{"id":2711,"date":"2017-03-23T19:11:26","date_gmt":"2017-03-23T18:11:26","guid":{"rendered":"http:\/\/webs.um.es\/felixgm\/?page_id=2711"},"modified":"2024-08-29T21:52:50","modified_gmt":"2024-08-29T20:52:50","slug":"editor-tpc","status":"publish","type":"page","link":"https:\/\/webs.um.es\/felixgm\/editor-tpc\/","title":{"rendered":"Editor &#038; TPC"},"content":{"rendered":"<p>[vc_row][vc_column]<h3 class=\"fac-title text-left\" style=\"color:#4b4b4b\">Editorial board member<\/h3>\n[vc_row_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb1481&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttp:\/\/www.journals.elsevier.com\/computers-and-electrical-engineering\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_column_text]<strong><a href=\"http:\/\/www.journals.elsevier.com\/computers-and-electrical-engineering\" target=\"_blank\" rel=\"noopener noreferrer\">Computers &amp; Electrical Engineering<\/a><\/strong>, Elsevier[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb1081&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttp:\/\/www.journals.elsevier.com\/computer-standards-and-interfaces\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_column_text]<strong><a href=\"http:\/\/www.elsevier.com\/locate\/csi\" target=\"_blank\" rel=\"noopener noreferrer\">Computer Standards &amp; Interfaces<\/a><\/strong>, Elsevier[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb2751&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttp:\/\/www.journals.elsevier.com\/journal-of-information-security-and-applications\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_column_text]<strong><a href=\"http:\/\/www.journals.elsevier.com\/journal-of-information-security-and-applications\" target=\"_blank\" rel=\"noopener noreferrer\">Journal of Information Security and Applications<\/a><\/strong>, Elsevier[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb2741&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttp:\/\/www.journals.elsevier.com\/engineering-applications-of-artificial-intelligence\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_column_text]<strong><a href=\"http:\/\/www.journals.elsevier.com\/engineering-applications-of-artificial-intelligence\" target=\"_blank\" rel=\"noopener noreferrer\">Engineering Applications of Artificial Intelligence<\/a><\/strong>, Elsevier[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb2761&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttp:\/\/www.inderscience.com\/browse\/index.php?journalID=389&#8243;][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_column_text]<strong><a href=\"http:\/\/www.inderscience.com\/browse\/index.php?journalID=389\" target=\"_blank\" rel=\"noopener noreferrer\">International Journal of Trust Management in Computing and Communications<\/a><\/strong>, Inder Science Publishers[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb5861&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttp:\/\/onlinelibrary.wiley.com\/journal\/10.1002\/(ISSN)2475-6725&#8243;][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_column_text]<strong><a href=\"http:\/\/onlinelibrary.wiley.com\/journal\/10.1002\/(ISSN)2475-6725\" target=\"_blank\" rel=\"noopener noreferrer\">Security and Privacy<\/a><\/strong>, Wiley[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<p>[vc_row][vc_column]<h3 class=\"fac-title text-left\" style=\"color:#4b4b4b\">Journal Special Issues (guest editor)<\/h3>\n<br \/>\n[vc_row_inner][vc_column_inner width=\u00bb1\/6&#8243;][\/vc_column_inner][vc_column_inner width=\u00bb1\/3&#8243;][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb2741&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttp:\/\/www.journals.elsevier.com\/engineering-applications-of-artificial-intelligence\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/3&#8243;][vc_column_text]<strong><a href=\"http:\/\/www.journals.elsevier.com\/engineering-applications-of-artificial-intelligence\" target=\"_blank\" rel=\"noopener noreferrer\">Engineering Applications of Artificial Intelligence<\/a><\/strong>, vol. 87, pp. 1-2, 2020<\/p>\n<ul>\n<li>Special Issue on \u00ab<b><a href=\"https:\/\/www.sciencedirect.com\/journal\/engineering-applications-of-artificial-intelligence\/special-issue\/10XQHPV7X2D\" target=\"_blank\" rel=\"noopener noreferrer\">Industry 4.0<\/a><\/b>\u00ab<\/li>\n<li>Editorial:<br \/>\n<blockquote><p><cite style=\"font-size: initial;\">Ajith Abraham, Edward Au, Al\u00e9cio Binotto, Laura Garc\u00eda-Hern\u00e1ndez, Vladim\u00edr Mar\u00edk, F\u00e9lix G\u00f3mez M\u00e1rmol, V\u00e1clav Sn\u00e1sel, Thomas I. Strasser, Wolfgang Wahlster, \u00ab<strong><a href=\"https:\/\/doi.org\/10.1016\/j.engappai.2019.103324\" target=\"_blank\" rel=\"noopener noreferrer\">Industry 4.0: Quo Vadis?<\/a><\/strong>\u00ab, <em><a href=\"http:\/\/www.journals.elsevier.com\/engineering-applications-of-artificial-intelligence\" target=\"_blank\" rel=\"noopener noreferrer\">Engineering Applications of Artificial Intelligence<\/a><\/em>, vol. 87, pp. 1-2, 2020<\/cite><\/p><\/blockquote>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb4501&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttp:\/\/www.springer.com\/business+%26+management\/business+information+systems\/journal\/10660&#8243;][\/vc_column_inner][vc_column_inner width=\u00bb1\/3&#8243;][vc_column_text]<strong><a href=\"http:\/\/www.springer.com\/business+%26+management\/business+information+systems\/journal\/10660\" target=\"_blank\" rel=\"noopener noreferrer\">Electronic Commerce Research<\/a><\/strong>, Springer<\/p>\n<ul>\n<li>Special Issue on \u00ab<b><a href=\"https:\/\/link.springer.com\/journal\/10660\/volumes-and-issues\/19-3\" target=\"_blank\" rel=\"noopener noreferrer\">Advances in Security and Privacy for Future Mobile Communications<\/a><\/b>\u00ab, vol. 19, no. 3, pp. 471-475, 2019<\/li>\n<li>Editorial:<br \/>\n<blockquote><p><cite style=\"font-size: initial;\">Georgios Kambourakis, Gregorio Mart\u00ednez P\u00e9rez, F\u00e9lix G\u00f3mez M\u00e1rmol, \u00ab<strong><a href=\"https:\/\/doi.org\/10.1007\/s10660-019-09365-4\" target=\"_blank\" rel=\"noopener noreferrer\">Editorial: special issue on advances in security and privacy for future mobile communications<\/a><\/strong>\u00ab, <em><a href=\"http:\/\/www.springer.com\/business+%26+management\/business+information+systems\/journal\/10660\" target=\"_blank\" rel=\"noopener noreferrer\">Electronic Commerce Research<\/a><\/em>, vol. 19, no. 3, pp. 471-475, 2019<\/cite><\/p><\/blockquote>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb9901&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttp:\/\/www.mdpi.com\/journal\/futureinternet\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/3&#8243;][vc_column_text]<strong><a href=\"http:\/\/www.mdpi.com\/journal\/futureinternet\" target=\"_blank\" rel=\"noopener noreferrer\">Future Internet<\/a><\/strong>, MDPI<\/p>\n<ul>\n<li>Special Issue on \u00ab<b><a href=\"http:\/\/www.mdpi.com\/journal\/futureinternet\/special_issues\/Wireless_Mobile_Networks\" target=\"_blank\" rel=\"noopener noreferrer\">Security and Privacy in Wireless and Mobile Networks<\/a><\/b>\u00ab, vol. 10, no. 2, pp 1-3, 2018<\/li>\n<li>Editorial:<br \/>\n<blockquote><p><cite style=\"font-size: initial;\">Georgios Kambourakis, F\u00e9lix G\u00f3mez M\u00e1rmol, Guojun Wang, \u00ab<strong><a href=\"https:\/\/doi.org\/10.3390\/fi10020018\" target=\"_blank\" rel=\"noopener noreferrer\">Security and Privacy in Wireless and Mobile Networks<\/a><\/strong>\u00ab, <em><a href=\"http:\/\/www.mdpi.com\/journal\/futureinternet\" target=\"_blank\" rel=\"noopener noreferrer\">Future Internet<\/a><\/em>, vol. 10, no. 2, pp 1-3, 2018<\/cite><\/p><\/blockquote>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb1481&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttps:\/\/www.journals.elsevier.com\/computers-and-electrical-engineering\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/3&#8243;][vc_column_text]<strong><a href=\"https:\/\/www.journals.elsevier.com\/computers-and-electrical-engineering\" target=\"_blank\" rel=\"noopener noreferrer\">Computers &amp; Electrical Engineering<\/a><\/strong>, Elsevier<\/p>\n<ul>\n<li>Special Issue on \u201c<b><a href=\"http:\/\/www.sciencedirect.com\/science\/journal\/00457906\/41\" target=\"_blank\" rel=\"noopener noreferrer\">Recent Advances in Security and Privacy in Distributed Communications<\/a><\/b>\u201d (4th Edition), vol. 41, pp. 65-156 (January 2015)<\/li>\n<li>Editorial:<br \/>\n<blockquote><p><cite style=\"font-size: initial;\">F\u00e9lix G\u00f3mez M\u00e1rmol, Jose M. Alcaraz Calero, Gregorio Mart\u00ednez P\u00e9rez, \u00ab<strong><a href=\"https:\/\/doi.org\/10.1016\/j.compeleceng.2015.02.010\" target=\"_blank\" rel=\"noopener noreferrer\">Introduction to the Special Issue on Recent Advances in Security and Privacy in Distributed Communications (Fourth Edition)<\/a><\/strong>\u00ab, <em><a href=\"https:\/\/www.journals.elsevier.com\/computers-and-electrical-engineering\" target=\"_blank\" rel=\"noopener noreferrer\">Computers &amp; Electrical Engineering<\/a><\/em>, vol. 41, pp. 65-67, 2015<\/cite><\/p><\/blockquote>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb4501&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttp:\/\/www.springer.com\/business+%26+management\/business+information+systems\/journal\/10660&#8243;][\/vc_column_inner][vc_column_inner width=\u00bb1\/3&#8243;][vc_column_text]<strong><a href=\"http:\/\/www.springer.com\/business+%26+management\/business+information+systems\/journal\/10660\" target=\"_blank\" rel=\"noopener noreferrer\">Electronic Commerce Research<\/a><\/strong>, Springer<\/p>\n<ul>\n<li>Special Issue on \u00ab<b><a href=\"https:\/\/link.springer.com\/journal\/10660\/volumes-and-issues\/15-1\" target=\"_blank\" rel=\"noopener noreferrer\">Advances in Security and Privacy for Future Mobile Communications<\/a><\/b>\u00ab, vol. 15, no. 1, pp. 73-74, 2015<\/li>\n<li>Editorial:<br \/>\n<blockquote><p><cite style=\"font-size: initial;\">Georgios Kambourakis, Gregorio Mart\u00ednez P\u00e9rez, F\u00e9lix G\u00f3mez M\u00e1rmol, \u00ab<strong><a href=\"https:\/\/doi.org\/10.1007\/s10660-015-9179-2\" target=\"_blank\" rel=\"noopener noreferrer\">Editorial: special issue on advances in security and privacy for future mobile communications<\/a><\/strong>\u00ab, <em><a href=\"http:\/\/www.springer.com\/business+%26+management\/business+information+systems\/journal\/10660\" target=\"_blank\" rel=\"noopener noreferrer\">Electronic Commerce Research<\/a><\/em>, vol. 15, no. 1, pp. 73-74, 2015<\/cite><\/p><\/blockquote>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb1481&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttps:\/\/www.journals.elsevier.com\/computers-and-electrical-engineering\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/3&#8243;][vc_column_text]<strong><a href=\"https:\/\/www.journals.elsevier.com\/computers-and-electrical-engineering\" target=\"_blank\" rel=\"noopener noreferrer\">Computers &amp; Electrical Engineering<\/a><\/strong>, Elsevier<\/p>\n<ul>\n<li>Special Issue on \u201c<b><a href=\"http:\/\/www.sciencedirect.com\/science\/journal\/00457906\/40\/6\" target=\"_blank\" rel=\"noopener noreferrer\">Recent Advances in Security and Privacy in Distributed Communications<\/a><\/b>\u201d (3rd Edition), vol. 40, no. 6, pp. 1903-2025 (August 2014)<\/li>\n<li>Editorial:<br \/>\n<blockquote><p><cite style=\"font-size: initial;\">Gregorio Mart\u00ednez P\u00e9rez, Jose M. Alcaraz Calero, F\u00e9lix G\u00f3mez M\u00e1rmol, \u00ab<strong><a href=\"https:\/\/doi.org\/10.1016\/j.compeleceng.2014.07.014\" target=\"_blank\" rel=\"noopener noreferrer\">Introduction to the special issue on Recent advances in security and privacy in distributed communications (third edition)<\/a><\/strong>\u00ab, <em><a href=\"https:\/\/www.journals.elsevier.com\/computers-and-electrical-engineering\" target=\"_blank\" rel=\"noopener noreferrer\">Computers &amp; Electrical Engineering<\/a><\/em>, vol. 40, no. 6, pp. 1903-1905, 2014<\/cite><\/p><\/blockquote>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb2751&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttp:\/\/www.journals.elsevier.com\/journal-of-information-security-and-applications\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/3&#8243;][vc_column_text]<strong><a href=\"http:\/\/www.journals.elsevier.com\/journal-of-information-security-and-applications\" target=\"_blank\" rel=\"noopener noreferrer\">Journal of Information Security and Applications<\/a><\/strong>, Elsevier<\/p>\n<ul>\n<li>Special Issue on \u201c<b><a href=\"http:\/\/www.sciencedirect.com\/science\/journal\/22142126\/19\/1\" target=\"_blank\" rel=\"noopener noreferrer\">Identity Protection and Management<\/a><\/b>\u201d, vol. 19, no. 1, pp 1-77 (February 2014)<\/li>\n<li>Editorial:<br \/>\n<blockquote><p><cite style=\"font-size: initial;\">Adrian Waller, Gregorio Mart\u00ednez P\u00e9rez, F\u00e9lix G\u00f3mez M\u00e1rmol, \u00ab<strong><a href=\"https:\/\/doi.org\/10.1016\/j.jisa.2014.06.001\" target=\"_blank\" rel=\"noopener noreferrer\">Editorial: Special issue on Identity Protection and Management<\/a><\/strong>\u00ab, <em><a href=\"http:\/\/www.journals.elsevier.com\/journal-of-information-security-and-applications\" target=\"_blank\" rel=\"noopener noreferrer\">Journal of Information Security and Applications<\/a><\/em>, vol. 19, no. 1, pp. 1-1, 2014<\/cite><\/p><\/blockquote>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb4601&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttp:\/\/www.springer.com\/engineering\/signals\/journal\/11036&#8243;][\/vc_column_inner][vc_column_inner width=\u00bb1\/3&#8243;][vc_column_text]<strong><a href=\"http:\/\/www.springer.com\/engineering\/signals\/journal\/11036\" target=\"_blank\" rel=\"noopener noreferrer\">Mobile Networks and Applications Journal<\/a><\/strong>, Springer<\/p>\n<ul>\n<li>Special Issue on \u201c<b><a href=\"http:\/\/link.springer.com\/journal\/11036\/19\/1\/page\/1\" target=\"_blank\" rel=\"noopener noreferrer\">Developments in Security and Privacy-preserving mechanisms for Future Mobile Communication Networks<\/a><\/b>\u201d, vol. 19, no. 1, pp. 61-130 (February 2014)<\/li>\n<li>Editorial:<br \/>\n<blockquote><p><cite style=\"font-size: initial;\">Georgios Kambourakis, Gregorio Mart\u00ednez P\u00e9rez, F\u00e9lix G\u00f3mez M\u00e1rmol, \u00ab<strong><a href=\"https:\/\/doi.org\/10.1007\/s11036-013-0487-2\" target=\"_blank\" rel=\"noopener noreferrer\">Editorial: Developments in Security and Privacy-Preserving Mechanisms for Future Mobile Communication Networks<\/a><\/strong>\u00ab, <em><a href=\"http:\/\/www.springer.com\/engineering\/signals\/journal\/11036\" target=\"_blank\" rel=\"noopener noreferrer\">Mobile Networks and Applications Journal<\/a><\/em>, vol. 19, no. 1, pp. 61-63, 2014<\/cite><\/p><\/blockquote>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb4641&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttp:\/\/jwcn.eurasipjournals.springeropen.com\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/3&#8243;][vc_column_text]<strong><a href=\"http:\/\/jwcn.eurasipjournals.springeropen.com\" target=\"_blank\" rel=\"noopener noreferrer\">EURASIP Journal on Wireless Communications and Networking<\/a><\/strong>, Springer<\/p>\n<ul>\n<li>Special Issue on \u201c<b><a href=\"https:\/\/www.springeropen.com\/collections\/ATSPWN\" target=\"_blank\" rel=\"noopener noreferrer\">Advances in Trust, Security and Privacy for Wireless Network<\/a><\/b>\u201d, (December 2013)<\/li>\n<li>Editorial:<br \/>\n<blockquote><p><cite style=\"font-size: initial;\">Yulei Wu, F\u00e9lix G\u00f3mez M\u00e1rmol, Ahmed Al-Dubai, \u00ab<strong><a href=\"https:\/\/doi.org\/10.1186\/1687-1499-2013-287\" target=\"_blank\" rel=\"noopener noreferrer\">Introduction to advances in trust, security, and privacy for wireless networks<\/a><\/strong>\u00ab, <em><a href=\"https:\/\/jwcn-eurasipjournals.springeropen.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">EURASIP Journal on Wireless Communications and Networking<\/a><\/em>, vol. 2013, no. 287, pp. 1-2, 2013<\/cite><\/p><\/blockquote>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb1481&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttps:\/\/www.journals.elsevier.com\/computers-and-electrical-engineering\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/3&#8243;][vc_column_text]<strong><a href=\"https:\/\/www.journals.elsevier.com\/computers-and-electrical-engineering\" target=\"_blank\" rel=\"noopener noreferrer\">Computers &amp; Electrical Engineering<\/a><\/strong>, Elsevier<\/p>\n<ul>\n<li>Special Issue on \u201c<b><a href=\"http:\/\/www.sciencedirect.com\/science\/journal\/00457906\/39\/7\" target=\"_blank\" rel=\"noopener noreferrer\">Recent Advances in Security and Privacy in Distributed Communications<\/a><\/b>\u201d (2nd Edition), vol. 39, no. 7, pp. 1947-2299 (October 2013)<\/li>\n<li>Editorial:<br \/>\n<blockquote><p><cite style=\"font-size: initial;\">Jose M. Alcaraz Calero, F\u00e9lix G\u00f3mez M\u00e1rmol, Gregorio Mart\u00ednez P\u00e9rez, \u00ab<strong><a href=\"https:\/\/doi.org\/10.1016\/j.compeleceng.2013.07.021\" target=\"_blank\" rel=\"noopener noreferrer\">Special issue on Recent Advances in Security and Privacy in Distributed Communications<\/a><\/strong>\u00ab, <em><a href=\"https:\/\/www.journals.elsevier.com\/computers-and-electrical-engineering\" target=\"_blank\" rel=\"noopener noreferrer\">Computers &amp; Electrical Engineering<\/a><\/em>, vol. 39, no. 7, pp. 2231-2232, 2013<\/cite><\/p><\/blockquote>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb1481&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttps:\/\/www.journals.elsevier.com\/computers-and-electrical-engineering\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/3&#8243;][vc_column_text]<strong><a