg.ulaval.ca/.

14. PC Member, Track 9. Privacy and Trust Management in Distributed Systems, The 13th IEEE InternationalConference on Advanced and Trusted Computing, July 18-21, 2016, Toulouse-France. http://atc2016.sciencesconf.org/

15. PC Member, Joint 8th International Conference on Soft Computing and Intelligent Systems and 17thInternational Symposium on Advanced Intelligent Systems, August 25-28, 2016, Hokkai-Gakuen Unversity,Sapporo, Hokkaido, Japan. http://scis2016.j-soft.org/

2015

16. PC Member, 8th International Symposium on Foundations & Practice of Security, October 26-28, 2015,Clermont-Ferrand, France. http://confiance-numerique.clermont-universite.fr/fps2015/

17. PC Member, The 12th International Conference on Modeling Decisions for Artificial Intelligence (MDAI2015), Skovde, Sweden, September 21-23, 2015. http://www.mdai.cat/mdai2015/

18. PC Member, I Jornadas Nacionales de investigación en Ciberseguridad JNIC2015, September 14-16,Leon, Spain. http://jornadasciberseguridad.riasc.unileon.es/

19. PC Member, 13th Annual Conference on Privacy, Security and Trust (PST 2015), Izmir, Turkey, July21–23, 2015. http://pst2015.yasar.edu.tr/

20. PC Member, 28th IEEE International Symposium on Computer-Based Medical Systems, Sao Carlos andRiveirao Preto, Brazil, June 22–25, 2015. http://www.gbdi.icmc.usp.br/events/cbms2015/

2014

21. PC Member, Advanced Intrusion Detection and Prevention Workshop, AIDP 2014. Co-located with IFIPSEC 2014. June 4-5, 2014 Marrakech, Morocco. http://adax.boun.edu.tr/aidp2014/.

22. PC Member, 9th DPM International Workshop on Data Privacy Management (DPM 2014), co-locatedwith ESORICS 2014, September 10, Wroclaw, Poland. http://deic.uab.cat/conferences/dpm/dpm2014/

23. PC Member, 27th International Conference on Computer-Based Medical Systems, CBMS 2014, Track"Security and Privacy in Healthcare IT", May 27-29, 2014. New York, USA. http://sites.ieee.org/cbms/

24. PC Member, The 28th IEEE International Conference on Advanced Information Networking and Ap-plications (AINA-2014), May 13-16, 2014. Victoria, Canada (http://www.aina-conference.org/2014/).

25. PC Member, The 11th International Conference on Modeling Decisions for Artificial Intelligence (MDAI2014), October 29 - 31, 2014. Tokyo, Japan (http://www.mdai.cat/mdai2014/).

2013

23

Page 24: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

26. PC Member, The Sixth International Symposium on Foundations & Practice of Security FPS’2013, 21st-22nd October 2013, La Rochelle, France. http://conferences.telecom-bretagne.eu/fps/2013/

27. PC Member, 8th DPM International Workshop on Data Privacy Management (DPM 2013), September12-13, 2013. Egham, UK. http://research.icbnet.ntua.gr/DPM2013/

28. PC Member, The sixth International Workshop on Autonomous and Spontaneous Security (SETOP 2013).September 12-13 2013, RHUL, Egham, UK. http://conferences.telecom-bretagne.eu/setop/2013/

29. PC Member, Eleventh international conference on Privacy, Security and Trust (PST’13), Privacy Theme.July 17–19, 2013, Tarragona (Spain).

30. PC Member, 26th IEEE International Symposium on Computer-Based Medical Systems (http://cbms2013.med.up.pt), Track: "Security and Privacy in Healthcare IT" (www.dcc.fc.up.pt/sph.cbms2013),June 20–22, 2013, Faculty of Medicine of Oporto University,

2012

31. PC Member, FPS 2012: 5th International Symposium on Foundations & Practice of Security. October25–26, 2012 Montreal, Canada. (http://conferences.telecom-bretagne.eu/fps2012/).

32. PC Member, DPM 2012: Data Privacy Management, 7th Internation Workshop, September 2012. Pisa,Italy. (http://www-ma4.upc.edu/DPM2012/)

33. PC Member, SUM 2012: Sixth International Conference on Scalable Uncertainty Management, September17 - 19, 2012. Marburg, Germany. (http://www.mathematik.uni-marburg.de/~sum2012/).

34. PC Member, MDAI 2012: The 9th International Conference on Modeling Decisions for Artificial Intelli-gence, November 21 - 23, 2012. Girona, Spain. (http://www.mdai.cat/mdai2012/).

