
Antonio Ruiz-MartínezUniversity of Murcia | UM · Department of Information and Communication Engineering
Antonio Ruiz-Martínez
Ph.D.
About
69
Publications
13,929
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
538
Citations
Citations since 2017
Introduction
Antonio Ruiz-Martínez is an associate professor in the Department of Information and Communications Engineering at the University of Murcia (Spain). He received B.E., M.E. and Ph.D. degrees in Computer Sciences from the University of Murcia. He is also an IEEE senior member. His main research interests include electronic payment systems, security, privacy, and educational technology. He has participated in several research projects in the national and international areas such as ECOSPACE, SEMIRAMIS, INTER-TRUST, and STORK 2.0. He has published more than 50 papers in conferences and journals. He also serves as a technical program committee member in various conferences (ICC CISS, ICACCI, SpaCCS, SSCC, etc) and, reviewer and member of the editorial board in several international journals.
Publications
Publications (69)
In the teaching of computer networks the main problem that arises is the high price and limited number of network devices the students can work with in the laboratories. Nowadays, with virtualization we can overcome this limitation. In this paper, we present a methodology that allows students to learn advanced computer network concepts through hand...
In the Internet era, through the web, and access to content, products and services has evolved in a spectacular way. At the same time, different business models have been developed for access and consumption. Many of these business models are based on making a payment via the web. The use of electronic payments in the web is a complex issue since i...
Some lecturers start their sessions by reviewing or summarizing the main contents covered in the previous session. In general, this review involves the teacher exposing the main concepts and, in some cases, asking about them. This approach, which could be called Check-Reinforce Introduction (CRI), might be seen as having one main drawback; namely,...
The online payment for products or for the access to payment-based services can be made by means of a range of (mobile) electronic payment systems – (M)EPS. Both the industrial sector and research community, mainly World Wide Web Consortium (W3C), are working on facilitating these payment methods on Web and supporting the multiple users on how they...
Privacy is an important research topic due to its implications in society. Among the topics covered by privacy, we can highlight how to establish anonymous communications. During the latest years we have seen an important research in this field. In order to know what the state of the art in the research in anonymous communication systems (ACS) is,...
Surveys in mobile learning developed so far have analysed in a global way the effects on the usage of mobile devices by means of general apps or apps already developed. However, more and more teachers are developing their own apps to address issues not covered by existing m-learning apps. In this article, by means of a systematic literature review...
Currently, healthcare is critical environment in our society which attracts attention to malicious activities and has caused an important number of damaging attacks. In parallel, the recent advancements in technologies, computing systems, and wireless communications are changing healthcare environment by adding different improvements and complexity...
Electronic (mobile) payment systems are an important aspect of e-commerce. However, few reviews highlight the most significant findings and challenges. In this article, we have prepared a bibliometric analysis to provide a statistical overview of previously published research papers on electronic (mobile) payment systems and user preferences, with...
Anonymous communications networks were created to protect the privacy of communications, preventing censorship and traffic analysis. The most famous anonymous communication network is Tor. This anonymous communication network provides some interesting features. Among them, we can mention that Tor can hide a user’s IP address when accessing to a ser...
Anonymous communications networks were born to protect the privacy of our communications, preventing censorship and traffic analysis. The most famous anonymous communication network is Tor. This anonymous communication network provides some interesting features, among them, we can mention user’s IP location or Tor Hidden Services (THS) as a mechani...
The availability of multiple (mobile) electronic payment systems ((M)EPS) has led to the development of web browser payment interfaces that support various payment systems, facilitate the transaction, the choice of the payment system, and perform the payment. However, so far, no in-depth study on user satisfaction determinants with these interfaces...
Botnets are causing severe damages to users, companies, and governments through information theft, abuse of online services, DDoS attacks, etc. Although significant research is being made to detect them and mitigate their effect, they are exponentially increasing due to new zero-day attacks, a variation of their behavior, and obfuscation techniques...
Cyber security MOOCs (Massive Open Online Courses) can enable lifelong learning and increase the cyber security competence of experts and citizens. This paper contributes with a review of existing cyber security MOOCs and MOOC quality assurance frameworks. It then presents quality criteria, which we elicited for evaluating whether cyber security MO...
Internet users progressively have realized that due to our online activities our privacy can be compromised and that much personal information can be gathered. To cope with this problem, both technological solutions and regulations have emerged which are steadily being improved. But, apart from these privacy-preserving tools, we need tools to show...
Bullying is the deliberate physical and psychological abuse that a child receives from other children. The term cyberbullying has recently emerged to denote a new type of bullying that takes place over digital platforms, where the stalkers can perform their crimes on the vulnerable victims. In severe cases, the harassment has lead the victims to th...