href=\"https:\/\/www.journals.elsevier.com\/computers-and-electrical-engineering\" target=\"_blank\" rel=\"noopener noreferrer\">Computers &amp; Electrical Engineering<\/a><\/strong>, Elsevier<\/p>\n<ul>\n<li>Special Issue on \u201c<b><a href=\"http:\/\/www.sciencedirect.com\/science\/journal\/00457906\/38\/5\" target=\"_blank\" rel=\"noopener noreferrer\">Recent Advances in Security and Privacy in Distributed Communications<\/a><\/b>\u201d, vol. 38, no. 5, pp. 1033-1376 (September 2012)<\/li>\n<li>Editorial:<br \/>\n<blockquote><p><cite style=\"font-size: initial;\">Gregorio Mart\u00ednez P\u00e9rez, F\u00e9lix G\u00f3mez M\u00e1rmol, Jose M. Alcaraz Calero, \u00ab<strong><a href=\"https:\/\/doi.org\/10.1016\/j.compeleceng.2012.07.007\" target=\"_blank\" rel=\"noopener noreferrer\">Introduction to Recent Advances in Security and Privacy in Distributed Communications<\/a><\/strong>\u00ab, <em><a href=\"https:\/\/www.journals.elsevier.com\/computers-and-electrical-engineering\" target=\"_blank\" rel=\"noopener noreferrer\">Computers &amp; Electrical Engineering<\/a><\/em>, vol. 38, no. 5, pp. 1033-1034, 2012<\/cite><\/p><\/blockquote>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column]<h3 class=\"fac-title text-left\" style=\"color:#4b4b4b\">Journals (reviewer)<\/h3>\n[vc_column_text]<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/www.springer.com\/engineering\/journal\/13369\" target=\"_blank\" rel=\"noopener noreferrer\"> Arabian Journal for Science and Engineering<\/a><\/strong>, Springer<\/li>\n<li><strong><a href=\"http:\/\/www.journals.elsevier.com\/computer-communications\" target=\"_blank\" rel=\"noopener noreferrer\"> Computer Communications<\/a><\/strong>, Elsevier<\/li>\n<li><strong><a href=\"http:\/\/www.elsevier.com\/locate\/csi\" target=\"_blank\" rel=\"noopener noreferrer\"> Computer Standards &amp; Interfaces<\/a><\/strong>, Elsevier<\/li>\n<li><strong><a href=\"http:\/\/www.journals.elsevier.com\/computers-and-security\" target=\"_blank\" rel=\"noopener noreferrer\"> Computers &amp; Security<\/a><\/strong>, Elsevier<\/li>\n<li><strong><a href=\"http:\/\/www.mdpi.com\/journal\/entropy\" target=\"_blank\" rel=\"noopener noreferrer\"> Entropy<\/a><\/strong>, MDPI (Multidisciplinary Digital Publishing Institute)<\/li>\n<li><strong><a href=\"http:\/\/ieeeaccess.ieee.org\" target=\"_blank\" rel=\"noopener noreferrer\"> IEEE Access<\/a><\/strong>, IEEE Communications Society<\/li>\n<li><strong><a href=\"http:\/\/www.comsoc.org\/commag\" target=\"_blank\" rel=\"noopener noreferrer\"> IEEE Communications Magazine<\/a><\/strong>, IEEE Communications Society<\/li>\n<li><strong><a href=\"http:\/\/www.computer.org\/pervasive\" target=\"_blank\" rel=\"noopener noreferrer\"> IEEE Pervasive Computing<\/a><\/strong>, IEEE Communications Society<\/li>\n<li><strong><a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/aboutJournal.jsp?punumber=9424\" target=\"_blank\" rel=\"noopener noreferrer\"> IEEE Transactions on Industrial Informatics<\/a><\/strong>, IEEE Communications Society<\/li>\n<li><strong><a href=\"http:\/\/www.computer.org\/portal\/web\/tpds\/home\" target=\"_blank\" rel=\"noopener noreferrer\"> IEEE Transactions on Parallel and Distributed Systems<\/a><\/strong>, IEEE Communications Society<\/li>\n<li><strong><a href=\"http:\/\/dl.comsoc.org\/twc\" target=\"_blank\" rel=\"noopener noreferrer\"> IEEE Transactions on Wireless Communications<\/a><\/strong>, IEEE Communications Society<\/li>\n<li><strong><a href=\"http:\/\/search.ieice.org\/iss\" target=\"_blank\" rel=\"noopener noreferrer\"> IEICE Transactions on Information and Systems<\/a><\/strong>, Institute of Electronics, Information and Communication Engineers (IEICE)<\/li>\n<li><strong><a href=\"http:\/\/www.ietdl.org\/IET-COM\" target=\"_blank\" rel=\"noopener noreferrer\"> IET Communications Journal<\/a><\/strong>, Institution of Engineering and Technology (IET)<\/li>\n<li><strong><a href=\"https:\/\/www.journals.elsevier.com\/information-fusion\" target=\"_blank\" rel=\"noopener noreferrer\"> Information Fusion<\/a><\/strong>, Elsevier<\/li>\n<li><strong><a href=\"http:\/\/www.journals.elsevier.com\/information-sciences\" target=\"_blank\" rel=\"noopener noreferrer\"> Information Sciences<\/a><\/strong>, Elsevier<\/li>\n<li><strong><a href=\"http:\/\/www.tandfonline.com\/loi\/uism20\" target=\"_blank\" rel=\"noopener noreferrer\"> Information Systems Management<\/a><\/strong>, Taylor &amp; Francis Online<\/li>\n<li><strong><a href=\"http:\/\/eu.wiley.com\/WileyCDA\/WileyTitle\/productCd-DAC.html\" target=\"_blank\" rel=\"noopener noreferrer\"> International Journal of Communication Systems<\/a><\/strong>, Wiley<\/li>\n<li><strong><a href=\"http:\/\/www.hindawi.com\/journals\/ijdsn\" target=\"_blank\" rel=\"noopener noreferrer\"> International Journal of Distributed Sensor Networks<\/a><\/strong>, Hindawi<\/li>\n<li><strong><a href=\"http:\/\/www.journals.elsevier.com\/international-journal-of-electrical-power-and-energy-systems\" target=\"_blank\" rel=\"noopener noreferrer\"> International Journal of Electrical Power &amp; Energy Systems<\/a><\/strong>, Elsevier<\/li>\n<li><strong><a href=\"http:\/\/www.inderscience.com\/jhome.php?jcode=ijtmcc\" target=\"_blank\" rel=\"noopener noreferrer\"> International Journal of Trust Management in Computing and Communications<\/a><\/strong>, Inder Science Publishers<\/li>\n<li><strong><a href=\"https:\/\/www.journals.elsevier.com\/journal-of-information-security-and-applications\" target=\"_blank\" rel=\"noopener noreferrer\"> Journal of Information Security and Applications<\/a><\/strong>, Elsevier<\/li>\n<li><strong><a href=\"http:\/\/www.journals.elsevier.com\/journal-of-network-and-computer-applications\" target=\"_blank\" rel=\"noopener noreferrer\"> Journal of Network and Computer Applications<\/a><\/strong>, Elsevier<\/li>\n<li><strong><a href=\"http:\/\/www.springer.com\/computer\/communication+networks\/journal\/10922\" target=\"_blank\" rel=\"noopener noreferrer\"> Journal of Network and Systems Management<\/a><\/strong>, Springer<\/li>\n<li><strong><a href=\"http:\/\/www.journals.elsevier.com\/journal-of-parallel-and-distributed-computing\" target=\"_blank\" rel=\"noopener noreferrer\"> Journal of Parallel and Distributed Computing<\/a><\/strong>, Elsevier<\/li>\n<li><strong><a href=\"http:\/\/www.journals.elsevier.com\/journal-of-systems-and-software\" target=\"_blank\" rel=\"noopener noreferrer\"> Journal of Systems and Software<\/a><\/strong>, Elsevier<\/li>\n<li><strong><a href=\"http:\/\/www.journals.elsevier.com\/knowledge-based-systems\" target=\"_blank\" rel=\"noopener noreferrer\"> Knowledge-Based Systems Journal<\/a><\/strong>, Elsevier<\/li>\n<li><strong><a href=\"http:\/\/www.mdpi.com\/journal\/sensors\" target=\"_blank\" rel=\"noopener noreferrer\"> Sensors<\/a><\/strong>, MDPI (Multidisciplinary Digital Publishing Institute)<\/li>\n<li><strong><a href=\"https:\/\/onlinelibrary.wiley.com\/journal\/1097024x\" target=\"_blank\" rel=\"noopener noreferrer\"> Software: Practice and Experience<\/a><\/strong>, Wiley<\/li>\n<li><strong><a href=\"https:\/\/www.springer.com\/business+%26+management\/business+information+systems\/journal\/11235\" target=\"_blank\" rel=\"noopener noreferrer\"> Telecommunication Systems<\/a><\/strong>, Springer<\/li>\n<li><strong><a href=\"http:\/\/www.springer.com\/engineering\/signals\/journal\/11277\" target=\"_blank\" rel=\"noopener noreferrer\"> Wireless Personal Communications<\/a><\/strong>, Springer<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<p>[vc_row][vc_column]<h3 class=\"fac-title text-left\" style=\"color:#4b4b4b\">Proceedings (editor)<\/h3>\n<br \/>\n[vc_row_inner][vc_column_inner width=\u00bb1\/4&#8243;][vc_single_image image=\u00bb1901&#8243; img_size=\u00bb153X232&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttp:\/\/dx.doi.org\/10.1007\/978-3-642-23496-5&#8243;][\/vc_column_inner][vc_column_inner width=\u00bb1\/4&#8243;][vc_column_text]<\/p>\n<div><strong><a href=\"https:\/\/doi.org\/10.1007\/978-3-642-23496-5\" target=\"_blank\" rel=\"noopener noreferrer\">8th International Conference on Autonomic and Trusted Computing (ATC 2011)<\/a><\/strong>, IEEE Communications Society, LNCS 6906, ISBN 978-3-642-23495-8, Springer, Banff (Canada), 02-04\/09\/2011<\/div>\n<div><strong>Editors:<\/strong><\/div>\n<p>Jose M. Alcaraz Calero, Laurence T. Yang, F\u00e9lix G\u00f3mez M\u00e1rmol, Luis Javier Garc\u00eda Villalba, Andy Xiaolin Li, Yan Wang<br \/>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00bb1\/4&#8243;][vc_single_image image=\u00bb8621&#8243; img_size=\u00bb153X232&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttp:\/\/dx.doi.org\/10.1007\/978-981-10-6898-0&#8243;][\/vc_column_inner][vc_column_inner