35. PC Member, SETOP 2012: 5th SETOP International Workshop on Autonomous and Spontaneous Security,September 2012. Pisa, Italy.

36. PC Member, AgentCare 2012: First Agents in Health Care Workshop, June 20 – 23. Madrid, Spain.

2011

37. PC Member, SETOP 2011: 4th SETOP International Workshop on Autonomous and Spontaneous Security,15 – 16, September, 2011. Leuven, Belgium.

38. PC Member, FPS 2011: 4th Canada-France MITACS Workshop on Foundations & Practice of Security. 12– 13 May, 2011. Paris, France.

39. PC Member, MPEIS 2011: 1st International Workshop on Model-Based and Policy-Based Engineering inInformation Security. 18-21 July, 2011. Seville, Spain.

40. PC Member, MDAI 2011: Modeling Decisions for Artificial Intelligence (MDAI 2010). July 28-30, 2011.Changsha, Hunan, China.

2010

41. PC Member, MDAI 2010: Modeling Decisions for Artificial Intelligence (MDAI 2010). October 27-29,Perpignan, France, 2010.

10 Invited speaker

• MDAI 2017, The 14th International Conference on Modeling Decisions for Artificial Intelligence, MDAI2017. October 18-20, 2017, Kitakyushu, Japan. Plenary Speaker:

– “Provenance and privacy”.

• MPEIS 2011, International Workshop on Model-Based and Policy-Based Engineering,in InformationSecurity, SECRYPT 2011, (International Conference on Security and Cryptography). Jul 18–21, 2011Seville, Spain. Invited Speaker:

24

Page 25: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

– G. Navarro-Arribas. “On continuous interpretation of access control”.

• UNECE/Eurostat Work Session on Statistical Data Confidentiality, December 2-4, 2009. Bilbao, Spain.Invited Paper. (Organized by the United Nations Economic Commission for Europe and Eurostat).

– V. Torra, I. Cano, and G. Navarro-Arribas, “Dealing with edit constraints in microdata protection: Microaggre-gation,” in Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality, Bilbao, Spain (2-4 December,2009), Dec. 2009

11 Teaching Experience

11.1 Teaching assessments

• Teaching assesment/evaluation (tramos docentes):

– Autonomic: 2003-2008, 2008-2013.

– National (basicos): 2001-2006, 2006-2011.

• Accredited by the FDES program (Formación Docente en Educación Superior) by the Unidad de InnovaciónDocente en Educación Superior (IDES) of the Universitat Autónoma de Barcelona (January 2008).

11.2 Teaching positions

Additional teaching positions other than the main academic positions listed in Section 2:

2006-2008 Teacher at the Escola de Prevenció i Seguretat Integral (Security and Prevention School) associatedto the Autonomous University of Barcelona, in its main graduate degree.

2002-2008 Teaching special curses at the Engineering School (Escola d’Enginyeria), Universitat Autònoma deBarcelona: Introduction to Linux Administration, Linux Servers Administration, and Security in Linux andIntranets.

11.3 Subjects taught

I’ve been teaching in for graduate and undergraduate studies since 2001 mainly in computer networks andsecurity related subjects.

11.3.1 Undergraduate teaching

See Table 1.

Subject (program) Faculty/School Courses (hours)

Garantía de la Información y Seguridad(Grado de Ingenieria Informática)

Escuela de Ingeniería, UniversitatAutònoma de Barcelona

2016/17 (135.8hours) 2015/16(135.8 hours)2014/15 (135.8hours) 2013/14(30.43 hours)2012/13 (51.85hours)

Trabajo de Fin de Grado (Grado de In-genieria Informática)

Escuela de Ingeniería, UniversitatAutònoma de Barcelona

2016/17 (36 hours)2015/16 (36 hours)2014/15 (108 hours)2013/14 (10.29hours)

Redes (Grado de Ingenieria Infor-mática)

Escuela de Ingeniería, UniversitatAutònoma de Barcelona

2011/12 (80.57hours)

. . . Table 1 continues in next page . . .