Automotive systems are widely upgraded with Internet-based applications. In these applications, we could be interested in preserving anonymity of communications and that senders (automotive system) could communicate in an anonymous way. For this purpose, we need to introduce the model of an anonymous communication system in automotive systems. The...
This chapter presents what an electronic payment framework is, its main features and benefits, what the main electronic payment frameworks proposed so far are, and the current initiatives that are being developed. For each framework developed so far, the chapter presents its key features and differences with previous works. The presentation of the...
Working with specific m-learning apps is useful for learning/teaching purposes. However, its development requires advanced knowledge in programming mobile devices. We present a case study that evaluates the usefulness of App Inventor as a visual, blocks platform that allows teachers, without any advanced programming knowledge, to develop customized...
The use of electronic payment (e-payment) systems
to make payments for the access to contents and
services is more and more usual. Currently, for
making e-payments we can use systems such as
Paypal, Bitcoin, Ripple, Apple Pay, EMV. Indeed,
the use of cryptocurrencies as Bitcoin has supposed
a revolution in the e-payments arena (Hileman,
2014; Vigna...
Nowadays, many users make payments electronically rather than in person. Hundreds of electronic payment systems (EPS) and mobile payment systems (MPS) have been developed to provide secure Internet payment transactions. In this paper, we present the results of the analysis we have made on the different properties that both EPS and MPS offer, how th...
Since the use of smartphones among students is usual, the introduction of mobile technologies in teaching and learning processes (m-learning) is becoming more and more frequent. Indeed, there are an important number of m-learning experiences using general purpose apps such as Dropbox, Facebook, apps provided by the mobile OS, etc. However, there ar...
Financial news plays a significant role with regard to predicting the behaviour of financial markets. However, the exponential growth of financial news on the Web has led to a need for new technologies that automatically collect and categorise large volumes of information in a fast and easy manner. Sentiment analysis, or opinion mining, is the fiel...
The growth of users connected to the Internet with a high bandwidth connection has favoured the increase of multimedia services. As many of these services are provided by means of SIP, adding support for payment to SIP might benefit vendors. Payments in SIP have been proposed for accessing services, for microbilling and even as a solution to SPAM i...
The Semantic Web has emerged as an extension of the current Web, in which Web content has well-defined meaning through the addition of logic-based metadata. However, current mechanisms for information retrieval from semantic knowledge bases restrict their use to only experienced users. To address this gap, the natural language processing (NLP) is d...
The increase of the capacity of processing units and the growth of distributed computing make easy to collect and process information of Internet traffic flows. This information, however, can be used to perform attacks in anonymous communications that could compromise privacy. With the aim of preventing these attacks, we propose a scheme that imple...
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on secu...
The development of mobile signatures could increase the spread and adoption of mobile services based on electronic signatures, such as mobile payments, mobile business transactions, and mobile government services. A Mobile Signature Service (MSS) means that a user in any of the scenarios mentioned can attach an electronic signature, anywhere, anyti...
In Next Generation Networks, Kerberos is becoming a key component to support authentication and key distribution for Internet application services. However, for this purpose, Kerberos needs to rectify certain deficiencies, especially in the area of privacy, which allow an eavesdropper to obtain information of the services users are accessing. This...
With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates differ...
In the session initiation protocol (SIP), payments have been proposed as a way for vendors to obtain profit from the services they provide. Payments in SIP have also been proposed for microbilling and even as a solution to SPAM in VoIP systems. Although several proposals exist for making payments in SIP, they present some limitations when we want t...
Concern for privacy when users are surfing on the Web has increased recently. Nowadays, many users are aware that when they are accessing Web sites, these Web sites can track them and create profiles on the elements they access, the advertisements they see, the different links they visit, from which Web sites they come from and to which sites they...
End users' demand for electronic contents and services is increasing dramatically. Vendors and service providers might want to obtain benefits by charging for their electronic contents and services. Thus, they might need to offer different payment protocols to make the payment. Payment frameworks appeared for this purpose. However, currently, none...
The appearance of some laws that make the electronic signature (e-signature) legally equivalent to the handwritten signature (under some circumstances) has favored its use in different fields, such as e-commerce and e-government. In these fields, the e-signatures associated to some documents have to remain valid over long periods of time. For these...
Electronic signature (e-signature) is an important element in electronic commerce and government applications because it guarantees non-repudiation of transactions. E-signatures generated in a secure signature creation device can be considered legally equivalent to a handwritten signature. Mobile devices based on SIM/USIM cards, which are broadly e...
This chapter describes the most important problems of current Collaborative Working Environments (CWEs), indicating some of the requirements for next generation of CWEs collected by the Expert Group@Collaboration. Moreover it analyzes Service-Oriented Architecture technologies and semantic concepts for fulfilling the requirements previously analyze...