width=\u00bb1\/4&#8243;][vc_column_text]<\/p>\n<div><strong><a href=\"http:\/\/dx.doi.org\/10.1007\/978-981-10-6898-0\" target=\"_blank\" rel=\"noopener noreferrer\">Fifth International Symposium on Security in Computing and Communications (SSCC&#8217;17)<\/a><\/strong>, CCIS 746, ISBN 978-981-10-6897-3, Springer, Karnataka (India), 13-16\/09\/2017<\/div>\n<div><strong>Editors:<\/strong><\/div>\n<p>Sabu M. Thampi, Gregorio Mart\u00ednez P\u00e9rez, Carlos Becker Westphall, Jiankun Hu, Chun I. Fan, F\u00e9lix G\u00f3mez M\u00e1rmol<br \/>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner]<br \/>\n[\/vc_column][\/vc_row]<\/p>\n<p>[vc_row][vc_column]<h3 class=\"fac-title text-left\" style=\"color:#4b4b4b\">Conferences &amp; workshops (TPC)<\/h3>\n<\/p>\n<p>[vc_tta_tabs][vc_tta_section title=\u00bb2022&#8243; tab_id=\u00bb1537987356027-f197fc7d-2022&#8243;][vc_column_text]<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/2022.jnic.es\" target=\"_blank\" rel=\"noopener noreferrer\">VII Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC 2022)<\/a><\/strong>, Instituto Nacional de Ciberseguridad (INCIBE), Bilbao (Spain), 27-29\/06\/2022<\/li>\n<li><strong><a href=\"https:\/\/www.uni-saarland.de\/lehrstuhl\/sorge\/forschung\/workshopskonferenzen\/acm-sac-2022-track-on-privacy-by-design-in-practice.html\" target=\"_blank\" rel=\"noopener noreferrer\">5th Privacy by Design in Practice Track<\/a><\/strong>, held in conjunction with the <a href=\"https:\/\/www.sigapp.org\/sac\/sac2022\" target=\"_blank\" rel=\"noopener noreferrer\">37th ACM Symposium on Applied Computing (SAC 2022)<\/a>, AMC SIGAPP, Brno (Czech Republic), 25-29\/04\/2022<\/li>\n<li>Special Session <strong><a href=\"https:\/\/pdp2022.infor.uva.es\/specialsessions\/snds\/snds.php\" target=\"_blank\" rel=\"noopener noreferrer\">\u00abSecurity in Parallel, Distributed and Network-Based Computing (SPDNS 2022)\u00bb<\/a><\/strong>, on <a href=\"https:\/\/pdp2022.infor.uva.es\/\" target=\"_blank\" rel=\"noopener noreferrer\">30th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2022)<\/a>, Valladolid (Spain), 09-11\/03\/2022<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section]<br \/>\n[vc_tta_section title=\u00bb2021&#8243; tab_id=\u00bb1537987356027-f197fc7d-hd42&#8243;][vc_column_text]<\/p>\n<ul>\n<li><strong><a href=\"https:\/\/grid.cs.gsu.edu\/~smartworld2021\/atc\" target=\"_blank\" rel=\"noopener noreferrer\">18th IEEE International Conference on Advanced and Trusted Computing (ATC 2021)<\/a><\/strong>, IEEE Communications Society, Atlanta (USA), 18-21\/10\/2021<\/li>\n<li><strong><a href=\"https:\/\/www.ares-conference.eu\/workshops\/csa-2021\/\" target=\"_blank\" rel=\"noopener noreferrer\">2nd Workshop on Recent Advances in Cyber Situational Awareness on Military Operations (CSA 2021)<\/a><\/strong>, held in conjunction with the <a href=\"https:\/\/www.ares-conference.eu\/\" target=\"_blank\" rel=\"noopener noreferrer\">16th International Conference on Availability, Reliability and Security (ARES 2021)<\/a>, 17-20\/08\/2021<\/li>\n<li><strong><a href=\"https:\/\/aiblock.compute.dtu.dk\/2021\" target=\"_blank\" rel=\"noopener noreferrer\">3rd International Workshop on Application Intelligence and Blockchain Security (AIBlock 2021)<\/a><\/strong>, held in conjunction with the <a href=\"http:\/\/sulab-sever.u-aizu.ac.jp\/ACNS2021\" target=\"_blank\" rel=\"noopener noreferrer\">19th International Conference on Applied Cryptography and Network Security (ACNS 2021)<\/a>, Kamakura (Japan), 21-24\/06\/2021<\/li>\n<li><strong><a href=\"http:\/\/2021.jnic.es\" target=\"_blank\" rel=\"noopener noreferrer\">VI Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC 2021)<\/a><\/strong>, Instituto Nacional de Ciberseguridad (INCIBE), Ciudad Real (Spain), 09-11\/06\/2021<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bb2020&#8243; tab_id=\u00bb1537987356027-f197fc7d-af1b\u00bb][vc_column_text]<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/www.swinflow.org\/confs\/2020\/atc\" target=\"_blank\" rel=\"noopener noreferrer\">17th IEEE International Conference on Advanced and Trusted Computing (ATC 2020)<\/a><\/strong>, IEEE Communications Society, Melbourne (Australia), 08-10\/12\/2020<\/li>\n<li><strong><a href=\"https:\/\/www.ares-conference.eu\/workshops\/csa-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">First Workshop on Recent Advances in Cyber Situational Awareness on Military Operations (CSA 2020)<\/a><\/strong>, held in conjunction with the <a href=\"https:\/\/www.ares-conference.eu\/\" target=\"_blank\" rel=\"noopener noreferrer\">15th International Conference on Availability, Reliability and Security (ARES 2020)<\/a>, Dublin (Ireland), 24-28\/08\/2020<\/li>\n<li><strong><a href=\"https:\/\/www.cs.bgu.ac.il\/~ifiptm20\" target=\"_blank\" rel=\"noopener noreferrer\">14th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2020)<\/a><\/strong>, International Federation for Information Processing (IFIP), Tel-Aviv (Israel), 29\/06\/2020 &#8211; 01\/07\/2020<\/li>\n<li><strong><a href=\"http:\/\/aiblock2020.compute.dtu.dk\" target=\"_blank\" rel=\"noopener noreferrer\">2nd International Workshop on Application Intelligence and Blockchain Security (AIBlock)<\/a><\/strong>, held in conjunction with the <a href=\"https:\/\/sites.google.com\/di.uniroma1.it\/ACNS2020\" target=\"_blank\" rel=\"noopener noreferrer\">18th International Conference on Applied Cryptography and Network Security (ACNS 2020)<\/a>, Rome (Italy), 22-25\/06\/2020<\/li>\n<li><strong><a href=\"http:\/\/2020.jnic.es\" target=\"_blank\" rel=\"noopener noreferrer\">VI Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC 2020)<\/a><\/strong>, Instituto Nacional de Ciberseguridad (INCIBE), Ciudad Real (Spain), 03-05\/06\/2020<\/li>\n<li><strong><a href=\"https:\/\/www.uni-saarland.de\/index.php?id=61098\" target=\"_blank\" rel=\"noopener noreferrer\">3rd Privacy by Design in Practice Track<\/a><\/strong>, held in conjunction with the <a href=\"https:\/\/www.sigapp.org\/sac\/sac2020\" target=\"_blank\" rel=\"noopener noreferrer\">35th ACM Symposium on Applied Computing (SAC 2020)<\/a>, AMC SIGAPP, Brno (Czech Republic), 30\/03\/2020-03\/04\/2020<\/li>\n<li>Special Session <strong><a href=\"http:\/\/www.pdp2020.com\/specialsessions\/snds\/snds.html\" target=\"_blank\" rel=\"noopener noreferrer\">\u00abSecurity in Parallel, Distributed and Network-Based Computing (SPDNS 2020)\u00bb<\/a><\/strong>, on <a href=\"http:\/\/www.pdp2020.com\" target=\"_blank\" rel=\"noopener noreferrer\">28th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2020)<\/a>, Vasteras (Sweden), 11-13\/03\/2020<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section]<br \/>\n[vc_tta_section title=\u00bb2019&#8243; tab_id=\u00bb1537987356027-c39c4683-d4b6&#8243;][vc_column_text]<\/p>\n<ul>\n<li><strong><a href=\"https:\/\/conference.cs.cityu.edu.hk\/dsc2019\" target=\"_blank\" rel=\"noopener noreferrer\">2019 IEEE Conference on Dependable and Secure Computing (DSC 2019)<\/a><\/strong>, IEEE Communications Society, Hangzhou (China), 18-20\/11\/2019<\/li>\n<li><strong><a href=\"http:\/\/ml4cs2019.xidian.edu.cn\" target=\"_blank\" rel=\"noopener noreferrer\">2nd International Conference on Machine Learning for Cyber Security (ML4CS 2019)<\/a><\/strong>, Xi&#8217;an (China), 19-22\/09\/2019<\/li>\n<li><strong><a href=\"http:\/\/www.smart-world.org\/2019\/atc\" target=\"_blank\" rel=\"noopener noreferrer\">16th IEEE International Conference on Advanced and Trusted Computing (ATC 2019)<\/a><\/strong>, IEEE Communications Society, Leicester (UK), 19-23\/08\/2019<\/li>\n<li><strong><a href=\"https:\/\/crow.org.nz\/TrustCom2019\" target=\"_blank\" rel=\"noopener noreferrer\">18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2019)<\/a><\/strong>, IEEE Communications Society, Rotorua (New Zealand), 05-08\/08\/2019<\/li>\n<li><strong><a href=\"http:\/\/icccn.org\/icccn19\" target=\"_blank\" rel=\"noopener noreferrer\">28th International Conference on Computer Communications and Networks (ICCCN 2019)<\/a><\/strong>, IEEE Communications Society, Valencia (Spain), 29\/07\/2019 &#8211; 01\/08\/2019<\/li>\n<li><strong><a href=\"http:\/\/ifiptm2019.compute.dtu.dk\/IFIPTM19\" target=\"_blank\" rel=\"noopener noreferrer\">13th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2019)<\/a><\/strong>, International Federation for Information Processing (IFIP), Copenhagen (Denmark), 17-19\/07\/2019<\/li>\n<li><strong><a href=\"http:\/\/nsclab.org\/socialsec2019\" target=\"_blank\" rel=\"noopener noreferrer\">5th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2019)<\/a><\/strong>, Copenhagen (Denmark), 14-17\/07\/2019<\/li>\n<li><strong><a href=\"http:\/\/aiblock2019.compute.dtu.dk\" target=\"_blank\" rel=\"noopener noreferrer\">1st International Workshop on Application Intelligence and Blockchain Security (AIBlock)<\/a><\/strong>, held in conjunction with the <a href=\"http:\/\/www.acns19.com\" target=\"_blank\" rel=\"noopener noreferrer\">17th International Conference on Applied Cryptography and Network Security (ACNS 2019)<\/a>, Bogot\u00e1 (Colombia), 05-07\/06\/2019<\/li>\n<li><strong><a href=\"http:\/\/2019.jnic.es\" target=\"_blank\" rel=\"noopener noreferrer\">V Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC 2019)<\/a><\/strong>, Instituto Nacional de Ciberseguridad (INCIBE), C\u00e1ceres (Spain), 05-07\/06\/2019<\/li>\n<li><strong><a href=\"https:\/\/www.uni-saarland.de\/index.php?id=57274\" target=\"_blank\" rel=\"noopener noreferrer\">2nd Privacy by Design in Practice Track<\/a><\/strong>, held in conjunction with the <a href=\"https:\/\/www.sigapp.org\/sac\/sac2019\" target=\"_blank\" rel=\"noopener noreferrer\">34th ACM Symposium on Applied Computing (SAC 2019)<\/a>, AMC SIGAPP, Limassol (Cyprus), 08-12\/04\/2019<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section]<br \/>\n[vc_tta_section title=\u00bb2018&#8243; tab_id=\u00bb1496222134808-6c085b18-9be7&#8243;][vc_column_text]<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/www.smart-world.org\/2018\/atc\/\" target=\"_blank\" rel=\"noopener noreferrer\">15th IEEE International Conference on Advanced and Trusted Computing (ATC 2018)<\/a><\/strong>, IEEE Communications Society, Guangzhou (China), 08-12\/10\/2018<\/li>\n<li><strong><a href=\"http:\/\/icacci-conference.org\/2018\/isi-home\" target=\"_blank\" rel=\"noopener noreferrer\">Sixth International Symposium on Intelligent Informatics (ISI\u201918)<\/a><\/strong>, IEEE Communications Society, Bangalore (India), 19-22\/09\/2018<\/li>\n<li><strong><a href=\"http:\/\/research-uob.org\/mobiapps-18\" target=\"_blank\" rel=\"noopener noreferrer\">5th International Workshop on Mobile Applications (MobiApps 2018)<\/a><\/strong>, IEEE Communications Society, Barcelona (Spain), 06-08\/08\/2018<\/li>\n<li><strong><a href=\"http:\/\/2018.jnic.es\" target=\"_blank\" rel=\"noopener noreferrer\">IV Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC 2018)<\/a><\/strong>, Instituto Nacional de Ciberseguridad (INCIBE), San Sebasti\u00e1n (Spain), 13-15\/06\/2018<\/li>\n<li>Special Session on <strong><a href=\"https:\/\/icps2018.net\/netcat_files\/userfiles\/callforpapers\/SS-ICPS18-8-SecurityforIndustrialCyber-PhysicalSystems.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u00abSecurity for Industrial Cyber-Physical Systems\u00bb<\/a><\/strong>, <a href=\"https:\/\/icps2018.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">1st IEEE International Conference on Industrial Cyber-Physical Systems (ICPS 2018)<\/a>, IEEE Communications Society, Saint\u2011Petersburg (Russia), 15-18\/05\/2018<\/li>\n<li><strong><a href=\"http:\/\/wcnc2018.ieee-wcnc.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">IEEE Wireless Communications and Networking Conference (WCNC&#8217;2018)<\/a><\/strong>, Track 3 Wireless Networks, IEEE Communications Society, Barcelona (Spain), 15-18\/04\/2018<\/li>\n<li><strong><a href=\"https:\/\/www.sigapp.org\/sac\/sac2018\/tracks.html\" target=\"_blank\" rel=\"noopener noreferrer\">1st Privacy by Design in Practice Track<\/a><\/strong>, held in conjunction with the <a href=\"https:\/\/www.sigapp.org\/sac\/sac2018\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">33rd ACM Symposium on Applied Computing (SAC 2018)<\/a>, AMC SIGAPP, Pau (France), 09-13\/04\/2018<\/li>\n<li>Special Session <strong><a href=\"http:\/\/www.comsec.spb.ru\/spdns18\" target=\"_blank\" rel=\"noopener noreferrer\">\u00abSecurity in Parallel, Distributed and Network-Based Computing (SPDNS 2018)\u00bb<\/a><\/strong>, on <a href=\"http:\/\/www.pdp2018.org\" target=\"_blank\" rel=\"noopener noreferrer\">26th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2018)<\/a>, Cambridge (UK), 21-23\/03\/2018<\/li>\n<li><strong><a href=\"http:\/\/ccnc2018.ieee-ccnc.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">15th IEEE Consumer Communications and Networking Conference (CCNC&#8217;2018)<\/a><\/strong>, Security, Privacy and Content Protection, IEEE Communications Society, Las Vegas (USA), 12-15\/01\/2018<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bb2017&#8243; tab_id=\u00bb1491590127059-417bfbc3-e71a\u00bb][vc_column_text]<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/trust.gzhu.edu.cn\/conference\/SpaCCS2017\" target=\"_blank\" rel=\"noopener noreferrer\">10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2017)<\/a><\/strong>, Guangzhou (China), 12-15\/12\/2017 <b>[Steering committee]<\/b><\/li>\n<li><a href=\"http:\/\/cns2017.ieee-cns.org\/workshop\/cps-sec-international-workshop-cyber-physical-systems-security\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>IEEE International Workshop on Cyber-Physical Systems Security (CPS-Sec)<\/strong><\/a>, held in conjunction with the <a href=\"http:\/\/cns2017.ieee-cns.org\" target=\"_blank\" rel=\"noopener noreferrer\">IEEE Conference on Communications and Network Security (IEEE CNS)<\/a>, IEEE Communications Society, Las Vegas (USA), 09-11\/10\/2017<\/li>\n<li><strong><a href=\"http:\/\/www.acn-conference.org\/sscc2017\" target=\"_blank\" rel=\"noopener noreferrer\">Fifth International Symposium on Security in Computing and Communications (SSCC&#8217;17)<\/a><\/strong>, Karnataka (India), 13-16\/09\/2017 <b>[Program vice-chair]<\/b><\/li>\n<li><strong><a href=\"http:\/\/ieee-smartworld.org\/2017\/atc\" target=\"_blank\" rel=\"noopener noreferrer\">14th IEEE International Conference on Advanced and Trusted Computing (ATC 2017)<\/a><\/strong>, IEEE Communications Society, San Francisco (USA), 04-08\/08\/2017<\/li>\n<li><strong><a href=\"http:\/\/stprp-activity.com\/TrustCom2017\" target=\"_blank\" rel=\"noopener noreferrer\">16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17)<\/a><\/strong>, IEEE Communications Society, Sidney (Australia), 01-04\/08\/2017<\/li>\n<li><strong><a href=\"http:\/\/www.massey.ac.nz\/acisp2017\" target=\"_blank\" rel=\"noopener noreferrer\">22nd Australasian Conference on Information Security and Privacy (ACISP 2017)<\/a><\/strong>, Auckland (New Zealand), 10-12\/07\/2017<\/li>\n<li><strong><a href=\"http:\/\/icc2017.ieee-icc.org\/call-workshop-papers\" target=\"_blank\" rel=\"noopener noreferrer\">5th IEEE International Workshop on Smart Communication Protocols and Algorithms (SCPA 2017)<\/a><\/strong>, held in conjunction with the <a href=\"http:\/\/icc2017.ieee-icc.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">IEEE International Conference on Communications (IEEE ICC2017)<\/a>, IEEE Communications Society, Paris (France), 21-25\/05\/2017<\/li>\n<li><strong><a href=\"http:\/\/icsd.i2r.a-star.edu.sg\/cpss17\" target=\"_blank\" rel=\"noopener noreferrer\">3rd ACM Cyber-Physical System Security Workshop (CPSS 2017)<\/a><\/strong>, held in conjunction with the <a href=\"http:\/\/asiaccs2017.com\" target=\"_blank\" rel=\"noopener noreferrer\">ACM AsiaCCS&#8217;17<\/a>, ACM, Abu Dhabi (United Arab Emirates), 02-06\/04\/2017<\/li>\n<li><strong><a href=\"https:\/\/conference.cs.cityu.edu.hk\/asiaccsscc\" target=\"_blank\" rel=\"noopener noreferrer\">5th International Workshop on Security in Cloud Computing (AsiaCCS-SCC 2017)<\/a><\/strong>, held in conjunction with the <a href=\"http:\/\/asiaccs2017.com\" target=\"_blank\" rel=\"noopener noreferrer\">ACM AsiaCCS&#8217;17<\/a>, ACM, Abu Dhabi (United Arab Emirates), 02-06\/04\/2017<\/li>\n<li><strong><a href=\"http:\/\/ccnc2017.ieee-ccnc.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">14th IEEE Consumer Communications and Networking Conference (CCNC&#8217;2017)<\/a><\/strong>, Security, Privacy and Content Protection, IEEE Communications Society, Las Vegas (USA), 08-11\/01\/2017<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bb2016&#8243; tab_id=\u00bb1491590127061-b10f2f84-0420&#8243;][vc_column_text]<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/iciss16.mnit.ac.in\/\" target=\"_blank\" rel=\"noopener noreferrer\">12th International Conference on Information Systems Security (ICISS 2016)<\/a><\/strong>, MNIT, Jaipur (India), 16-20\/12\/2016<\/li>\n<li><strong><a href=\"http:\/\/spvan.org\/2016\/show\/home\" target=\"_blank\" rel=\"noopener noreferrer\">1st EAI International Conference on Security and Privacy in Vehicular Network (SPVAN 2016)<\/a><\/strong>, European Alliance for Innovation, Madrid (Spain), 17-18\/11\/2016<\/li>\n<li><strong><a href=\"http:\/\/trust.csu.edu.cn\/conference\/SpaCCS2016\" target=\"_blank\" rel=\"noopener noreferrer\">9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)<\/a><\/strong>, Zhangjiajie (China), 16-18\/11\/2016 <b>[General co-chair]<\/b><\/li>\n<li><strong><a href=\"http:\/\/icacci-conference.org\/2016\" target=\"_blank\" rel=\"noopener noreferrer\">5th International Conference on Advances in Computing, Communications and Informatics (ICACCI 2016)<\/a><\/strong>, Industry Track, Jaipur (India), 21-24\/09\/2016<\/li>\n<li><strong><a href=\"http:\/\/ifiptm2016.tk.informatik.tu-darmstadt.de\/\" target=\"_blank\" rel=\"noopener noreferrer\">10th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2016)<\/a><\/strong>, International Federation for Information Processing (IFIP), Darmstadt (Germany), 18-22\/07\/2016<\/li>\n<li><strong><a href=\"http:\/\/atc2016.sciencesconf.