25

Page 26: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

. . . continuation of Table 1

Subject (program) Faculty/School Courses (hours)

Proyecto de Ingenieria Informática (In-genieria Informática)

Escuela de Ingeniería, UniversitatAutònoma de Barcelona

2011/12 (30 hours)2010/11 (30 hours)

Redes de Computadores I (IngenieriaInformática)

Escuela de Ingeniería, UniversitatAutònoma de Barcelona

2011/12 (30 hours)

Herramientas de cálculo simbólico (In-genieria Informática)

Escuela de Ingeniería, UniversitatAutònoma de Barcelona

2010/11 (60 hours)

Análisis y diseño de sistemas de in-formación (Grado de Ingenieria Infor-mática)

Escuela de Ingeniería, UniversitatAutònoma de Barcelona

2010/11 (89.01hours)

Seguridad computacional (IngenieriaInformática)

Escuela Técnica Superior de Ingenieria,Universitat Autònoma de Barcelona

2007/08 (20 hours)2006/07 (90 hours)2005/06 (60 hours)

Proyecto de Ingenieria Informática (In-genieria Informática)

Escuela Técnica Superior de Ingenieria,Universitat Autònoma de Barcelona

2007/08 (15 hours)2006/07 (15 hours)2005/06 (30 hours)

Redes de computadores II (IngenieriaInformática)

Escuela Técnica Superior de Ingenieria,Universitat Autònoma de Barcelona

2007/08 (60 hours)2006/07 (102 hours)2004/05 (20 hours)2003/04 (30 hours)

Seguridad Informática I (Grado en Pre-vención y Seguridad Integral)

Escuela de Prevención y SeguridadIntegral, Universitat Autònoma deBarcelona

2007/08 (27 hours)2006/07 (28 hours)

Redes de computadores I (IngenieriaInformática)

Escuela Técnica Superior de Ingenieria,Universitat Autònoma de Barcelona

2005/06 (70 hours)

Redes de computadores (IngenieriaTécnica de Sistemas/Gestión)

Escuela Universitaria de Informáticade Sabadell, Universitat Autònoma deBarcelona

2005/06 (40 hours)2004/05 (64 hours)2002/03 (40 hours)2001/02 (20 hours)

Ampliación de redes de computadores(Ingenieria Técnica de Sistemas)

Escuela Universitaria de Informáticade Sabadell, Universitat Autònoma deBarcelona

2004/05 (40 hours)

Ampliación de redes de comunicación(Ingenieria Técnica de Telecomunica-ciones, especialidad en Sistemas Elec-trónicos)

Escuela Técnica Superior de Ingenieria,Universitat Autònoma de Barcelona

2003/04 (15 hours)

Informática (Licenciatura en Matemáti-cas)

Facultad de Ciencias, UniversitatAutònoma de Barcelona

2001/02 (30 hours)

Table 1: Undergraduate teaching activity

11.3.2 Graduate and masters teaching

See Table 2.

11.3.3 Other teaching

In Table 3 we list other teaching activities not performed strictly in the context of the graduate and undergraduatestudies.

26

Page 27: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

Subject (program) Faculty/School Courses (hours)

Trabajo de Fin de Máster (Máster uni-versitario en Seguridad de las Tec-nologías de la Información y de las Co-municaciones)

Escuela de Ingeniería, UniversitatAutònoma de Barcelona

2016/17 (94.50 hours)2015/16 (78.90 hours)2014/15 (47.25 hours)2013/14 (23.14 hours)

Vulnerabilidades de Seguridad (Másteruniversitario en Seguridad de las Tec-nologías de la Información y de las Co-municaciones)

Escuela de Ingeniería, UniversitatAutònoma de Barcelona

2016/17 (56.25 hours)2015/16 (121.88 hours)2014/15 (49.25 hours)2013/14 (76.53 hours)2012/13 (81.43 hours)2011/12 (81.43 hours)

Seguridad en Redes (Máster universi-tario en Seguridad de las Tecnologíasde la Información y de las Comunica-ciones)

Escuela de Ingeniería, UniversitatAutònoma de Barcelona

2014/15 (28.13 hours)2013/14 (35.89 hours)2012/13 (91.07 hours)

Información y Seguridad Avanzada(Máster en Informática Avanzada)

Escuela de Ingeniería, UniversitatAutònoma de Barcelona

2011/12 (17.68 hours)

Codificación, compresión y seguridadIII (Máster en Informática Avanzada)

Escuela de Ingeniería, UniversitatAutònoma de Barcelona

2010/11 (12.84 hours)

Codificación, compresión y seguridadII (Máster en Informática Avanzada)

Escuela Técnica Superior de Ingenieria,Universitat Autònoma de Barcelona

2007/08 (15 hours)

Table 2: Graduate and masters teaching activity.

Security and IoT Projecte Singular: Digital & Green Skills per una economia sostenible.(SOC-003-16-00103)

2017 (6 hours)

Security and Iot Projecte Trnasformació Digital: Indústria 4.0 (SOC020/1//00153) 2019 (6 hours)

Table 3: Other teaching activity.