Resumen La virtualización permite disponer y configurar infraestructuras de red con un coste asumible para un laboratorio y, a diferencia de los simuladores, muestra un comportamiento real del sistema. Este artículo presenta la metodología que seguimos en la asignatura de Redes de la Facultad de Informática de la Universidad de Murcia para la enseñ...
A día de hoy un amplio número de propuestas han aparecido para intentar ofrecer sistemas de pago seguros y frameworks para realizar transacciones de pago. Sin embargo, a pesar de estas propuestas, todavía quedan determinados aspectos por cubrir. Desde el punto de vista de los sistemas de pago, las características a mejorar para los escenarios del t...
Purpose
This paper aims to present a viable approach for designing and implementing a generic per‐fee‐link framework. It also aims to design this framework to be used with any payment protocol and test it with two existing ones.
Design/methodology/approach
The paper presents a per‐fee‐link framework based on several generic components. These compo...
The participation of an e-notary, acting as an on-line Trusted Third Party is required in some scenarios, such as Business to Business, Intellectual Property Rights contracting, or even as a legal requirement, in contract signing is frequently necessary. This e-notary gives validity to the contract or performs some tasks related to the contract, e....
Non-repudiation is an important issue in mobile business and mobile commerce in order to provide the necessary evidences to prove whether some party participated in a transaction. The basis to support non-repudiation is the electronic signature. In Europe, directive 1999/93/EC of the European Parliament and the Council establishes the conditions th...
Proposals such as CAdES, XAdES and LTANS have made the need of remaining evidences over long periods of time clear. Between these evidences we have electronic signatures, certificates, requests and responses of validation mechanisms and so on. In order to gather these evidences, clients have to support several PKI-compliant protocols. Then, with th...
Nowadays the use of Web Services is based on two approaches. The first approach is the use of web services freely and the
second one is a restricted use of services based on payment, subscription or any other method based on a commercial agreement.
However, for this last approach, the information related to the payment, and therefore needed to use...
Broadband connections to Internet make possible offering new services such as multimedia on demand (MoD). To the date, content providers and distributors resort to use specifically developed software to deal with payments. The problem is that those customized solutions are limited to either a specific payment protocol, brand and payment service pro...
Nowadays e-purses are not being offered as payment method on the Internet. This is mainly due to the fact that vendors have to integrate in their devices a security application module (SAM) to exchange security messages between the e-purse and that module during the payment phase. In this paper we introduce a new payment method that combines the ma...
The development of electronic signature in mobile devices is an essential issue for the advance and expansion of the mobile electronic commerce since it provides security and trust in the system. E-signatures provide security for the transactions with authenticity and integrity characteristics that make non-repudiation of the transactions possible....
Low value electronic content is not being offered following a model in which the content is accessed clicking in a new sort of links called per-fee-links. The goal of these links is making the (micro)payment of a web content as simple as possible: just by clicking on a link. Despite this model has been proposed as an approach to pay low-value conte...
Groupware provides an essential support for the maintenance of knowledge management in many organizations. Accordingly, the use of groupware systems has become widespread. However, still some problems regarding the way in which business process are implemented exist, because they require the communication between several of these groupware systems...
SIP is a protocol designed to create and manage multimedia sessions such as telephone calls over the Internet, distributed conferences, or, in general, every kind of communication between two or more peers. The introduction of payment in SIP is an interesting idea in order to charge for this media services. This payment services have been proposed...
Broadband connections to Internet make possible offering new services such as Multimedia on Demand (MoD). The problem appears when content providers and distributors want to offer MoD services based on payment (pay-per-view). At the moment, the approach followed to perform the link between payment and distribution has been usually carried out devel...
The participation of an e-notary, acting as an on-line Trusted Third Party is required in some scenarios, such as Business to Business, Intellectual Property Rights contracting, or even as a legal requirement, in contract signing is frequently necessary. This e-notary gives validity to the contract or performs some tasks related to the contract, e....
One of the most important components in e-conimerce systems is the validation of digital signatures, which implies the validation of certificates in order to check the validity status of the certificates used to create a signature. Nowadays, several mechanisms to accomplish this process exist, but there is no agreement with which particular mechani...
The mobile commerce will come true when we provide the certification services and electronic signa- ture necessaries to make the electronic transactions secure. However, at this moment, the mobile tech- nologies can not offer us theses services or they are much reduced. This paper discusses the main drawbacks of these technologies and describes the...
In these times of the dawning of e-commerce, many issues and barriers still remain to be solved before electronic transactions
over the Web can be expected to be really successful. One important unresolved problem is the issue of having efficient and
secure payment models based on e-purses and including electronic product delivery and price negotia...
The main goal of the PISCIS Project is to remedy the lack of deployment of real e-Commerce environments at the present time. Consequently, and using novel research proposals related to communication security, we have defined an advanced e-Commerce scenario composed of a certification infrastructure, smart cards and a payment model.