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">13th IEEE International Conference on Advanced and Trusted Computing (ATC 2016)<\/a><\/strong>, Track 8: Trust, Securiy, and Privacy in Social Networks, IEEE Communications Society, Toulouse (France), 18-21\/07\/2016 <b>[Program co-chair]<\/b><\/li>\n<li><strong><a href=\"http:\/\/nsclab.org\/acisp2016\" target=\"_blank\" rel=\"noopener noreferrer\">21st Australasian Conference on Information Security and Privacy (ACISP 2016)<\/a><\/strong>, Melbourne (Australia), 04-06\/07\/2016<\/li>\n<li><strong><a href=\"http:\/\/icsd.i2r.a-star.edu.sg\/cpss16\" target=\"_blank\" rel=\"noopener noreferrer\">2nd Cyber-Physical System Security Workshop (CPSS 2016)<\/a><\/strong>, held in conjunction with the <a href=\"http:\/\/meeting.xidian.edu.cn\/conference\/AsiaCCS2016\" target=\"_blank\" rel=\"noopener noreferrer\">ACM AsiaCCS&#8217;16<\/a>, ACM, Xi&#8217;an (China), 31\/05\/2016<\/li>\n<li><strong><a href=\"http:\/\/ccnc2016.ieee-ccnc.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">13th IEEE Consumer Communications and Networking Conference (CCNC&#8217;2016)<\/a><\/strong>, Security, Privacy and Content Protection, IEEE Communications Society, Las Vegas (USA), 09-12\/01\/2016<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bb2015&#8243; tab_id=\u00bb1491735921755-01a68948-3b5d\u00bb][vc_column_text]<\/p>\n<ul>\n<li><strong><a href=\"https:\/\/research.comnet.aalto.fi\/Trustcom2015\/spaiot2015\" target=\"_blank\" rel=\"noopener noreferrer\">8th IEEE International Symposium on Security, Privacy and Anonymity in Internet of Things (SpaIoT 2015)<\/a><\/strong>, in conjunction with the <a href=\"https:\/\/research.comnet.aalto.fi\/Trustcom2015\" target=\"_blank\" rel=\"noopener noreferrer\">14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2015)<\/a>, IEEE Communications Society, Helsinki (Finland), 20-22\/08\/2015 <b>[Program co-chair]<\/b><\/li>\n<li><strong><a href=\"http:\/\/icacci-conference.org\/web\" target=\"_blank\" rel=\"noopener noreferrer\">4th International Conference on Advances in Computing, Communications and Informatics (ICACCI 2015)<\/a><\/strong>, <a href=\"http:\/\/icacci-conference.org\/web\/AFL-2015\" target=\"_blank\" rel=\"noopener noreferrer\">Special Session on Authorship Analysis in Forensic Linguistics<\/a>, Kerala (India), 10-13\/08\/2015<\/li>\n<li><strong><a href=\"http:\/\/icacci-conference.org\/web\" target=\"_blank\" rel=\"noopener noreferrer\">4th International Conference on Advances in Computing, Communications and Informatics (ICACCI 2015)<\/a><\/strong>, <a href=\"http:\/\/icacci-conference.org\/web\/industrytrack\" target=\"_blank\" rel=\"noopener noreferrer\">Industry Track<\/a>, Kerala (India), 10-13\/08\/2015<\/li>\n<li><strong><a href=\"http:\/\/www.ntms-conf.org\/ntms-2015\" target=\"_blank\" rel=\"noopener noreferrer\">7th IFIP International Conference on New Technologies, Mobility and Security (NTMS&#8217;15)<\/a><\/strong>, International Federation for Information Processing (IFIP), Paris (France), 26-29\/07\/2015 <b>[Security Track co-chair]<\/b><\/li>\n<li><strong><a href=\"http:\/\/jlloret.webs.upv.es\/sspa2015\" target=\"_blank\" rel=\"noopener noreferrer\">3rd International Workshop on Smart Sensor Protocols and Algorithms (SSPA 2015)<\/a><\/strong>, International Federation for Information Processing (IFIP), Novi Sad (Serbia), 23-25\/06\/2015<\/li>\n<li><strong><a href=\"http:\/\/scpa.it.ubi.pt\/2015\" target=\"_blank\" rel=\"noopener noreferrer\">4th IEEE International Workshop on Smart Communication Protocols and Algorithms (SCPA 2015)<\/a><\/strong>, held in conjunction with the <a href=\"http:\/\/icc2015.ieee-icc.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">IEEE International Conference on Communications (ICC 2015)<\/a>, IEEE Communications Society, London (UK), 08-12\/06\/2015<\/li>\n<li><strong><a href=\"http:\/\/icsd.i2r.a-star.edu.sg\/ispec2015\" target=\"_blank\" rel=\"noopener noreferrer\">11th International Conference on Information Security Practice and Experience (ISPEC 2015)<\/a><\/strong>, Beijing (China), 05-08\/05\/2015<\/li>\n<li><strong><a href=\"http:\/\/conference.cs.cityu.edu.hk\/asiaccsscc\" target=\"_blank\" rel=\"noopener noreferrer\">3rd International Workshop on Security in Cloud Computing<\/a><\/strong>, held in conjunction with the <a href=\"http:\/\/icsd.i2r.a-star.edu.sg\/asiaccs15\" target=\"_blank\" rel=\"noopener noreferrer\">ACM AsiaCCS&#8217;15<\/a>, ACM, Singapore, 14-17\/04\/2015<\/li>\n<li><strong><a href=\"http:\/\/icsd.i2r.a-star.edu.sg\/cpss15\" target=\"_blank\" rel=\"noopener noreferrer\">1st Cyber-Physical System Security Workshop (CPSS 2015)<\/a><\/strong>, held in conjunction with the <a href=\"http:\/\/icsd.i2r.a-star.edu.sg\/asiaccs15\" target=\"_blank\" rel=\"noopener noreferrer\">ACM AsiaCCS&#8217;15<\/a>, ACM, Singapore, 14-17\/04\/2015<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bb2014&#8243; tab_id=\u00bb1491736036831-e6859ff5-52a2&#8243;][vc_column_text]<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/cse.stfx.ca\/%7Eatc2014\" target=\"_blank\" rel=\"noopener noreferrer\">11th IEEE International Conference on Autonomic and Trusted Computing (ATC 2014)<\/a><\/strong>, IEEE Communications Society, Bali (Indonesia), 09-12\/12\/2014<\/li>\n<li><strong><a href=\"http:\/\/icacci-conference.org\" target=\"_blank\" rel=\"noopener noreferrer\">3rd International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014)<\/a><\/strong>, Dehli (India), 24-27\/09\/2014<\/li>\n<li><strong><a href=\"http:\/\/trust.csu.edu.cn\/conference\/SpaIoT2014\" target=\"_blank\" rel=\"noopener noreferrer\">7th IEEE International Symposium on Security, Privacy and Anonymity in Internet of Things (SpaIoT 2014)<\/a><\/strong>, in conjunction with the <a href=\"http:\/\/www.greenorbs.org\/TrustCom2014\" target=\"_blank\" rel=\"noopener noreferrer\">13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014)<\/a>, IEEE Communications Society, Beijing (China), 24-26\/09\/2014 <b>[Program co-chair]<\/b><\/li>\n<li><strong><a href=\"http:\/\/conference.css2014.studiocheik.fr\/\" target=\"_blank\" rel=\"noopener noreferrer\">6th International Symposium on Cyberspace Safety and Security (CSS 2014)<\/a><\/strong>, Paris (France), 20-22\/08\/2014<\/li>\n<li><strong><a href=\"https:\/\/sites.google.com\/site\/conferencesandworkshops\" target=\"_blank\" rel=\"noopener noreferrer\">International Workshop on Security, Privacy and Trust for Wireless Networks (SPTWN-2014)<\/a><\/strong>, in conjunction with the <a href=\"http:\/\/cs-conferences.acadiau.ca\/ant-14\" target=\"_blank\" rel=\"noopener noreferrer\">Fifth International Conference on Ambient Systems, Networks and Technologies, (ANT 2014)<\/a>, Hasselt (Belgium), 02-05\/06\/2014<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bb2013&#8243; tab_id=\u00bb1491756796278-9f24c724-4fac\u00bb][vc_column_text]<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/cse.stfx.ca\/%7Eatc2013\" target=\"_blank\" rel=\"noopener noreferrer\">10th IEEE International Conference on Autonomic and Trusted Computing (ATC 2013)<\/a><\/strong>, IEEE Communications Society, Sorrento Peninsula (Italy), 18-21\/12\/2013<\/li>\n<li><strong><a href=\"http:\/\/2013.cloudcom.org\" target=\"_blank\" rel=\"noopener noreferrer\">5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom)<\/a><\/strong>, IEEE Communications Society, Bristol (UK), 02-05\/12\/2013<\/li>\n<li><strong><a href=\"http:\/\/trust.csu.edu.cn\/conference\/TSP2013\" target=\"_blank\" rel=\"noopener noreferrer\"> Fourth IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-13)<\/a><\/strong>, in conjunction with <a href=\"http:\/\/trust.csu.edu.cn\/conference\/hpcc2013\" target=\"_blank\" rel=\"noopener noreferrer\">15th IEEE International Conference on High Performance Computing and Communications (HPCC-2013)<\/a>, IEEE Communications Society, Zhangjiajie (China), 13-15\/11\/2013 <b>[Program co-chair]<\/b><\/li>\n<li><strong><a href=\"http:\/\/trust.csu.edu.cn\/conference\/hpcc2013\" target=\"_blank\" rel=\"noopener noreferrer\">15th IEEE International Conference on High Performance Computing and Communications (HPCC-2013)<\/a><\/strong>, IEEE Communications Society, Zhangjiajie (China), 13-15\/11\/2013 <b>[Workshop co-chair]<\/b><\/li>\n<li><strong><a href=\"http:\/\/icacci-conference.org\/site\" target=\"_blank\" rel=\"noopener