11.4 Teaching courses as listener

Teaching-related courses and seminars received.

2018 “La importància del feedback en l’avaluació de les competències dels estudiants (The importance offeedback in the evaluation of the skills of the students), Universitat Autonoma de Barcelona (Unitat deFormació i Innovació Docent), 03/07/2018.

2018 “Gestió de la diversitat” (Diversity management), Universitat Autonoma de Barcelona (Unitat de Formaciói Innovació Docent), 18/07/2018.

2016 “Aprenentatges basats en projectes” (Project based learning) (4 hours) Universitat Autònoma de Barcelona,July 12, 2016.

2016 “Aprenentatges actius en grups nombrosos” (Active learning in big groups), (4 hours), UniversitatAutònoma de Barcelona (Oficina de Qualitat Docent), July 11, 2016.

2016 “Millorar l’expressió escrita dels alumnes de matèries no lingüístiques” (Improving the writing expressionof students from non-linguistic subjects.) (4 hours), Universitat Autònoma de Barcelona (Oficina deQualitat Docent), June 17, 2016.

2011 “Confecció de guies docents” (Teaching guides elaboration), 10 hours (1 ECTS). February 2011, IDESUAB (Unitat d’innovació docent en educació superior, Universitat Autonoma de Barcelona).

2011 “Avaluació continuada en grups grans” (Continuous evaluation in big groups), 8 hours (0.5 ECTS).February, 2011, IDES UAB (Unitat d’innovació docent en educació superior, Universitat Autonoma deBarcelona).

27

Page 28: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

2011 “Educació de la veu i foniatria” (Education of the voice), 12 hours (1 ECTS). February 2011, IDES UAB.(Unitat d’innovació docent en educació superior, Universitat Autonoma de Barcelona)

2006 Seminari de “Disseny i verificació de la qualitat de proves d’avaluació dels aprenentatges” (Seminar onthe Design and verification of the quality of learning evaluation tests). 12 hours. January/February, 2006.IDES UAB (Unitat d’innovació docent en educació superior, Universitat Autonoma de Barcelona).

2006 Tutoria académica a la Universitat (Academic advisory at the University). 15 hours. June 2006. IDESUAB (Unitat d’innovació docent en educació superior, Universitat Autonoma de Barcelona).

2006 El Wiki com a eina d’aprenentatge dins l’EEES (The Wiki as a learning tool in the EEES). 15 hours. June2006. IDES UAB (Unitat d’innovació docent en educació superior, Universitat Autonoma de Barcelona).

2005 Seminari: “Portfolio del Estudiant” (Seminar: “Student portfolio” ). 15 hours. February, 2005. IDES UAB(Unitat d’innovació docent en educació superior, Universitat Autonoma de Barcelona).

2005 Resoldre problemes per aprendre: identificacio de les competóncies del pensament cientific(Solvingproblems to learn: identification of the competences of the scientific thinking). 15 hours. June, 2005. IDESUAB (Unitat d’innovació docent en educació superior, Universitat Autonoma de Barcelona).

11.5 Bachelor’s theses advised

1. Marta Sola Sillero (B.Sc.) Ataques en Aplicaciones Web Computer Engineering Degree. UniversitatAutònoma de Barcelona. July, 2019.

2. Marta Sola Sillero (B.Sc.) Diseño seguro de redes y ataques a nivel de red Telecomunication SystemsEngineering Degree. Universitat Autònoma de Barcelona. July, 2019.

3. Álex Vázquez Félix (B.Sc.) HARDWARE THREATENING: vulnering/securing cache side channel attacksComputer Engineering Degree. Universitat Autònoma de Barcelona. July, 2019. Co-advised with JordiSayeras (Applus+).

4. Òscar Palomo (B.Sc.) Tècniques d’infecció de fitxers binaris (Infection techniques for binary files). ComputerEngineering Degree. Universitat Autònoma de Barcelona. February, 2019.

5. Ferran Celades Pons (B.Sc.) Analysis of Bitcoin using BlockSci Computer Engineering Degree. UniversitatAutònoma de Barcelona. February, 2018.

6. Almudena López Tejada (B.Sc.) Smart contracts amb Ethereum Computer Engineering Degree. UniversitatAutònoma de Barcelona. June, 2017.

7. Nil Ortiz Rabella. (B.Sc.) Deception Honeypots: Deep Intelligence Computer Engineering Degree. Univer-sitat Autònoma de Barcelona. Developed within the company Blueliv, co-advised with Ramon Vicens(Blueliv). February, 2017.

8. Raúl Tarancón García. (B.Sc.) Intelengine - Software de Ciberintelingencia. Computer Engineering Degree.Universitat Autònoma de Barcelona. Developed within the company EY, co-advised with Jose AntonioLancharro (EY), July 2016.

9. Miguel Angel Valverde Dominguez. (B.Sc.), Desarrollo de un chat en el ámbito educacional sobre redesDTN. Computer Engineering Degree. Universitat Autònoma de Barcelona. July 2016.

10. Asif Al Ferdous Khan. (B.Sc.) Creation of a Collaborative Model of Hoenypots. Computer EngineeringDegree. Universitat Autònoma de Barcelona. Developed within the company Blueliv, co-advised withRamon Vicens (Blueliv). July 2015.

11. David Cara Roca. (B.Sc.) Desenvolupament d’una aplicació de reportatge d’incidències sobre DTN. ComputerEngineering Degree. Universitat Autònoma de Barcelona. July 2015.

12. Javier Villar Almirón. (B.Sc.) Aplicación Chat sobre una red DTN. Computer Engineering Degree. Univer-sitat Autònoma de Barcelona. July 2015.

13. Xavier Serra Ninou. (B.Sc.) Estudi de l’anonimat del Bitcoin. Computer Engineering Degree. UniversitatAutònoma de Barcelona. July 2015.

28

Page 29: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

14. Daniel Ramírez. (B.Sc.) Steganography in TCP & IP headers. Computer Engineering Degree. UniversitatAutònoma de Barcelona. February 2015.

15. Álvaro Esteban Gutiérrez. (B.Sc.) Botnet Tracking. Computer Engineering Degree. Universitat Autònomade Barcelona. February 2015.

16. Victor Acín Sanz. (B.Sc.) Estudi i implementació d’un mètode d’ocultació d’informació en codis QR. ComputerEngineering Degree. Universitat Autònoma de Barcelona. February 2014. Developed with the companyScytl, Co-advised with Jordi Cucurull (Scytl).

17. Marc Júarez. (B.Sc.) 5266: DisPA, Un Agent per a la Cerca Privada a la Web. Universitat Autònoma deBarcelona. February 4, 2013. Co-advised with Vicenç Torra.

18. Abel Freijó Fernàndez. (B.Sc.) 4653: Aplicacions per Xarxes Oportunísitiques (Applications for OportunisitcNetworks). Universitat Autònoma de Barcelona. Grade: 10. 2011-2012.

19. Sergi Martínez Bea. (B.Sc.) Privacitat en trajectòries (Trajectory privacy). Universitat Autònoma deBarcelona. 2010-2011

20. Carolina Fernández Martínez (B.Sc.) IBE aplicada a comunicaciones entre agentes móviles (Application ofIBE for mobile agents). Universitat Autònoma de Barcelona. 2010-2011.

21. Alex Barceló. (B.Sc.) Conversió d’atributs en entorns multidomini basats en credencials (Certificate-basedattribute conversion in multidomain scenarios). Universitat Autònoma de Barcelona. 2007-2008.

22. Ferran Rovira Tura. (B.Sc.) Proposta de Migració Segura d’Agents amb Sol.licitud de Classes Sota Demandaper a la Plataforma JADE (A proposal for secure migration of agents in the JADE platform with on demandclass requests). Universitat Autònoma de Barcelona. 2007-2008.

23. Xavier Lopez Barquiel. (B.Sc.) RBAC en JADE utilizando XACML (RBAC in JADE through XACML).Universitat Autònoma de Barcelona. 2006-2007.

24. Xavier Franquet Conte. (B.Sc.) Agents mòbils i seguretat: Extracció de tasques locals d’un itinerari protegitper arquitecutres criptogràfiques (Extracting local tasks from an itinerary for cryptographic architectures).Universitat Autònoma de Barcelona. 2005-2006.

25. Ruben Serrano Nuñez. (B.Sc.) Seguridad Imprecisa para Java (Imprecise security in Java). UniversitatAutònoma de Barcelona. 2004-2005.

26. Joaquin Peñalver Sanchez. (B.Sc.) Diseño e Implementación de una Infraestructura Basada en Agentespara la Gestión de Entronos de Computación Ubicua (Design and implementation of an agent-basedinfrastructure for the management for ubiquitous computing environments). Universitat Autònoma deBarcelona. 2004-2005.

11.6 Master’s theses advised

For PhD theses advised see Section 7.