noreferrer\">2nd International Conference on Advances in Computing, Communications and Informatics (ICACCI-2013)<\/a><\/strong>, Mysore (India), 22-25\/08\/2013<\/li>\n<li><strong><a href=\"http:\/\/trust.csu.edu.cn\/conference\/SPIoT2013\" target=\"_blank\" rel=\"noopener noreferrer\">3rd IEEE International Symposium on Security and Privacy in Internet of Things (IEEE SPIoT 2013)<\/a><\/strong>, IEEE Communications Society, Melbourne (Australia), 16-18\/07\/2013 <b>[General co-chair]<\/b><\/li>\n<li><strong><a href=\"http:\/\/www.iwcmc.org\/2013\" target=\"_blank\" rel=\"noopener noreferrer\">IWCMC 2013, The 9th International Wireless Communications and Mobile Computing Conference<\/a><\/strong>, <a href=\"http:\/\/iwcmc.org\/2013\/tracks\/symposia\" target=\"_blank\" rel=\"noopener noreferrer\">Trust, Privacy and Security Symposium<\/a>, Cagliari (Italy), 01-05\/07\/2013<\/li>\n<li><strong><a href=\"http:\/\/www.ieee-icc.org\/2013\" target=\"_blank\" rel=\"noopener noreferrer\">3rd IEEE International Workshop on Smart Communication Protocols and Algorithms (SCPA 2013)<\/a><\/strong>, to be held in conjunction with IEEE ICC 2013, IEEE International Conference on Communications, IEEE Communications Society, Budapest (Hungary), 09-13\/06\/2013<\/li>\n<li><strong><a href=\"http:\/\/conf2013.ifiptm.org\" target=\"_blank\" rel=\"noopener noreferrer\">7th International Conference on Trust Management (IFIPTM&#8217;13)<\/a><\/strong>, International Federation for Information Processing (IFIP), Malaga (Spain), 03-07\/06\/2013<\/li>\n<li><strong><a href=\"http:\/\/www.nprg.ncsu.edu\/evn-sga\" target=\"_blank\" rel=\"noopener noreferrer\">1st IEEE Workshop on Electric Vehicle Networks for Smart Grid Applications (EVN-SGA 2013)<\/a><\/strong>, to be held in conjunction with the <a href=\"http:\/\/www.ieeevtc.org\/vtc2013spring\" target=\"_blank\" rel=\"noopener noreferrer\">IEEE 77th Vehicular Technology Conference: VTC2013-Spring<\/a>, IEEE Communications Society, Dresden (Germany), 02-05\/06\/2013<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bb2012&#8243; tab_id=\u00bb1491756838646-37d4aeda-e1fd\u00bb][vc_column_text]<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/www.iccve.org\" target=\"_blank\" rel=\"noopener noreferrer\">1st International Conference on Connected Vehicles &amp; Expo (ICCVE 2012)<\/a><\/strong>, ACM\/IEEE\/IFAC\/TRB, Beijing (China), 12-16\/12\/2012<\/li>\n<li><strong><a href=\"http:\/\/cse.stfx.ca\/%7Edasc2012\" target=\"_blank\" rel=\"noopener noreferrer\">10th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2012)<\/a><\/strong>, IEEE Communications Society, Changzhou (China), 10-13\/12\/2012 <b>[Program vice-chair]<\/b><\/li>\n<li><strong><a href=\"http:\/\/www.ieee-globecom.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">IEEE Globecom 2012, Communication and Information System Security Symposium<\/a><\/strong>, IEEE Communications Society, Anaheim, California (USA), 03-07\/12\/2012<\/li>\n<li><strong><a href=\"http:\/\/scpa.it.ubi.pt\/2012\" target=\"_blank\" rel=\"noopener noreferrer\">3rd IEEE International Workshop on Smart Communication Protocols and Algorithms &#8211; Winter, (SCPA 2012)<\/a><\/strong>, to be held in conjunction with IEEE Globecom 2012, IEEE Communications Society, Anaheim, California (USA), 03-07\/12\/2012 <b>[Industrial co-chair]<\/b><\/li>\n<li><strong><a href=\"http:\/\/www.iaria.org\/conferences2012\/ICSNC12.html\" target=\"_blank\" rel=\"noopener noreferrer\">ICSNC12, 7th International Conference on Systems and Networks Communications, SESYS Track<\/a><\/strong>, International Academy, Research, and Industry Association (IARIA), Lisbon (Portugal), 18-23\/11\/2012<\/li>\n<li><strong><a href=\"http:\/\/www.greenets.org\/2012\" target=\"_blank\" rel=\"noopener noreferrer\">Second International Conference on Green Communications and Networking (GreenNets-12)<\/a><\/strong>, European Alliance for Innovation, Gand\u00eda (Spain), 24-26\/10\/2012<\/li>\n<li><strong><a href=\"http:\/\/conf.kyusan-u.ac.jp\/atc2012\" target=\"_blank\" rel=\"noopener noreferrer\">9th IEEE International Conference on Autonomic and Trusted Computing (ATC 2012)<\/a><\/strong>, IEEE Communications Society, Fukuoka (Japan), 04-07\/09\/2012<\/li>\n<li><strong><a href=\"http:\/\/cs-conferences.acadiau.ca\/ant-12\" target=\"_blank\" rel=\"noopener noreferrer\">3rd International Conference on Ambient Systems, Networks and Technologies (ANT-2012)<\/a><\/strong>, Niagara Falls, Ontario (Canada), 27-29\/08\/2012<\/li>\n<li><strong><a href=\"http:\/\/web.ftrai.org\/dfis2012\" target=\"_blank\" rel=\"noopener noreferrer\">6th International Symposium on Digital Forensics and Information Security (DFIS-12)<\/a><\/strong>, Future Technology Research Association International, Vancouver (Canada), 26-28\/06\/2012<\/li>\n<li><strong><a href=\"http:\/\/scim.brad.ac.uk\/%7Ehmibrahi\/TrustCom2012\" target=\"_blank\" rel=\"noopener noreferrer\">11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12)<\/a><\/strong>, IEEE Communications Society, Liverpool (UK), 25-27\/06\/2012 <b>[General co-chair]<\/b><\/li>\n<li><strong><a href=\"http:\/\/ants.dif.um.es\/%7Efelixgm\/research\/ieee-egssn\/12\" target=\"_blank\" rel=\"noopener noreferrer\">1st IEEE International Workshop on Trust, Security and Privacy in e-Government, e-Systems &amp; Social Networking (eGSSN-12)<\/a><\/strong>, IEEE Communications Society, Liverpool (UK), 25-27\/06\/2012 <b>[General co-chair]<\/b><\/li>\n<li><strong><a href=\"http:\/\/trust.csu.edu.cn\/conference\/SPIoT2012\" target=\"_blank\" rel=\"noopener noreferrer\">2nd IEEE International Symposium on Security and Privacy in Internet of Things (IEEE SPIoT 2012)<\/a><\/strong>, IEEE Communications Society, Liverpool (UK), 25-27\/06\/2012 <b>[General co-chair]<\/b><\/li>\n<li><strong><a href=\"http:\/\/scim.brad.ac.uk\/%7Ehmibrahi\/HPCC2012\" target=\"_blank\" rel=\"noopener noreferrer\">14th IEEE International Conference on High Performance Computing and Communications (HPCC-2012)<\/a><\/strong>, IEEE Communications Society, Liverpool (UK), 25-27\/06\/2012 <b>[Publicity co-chair]<\/b><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bb2011&#8243; tab_id=\u00bb1491756875165-9b8760b1-b92a\u00bb][vc_column_text]<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/trust.csu.edu.cn\/conference\/trustcom2011\" target=\"_blank\" rel=\"noopener noreferrer\">10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11)<\/a><\/strong>, IEEE Communications Society, Changsha (China), 16-18\/11\/2011 <b>[Publicity co-chair]<\/b><\/li>\n<li><strong><a href=\"http:\/\/www.iaria.org\/conferences2011\/ICSNC11.html\" target=\"_blank\" rel=\"noopener noreferrer\">ICSNC11, 6th International Conference on Systems and Networks Communications, SESYS Track<\/a><\/strong>, International Academy, Research, and Industry Association (IARIA), Barcelona (Spain), 23-28\/10\/2011<\/li>\n<li><strong><a href=\"http:\/\/voyager.ce.fit.ac.jp\/%7Eeidwt2011\" target=\"_blank\" rel=\"noopener noreferrer\">EIDWT 2011, The 2nd International Conference on Emerging Intelligent Data and Web Technologies<\/a><\/strong>, Tirana (Albania), 07-09\/09\/2011<\/li>\n<li><strong><a href=\"http:\/\/cse.stfx.ca\/%7Ehpcc2011\" target=\"_blank\" rel=\"noopener noreferrer\">13th IEEE International Conference on High Performance Computing and Communications (HPCC 2011)<\/a><\/strong>, IEEE Communications Society, Banff (Canada), 02-04\/09\/2011<\/li>\n<li><strong><a href=\"http:\/\/cse.stfx.ca\/%7Eatc2011\" target=\"_blank\" rel=\"noopener noreferrer\">8th International Conference on Autonomic and Trusted Computing (ATC 2011)<\/a><\/strong>, IEEE Communications Society, Banff (Canada), 02-04\/09\/2011 <b>[Program vice-chair]<\/b><\/li>\n<li><strong><a href=\"http:\/\/coneco2009.com\/IWTMP2PS2011\/iwtmp2ps2011.html\" target=\"_blank\" rel=\"noopener noreferrer\">Second International Workshop on Trust Management in P2P Systems, (IWTMP2PS 2011)<\/a><\/strong>, to be held in conjunction with Fourth International Conference on Network Security &amp; Applications (CNSA-2011), Academy &amp; Industry Research Collaboration Center (AIRCC), Chennai (India), 23-25\/07\/2011<\/li>\n<li><strong><a href=\"http:\/\/www.iwcmc.org\" target=\"_blank\" rel=\"noopener noreferrer\">IWCMC 2011, The 7th International Wireless Communications and Mobile Computing Conference<\/a><\/strong>, Istanbul (Turkey), 05-08\/07\/2011<\/li>\n<li><strong><a href=\"http:\/\/www.ieee-icc.org\/2011\" target=\"_blank\" rel=\"noopener noreferrer\">IEEE ICC 2011, IEEE International Conference on Communications<\/a><\/strong>, IEEE Communications Society, Kyoto (Japan), 05-09\/06\/2011<\/li>\n<li><strong><a href=\"http:\/\/www.ntms-conf.org\" target=\"_blank\" rel=\"noopener noreferrer\">NTMS 2011, 4th International Conference on New Technologies, Mobility and Security<\/a><\/strong>, International Federation for Information Processing, Paris (France), 07-10\/02\/2011<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bb2010&#8243; tab_id=\u00bb1491756922592-8dc2f6ab-8f94&#8243;][vc_column_text]<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/www.icics2010.org\" target=\"_blank\" rel=\"noopener noreferrer\">ICICS 2010, Twelfth International Conference on Information and Communications Security<\/a><\/strong>, IEEE Communications Society, Barcelona (Spain), 15-17\/12\/2010<\/li>\n<li><strong><a href=\"http:\/\/www.bionetics.org\/ws\/BioAdcom.