1. Alberto Marcos Martínez (M.Sc.) Estudio de la Criptografía Homomórfica Máster Interuniversitariode Seguridad de las Tecnologías de la Información y de las Comunicaciones (MISITIC), UniversidadAutónoma de Barcelona, Universidad Oberta de Catalunya, Universidad Rovira i Virgili. June 2019.

2. Ivan Fuentes Sanchez (M.Sc.) Estudio de los canales de micropagos en Bitcoin: Lightning Network MásterInteruniversitario de Seguridad de las Tecnologías de la Información y de las Comunicaciones (MISITIC),Universidad Autónoma de Barcelona, Universidad Oberta de Catalunya, Universidad Rovira i Virgili.January 2019.

3. Carlos Gonzalez Cebrecos (M.Sc.) Nodes Bitcoin al Cloud Máster Interuniversitario de Seguridad de lasTecnologías de la Información y de las Comunicaciones (MISITIC), Universidad Autónoma de Barcelona,Universidad Oberta de Catalunya, Universidad Rovira i Virgili. June 2018.

4. Carlos Pérez Jiménez (M.Sc.) Analysis of the Ethereum state Máster Interuniversitario de Seguridad de lasTecnologías de la Información y de las Comunicaciones (MISITIC), Universidad Autónoma de Barcelona,Universidad Oberta de Catalunya, Universidad Rovira i Virgili. February 2018.

29

Page 30: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

5. David Fuentes Iglesias (M.Sc.) TOR Hidden Service Discovery Máster Interuniversitario de Seguridadde las Tecnologías de la Información y de las Comunicaciones (MISITIC), Universidad Autónoma deBarcelona, Universidad Oberta de Catalunya, Universidad Rovira i Virgili. February 2018.

6. Eduardo Sánchez Agüero (M.Sc.) Detección de protocolos de red inseguros haciendo uso de técnicas deaprendizaje automático Máster Interuniversitario de Seguridad de las Tecnologías de la Información y delas Comunicaciones (MISITIC), Universidad Autónoma de Barcelona, Universidad Oberta de Catalunya,Universidad Rovira i Virgili. June 2017.

7. Roger Fernando González Camacho (M.Sc.) Implementación del sistema de monitorización con Nagios.Aplicación en el Complejo Hospitalario Universitario de Canarias. Máster Interuniversitario de Seguridadde las Tecnologías de la Información y de las Comunicaciones (MISITIC), Universidad Autónoma deBarcelona, Universidad Oberta de Catalunya, Universidad Rovira i Virgili. June 2017.

8. Ramsés Pascual Clemente (M.Sc.) Anàlisi de comportament dels atacants a una honeynet. Máster In-teruniversitario de Seguridad de las Tecnologías de la Información y de las Comunicaciones (MISITIC),Universidad Autónoma de Barcelona, Universidad Oberta de Catalunya, Universidad Rovira i Virgili.February 2017. Developed within the company Blueliv (Leap In Value). Co-advised with Ramon VicensLillo (Leap In Value, S.L.)

9. Marta Malgosa i Broto (M.Sc.) Disseny i implementació d’un lloc web que presenti reptes del tipus CTFo Wargame de seguretat informàtica. Máster Interuniversitario de Seguridad de las Tecnologías de laInformación y de las Comunicaciones (MISITIC), Universidad Autónoma de Barcelona, UniversidadOberta de Catalunya, Universidad Rovira i Virgili. February 2017.

10. Juan Vicente Ferrero Valdés (M.Sc.) Introducción a los Smartcontracts con Ethereum, Máster Interuniversi-tario de Seguridad de las Tecnologías de la Información y de las Comunicaciones (MISITIC), UniversidadAutónoma de Barcelona, Universidad Oberta de Catalunya, Universidad Rovira i Virgili. February 2017.

11. David Antolín Pont. (M.Sc.) Contractes Intel.ligents amb Ethereum Máster Interuniversitario de Seguridadde las Tecnologías de la Información y de las Comunicaciones (MISITIC), Universidad Autónoma deBarcelona, Universidad Oberta de Catalunya, Universidad Rovira i Virgili. February 2017.

12. Marc Batalla Burgueño (M.Sc.), XACML i JSON Máster Interuniversitario de Seguridad de las Tecnologíasde la Información y de las Comunicaciones (MISITIC), Universidad Autónoma de Barcelona, UniversidadOberta de Catalunya, Universidad Rovira i Virgili. June 2016.

13. María José Galed Lacosta (M.Sc.), Diseño e implementación de un sitio Wargame / CTF, Máster Interuniver-sitario de Seguridad de las Tecnologías de la Información y de las Comunicaciones (MISITIC), UniversidadAutónoma de Barcelona, Universidad Oberta de Catalunya, Universidad Rovira i Virgili. June 2016.

14. Gabriel Emilio Piñero González (M.Sc.), Implantación de OpenAM como servicio de autenticación única,Máster Interuniversitario de Seguridad de las Tecnologías de la Información y de las Comunicaciones(MISITIC), Universidad Autónoma de Barcelona, Universidad Oberta de Catalunya, Universidad Rovira iVirgili. June 2016.

15. Pedro Segarra Cabedo (M.Sc.), Diseño e implementación de un sitio web que presente retos tipo CTF oWargame de seguridad informática, Máster Interuniversitario de Seguridad de las Tecnologías de laInformación y de las Comunicaciones (MISITIC), Universidad Autónoma de Barcelona, UniversidadOberta de Catalunya, Universidad Rovira i Virgili. June 2016.

16. Adrian Antunez Veas. (M.Sc.) Onion Routing in Predictable Delay Tolerant Networks Máster Interuniversi-tario de Seguridad de las Tecnologías de la Información y de las Comunicaciones (MISITIC), UniversidadAutónoma de Barcelona, Universidad Oberta de Catalunya, Universidad Rovira i Virgili. July 2015.

17. Pedro Caamaño Pérez. (M.Sc.) Esteganografía en IPv6, Máster Interuniversitario de Seguridad de lasTecnologías de la Información y de las Comunicaciones (MISITIC), Universidad Autónoma de Barcelona,Universidad Oberta de Catalunya, Universidad Rovira i Virgili. July 2015.

18. Miguel Ángel Cazalla Barranco. (M.Sc.) Esteganografía en redes IPv6, Máster Interuniversitario de Seguri-dad de las Tecnologías de la Información y de las Comunicaciones (MISITIC), Universidad Autónoma deBarcelona, Universidad Oberta de Catalunya, Universidad Rovira i Virgili. July 2015.

30

Page 31: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

19. Eric Nova Ibáñez. (M.Sc.) Esteganografia en IPv6. Máster Interuniversitario de Seguridad de lasTecnologías de la Información y de las Comunicaciones (MISITIC), Universidad Autónoma de Barcelona,Universidad Oberta de Catalunya, Universidad Rovira i Virgili. July 2015.

20. David Coleto Bell. (M.Sc.) Esteganografia HTTP Máster Interuniversitario de Seguridad de las Tecnologíasde la Información y de las Comunicaciones (MISITIC), Universidad Autónoma de Barcelona, UniversidadOberta de Catalunya, Universidad Rovira i Virgili. January 2015.

21. Arturo Arevalo González. (M.Sc.) stego-sharp. Framework en C# para la experimentación de esteganografíasobre HTTP. Máster Interuniversitario de Seguridad de las Tecnologías de la Información y de lasComunicaciones (MISITIC), Universidad Autónoma de Barcelona, Universidad Oberta de Catalunya,Universidad Rovira i Virgili. June 2014.

22. Daniel Gil. (M.Sc.) HTTP Steganography. Máster Interuniversitario de Seguridad de las Tecnologías dela Información y de las Comunicaciones (MISITIC), Universidad Autónoma de Barcelona, UniversidadOberta de Catalunya, Universidad Rovira i Virgili. June 2014.

23. José Alberto Aguiló Escámez. (M.Sc.) Avalució de CluStream com a algorisme de microaggregació perstreams de dades (Evaluation of CluStream as a microaggregation algorithm for data streams). MásterInteruniversitario de Seguridad de las Tecnologías de la Información y de las Comunicaciones (MISITIC),Universidad Autónoma de Barcelona, Universidad Oberta de Catalunya, Universidad Rovira i Virgili.January 2014.

24. José Mauricio Sanchez Reales. (M.Sc.) Desarrollo y securización de imUNAD, plataforma web que organi-zará el Plan Operativo de la Zona Caribe de la UNAD Colombia. Máster Interuniversitario de Seguridadde las Tecnologias de la Información y de las Comunicaciones (MISITIC), Universidad Autónoma deBarcelona, Universidad Oberta de Catalunya, Universidad Rovira i Virgili. June 2013.