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">BioAdcom 2010, 1st International Workshop on Bio-inspired Approaches to Advanced Computing and Communications<\/a><\/strong>, ICST &#8211; Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Boston (USA), 01-03\/12\/2010<\/li>\n<li><strong><a href=\"http:\/\/jitel2010.tel.uva.es\" target=\"_blank\" rel=\"noopener noreferrer\">JITEL 2010, IX Jornadas de Ingenier\u00eda Telem\u00e1tica<\/a><\/strong>, Universidad de Valladolid, Valladolid (Spain), 29\/09\/2010 &#8211; 01\/10\/2010<\/li>\n<li><strong><a href=\"http:\/\/www.iaria.org\/conferences2010\/ICSNC10.html\" target=\"_blank\" rel=\"noopener noreferrer\">ICSNC10, 5th International Conference on Systems and Networks Communications, SESYS Track<\/a><\/strong>, International Academy, Research, and Industry Association (IARIA), Nice (France), 22-27\/08\/2010<\/li>\n<li><strong><a href=\"http:\/\/www.tns-conf.org\/committees.asp\" target=\"_blank\" rel=\"noopener noreferrer\">International Conference Telecommunications, Networks and Systems 2010<\/a><\/strong>, IADIS &#8211; International Association for Development of the Information Society, Freiburg (Germany), 26-31\/07\/2010<\/li>\n<li><strong><a href=\"http:\/\/www.coneco2009.com\/cnsa\/cnsa.html\" target=\"_blank\" rel=\"noopener noreferrer\">Third International Conference on Network Security &amp; Applications (CNSA-2010)<\/a><\/strong>, Academy &amp; Industry Research Collaboration Center (AIRCC), Chennai (India), 23-25\/07\/2010<\/li>\n<li><strong><a href=\"http:\/\/coneco2009.com\/IWTMP2PS2010\" target=\"_blank\" rel=\"noopener noreferrer\">First International Workshop on Trust Management in P2P Systems, (IWTMP2PS 2010)<\/a><\/strong>, to be held in conjunction with Third International Conference on Network Security &amp; Applications (CNSA-2010), Academy &amp; Industry Research Collaboration Center (AIRCC), Chennai (India), 23-25\/07\/2010<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bb2009&#8243; tab_id=\u00bb1491756959524-ae22e633-ff4e\u00bb][vc_column_text]<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/www.ntms-conf.org\/ntms2009\" target=\"_blank\" rel=\"noopener noreferrer\">NTMS 2009, 3rd International Conference on New Technologies, Mobility and Security<\/a><\/strong>, International Federation for Information Processing, Cairo (Egypt), 20-23\/12\/2009<\/li>\n<li><strong><a href=\"http:\/\/www.iaria.org\/conferences2009\/ICSNC09.html\" target=\"_blank\" rel=\"noopener noreferrer\">ICSNC09, 4th International Conference on Systems and Networks Communications, SESYS Track<\/a><\/strong>, International Academy, Research, and Industry Association (IARIA), Porto (Portugal), 20-25\/09\/2009<\/li>\n<li><strong><a href=\"http:\/\/www.acmmobility2009.org\/loc\" target=\"_blank\" rel=\"noopener noreferrer\">International Conference on Mobile Technology, Applications and Systems 2009<\/a><\/strong>, Singapore Chapter of ACM, Nice (France) 02-04\/09\/2009<\/li>\n<li><strong><a href=\"http:\/\/www.tns-conf.org\/committees.asp\" target=\"_blank\" rel=\"noopener noreferrer\">International Conference Telecommunications, Networks and Systems 2009<\/a><\/strong>, IADIS &#8211; International Association for Development of the Information Society, Algarve (Portugal), 17-19\/06\/2009<\/li>\n<li><strong><a href=\"http:\/\/www.ieee-icc.org\/2009\" target=\"_blank\" rel=\"noopener noreferrer\">IEEE ICC 2009, IEEE International Conference on Communications<\/a><\/strong>, IEEE Communications Society, Dresden (Germany), 14-18\/06\/2009 <b>[Session chair]<\/b><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bb2008&#8243; tab_id=\u00bb1491756993539-ee595545-d72a\u00bb][vc_column_text]<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/www.ieee-globecom.org\/2008\" target=\"_blank\" rel=\"noopener noreferrer\">IEEE GLOBECOM 2008, Computer and Communications Network Security Symposium<\/a><\/strong>, IEEE Communications Society, New Orleans (USA), 30\/11\/2008 &#8211; 04\/12\/2008<\/li>\n<li><strong><a href=\"http:\/\/www.iaria.org\/conferences2008\/ICSNC08.html\" target=\"_blank\" rel=\"noopener noreferrer\">ICSNC08, 3rd International Conference on Systems and Networks Communications, SESYS Track<\/a><\/strong>, International Academy, Research, and Industry Association (IARIA), Sliema (Malta), 26-31\/10\/2008<\/li>\n<li><strong><a href=\"http:\/\/www.isac.uma.es\/esorics08\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">ESORICS 2008, 13th European Symposium on Research in Computer Security<\/a><\/strong>, European Symposium on Research in Computer Security, M\u00e1laga (Spain), 06-08\/10\/2008<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_row_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb1481&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttp:\/\/www.journals.elsevier.com\/computers-and-electrical-engineering\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_column_text]Computers &amp; Electrical Engineering, Elsevier[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_single_image image=\u00bb1081&#8243; alignment=\u00bbcenter\u00bb onclick=\u00bbcustom_link\u00bb img_link_target=\u00bb_blank\u00bb link=\u00bbhttp:\/\/www.journals.elsevier.com\/computer-standards-and-interfaces\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][vc_column_text]Computer Standards [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2261,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>F\u00e9lix G\u00f3mez M\u00e1rmol - Editor &amp; TPC<\/title>\n<meta name=\"description\" content=\"Editorial and TPC roles of F\u00e9lix G\u00f3mez M\u00e1rmol, Associate Professor in the Department of Information and Communications Engineering (Uni. of Murcia)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/webs.um.es\/felixgm\/editor-tpc\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"F\u00e9lix G\u00f3mez M\u00e1rmol - Editor &amp; TPC\" \/>\n<meta property=\"og:description\" content=\"Editorial and TPC roles of F\u00e9lix G\u00f3mez M\u00e1rmol, Associate Professor in the Department of Information and Communications Engineering (Uni. of Murcia)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/webs.um.es\/felixgm\/editor-tpc\/\" \/>\n<meta property=\"og:site_name\" content=\"F\u00e9lix G\u00f3mez M\u00e1rmol\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-29T20:52:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/03\/Sunset-in-Heidelberg-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/webs.um.es\/felixgm\/#website\",\"url\":\"https:\/\/webs.um.es\/felixgm\/\",\"name\":\"F\\u00e9lix G\\u00f3mez M\\u00e1rmol\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/webs.um.es\/felixgm\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/webs.um.es\/felixgm\/editor-tpc\/#primaryimage\",\"inLanguage\":\"es\",\"url\":\"https:\/\/webs.um.es\/felixgm\/wp-content\/uploads\/2017\/03\/Sunset-in-Heidelberg.jpg\",\"width\":4935,\"height\":3294},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/webs.um.es\/felixgm\/editor-tpc\/#webpage\",\"url\":\"https:\/\/webs.um.es\/felixgm\/editor-tpc\/\",\"name\":\"F\\u00e9lix G\\u00f3mez M\\u00e1rmol - Editor & TPC\",\"isPartOf\":{\"@id\":\"https:\/\/webs.um.es\/felixgm\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/webs.um.es\/felixgm\/editor-tpc\/#primaryimage\"},\"datePublished\":\"2017-03-23T18:11:26+00:00\",\"dateModified\":\"2024-08-29T20:52:50+00:00\",\"description\":\"Editorial and TPC roles of F\\u00e9lix G\\u00f3mez M\\u00e1rmol, Associate Professor in the Department of Information and Communications Engineering (Uni. of Murcia)\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/webs.um.es\/felixgm\/editor-tpc\/\"]}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/pages\/2711"}],"collection":[{"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/comments?post=2711"}],"version-history":[{"count":85,"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/pages\/2711\/revisions"}],"predecessor-version":[{"id":13851,"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/pages\/2711\/revisions\/13851"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/media\/2261"}],"wp:attachment":[{"href":"https:\/\/webs.um.es\/felixgm\/wp-json\/wp\/v2\/media?parent=2711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}