25. José David Sánchez Reales. (M.Sc.) Desarrollo y securización del portal Web UATIC-567 para la Instituciónde Educación Superior Universidad del Atlántico. Máster Interuniversitario de Seguridad de las Tecnologiasde la Información y de las Comunicaciones (MISITIC), Universidad Autónoma de Barcelona, UniversidadOberta de Catalunya, Universidad Rovira i Virgili. June 2013.

26. Antonio Jesús Caro Alonso-Rodríguez. (M.Sc.) Man in the middle attacks on SSL/TLS, Máster Interuniver-sitario de Seguridad de las Tecnologias de la Información y de las Comunicaciones (MISITIC), UniversidadAutónoma de Barcelona, Universidad Oberta de Catalunya, Universidad Rovira i Virgili. Grade: C + (6).Presented: January 21, 2013.

27. Carlos Martínez García. (M.Sc.) Control de acceso bajo situaciones de emergencia: Revisión y diseñode mecanismos de flexibilidad e interoperabilidad (Access control in emergency scenarios: review anddesign of mechanisms for flexibility and interoperability). Universitat Autònoma de Barcelona, Masteren Informática Avanzada (Advanced Computing Master). June 2008.

12 Teaching related publications

We have included here articles published in teaching conferences and teaching-related book chapters. Othercommon material, such as slides, support manuals or guides, tutorials, . . . are not included.

1. G. Navarro-Arribas, “Sistemas de cortafuegos,” in Seguridad en redes, Núm. de páginas 45, Depósito LegalB-25.301-2012, y B-25.300-2012 (versión en catalan del mismo libro), Universitat Oberta de Catalunya,2012

2. G. Navarro-Arribas, “Introducción a las vulnerabilidades,” in Vulnerabilidades de seguridad, Núm. depáginas 24, Depósito Legal B-34.043-2011 y B-34.044-2011 (versión en catalán del mismo libro),Universitat Oberta de Catalunya, 2011

3. J. Herrera-Joancomartí and G. Navarro-Arribas, “Vulnerabilidades en redes,” in Vulnerabilidades deseguridad, Núm. de páginas 36, Depósito Legal B-34.043-2011 y B-34.044-2011 (versión en catalán delmismo libro), Universitat Oberta de Catalunya, 2011

31

Page 32: Guillermo Navarro-Arribas Currículum Vítaeguille/g_navarro-arribas.pdf · Guillermo Navarro-Arribas Currículum Vítae November 8, 2019 Name: Guillermo Navarro-Arribas Address:

4. J. Pons, S. Robles, G. Navarro-Arribas, R. Martí, and J. Borrell, “Improvement of the adaptation of thewiki platform to the university teaching: The concrete case of the subjects of computer networks,” inActas del 5o Congreso Internacional en Docencia Universitaria e Innovación, ISBN: 978-84-8458-279-3,Universitat de Lleida, 2008

5. J. Borrell, R. Martí, G. Navarro-Arribas, J. Pons, and S. Robles, “Wikis i avaluació per companys enassignatures de xarxes d’ordinadors,” in Jornades d’Innovació Docent, Universitat Autònoma de Barcelona,Sep. 2006

6. J. Borrell, R. Martí, G. Navarro-Arribas, J. Pons, and S. Robles, “Noves experiències d’avaluació ambwikis: Grups nombrosos i avaluació per companys,” in Actas del 4o Congreso Internacional en DocenciaUniversitaria e Innovación, Jul. 2006, p. 431

7. S. Robles, J. Borrell, C. Fernández, J. Ortega, G. Navarro-Arribas, J. García, F. García, and J. Pons, “El wikicom estratègia didàctica en assignatures de xarxes d’ordinadors,” in Actas del 3r Congreso Internacionalen Docencia Universitaria e Innovación, ISBN 84-88795-79-3, Girona, Spain, Jul. 2004, p. 340

13 Other Merits

13.1 Academic Spanish/Catalan Assessments

• The National Agency for Quality Assessment and Accreditation of Spain (Agencia Nacional de Evaluaciónde la Calidad y Acreditación, ANECA). Acredited as:

– Profesor Titular (2011).

– Profesor Ayundate Doctor (2007).

– Profesor Colaborador (2006).

• The Quality Assurance Agency for the University System in Catalonia (Agència per a la Qualitat delSistema Universitari a Catalunya, AQU). Acredited as:

– Professor agregat (2011)

– Trams de recerca: 2 (2004–2009, 2010—2015)

– Professor lector (2007)

– Professor col.laborador (2004)

13.2 Scientific associations

• IEEE, Institute of Electrical and Electronics Engineers, and IEEE Computer Society. Senior Member since2017 (member since 2007, student member since 2003).

32