Antonio Ruiz-Martínez

Antonio Ruiz-Martínez
University of Murcia | UM · Department of Information and Communication Engineering

Ph.D.

About

69
Publications
13,929
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
538
Citations
Citations since 2017
27 Research Items
344 Citations
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
Introduction
Antonio Ruiz-Martínez is an associate professor in the Department of Information and Communications Engineering at the University of Murcia (Spain). He received B.E., M.E. and Ph.D. degrees in Computer Sciences from the University of Murcia. He is also an IEEE senior member. His main research interests include electronic payment systems, security, privacy, and educational technology. He has participated in several research projects in the national and international areas such as ECOSPACE, SEMIRAMIS, INTER-TRUST, and STORK 2.0. He has published more than 50 papers in conferences and journals. He also serves as a technical program committee member in various conferences (ICC CISS, ICACCI, SpaCCS, SSCC, etc) and, reviewer and member of the editorial board in several international journals.

Publications

Publications (69)
Article
In the teaching of computer networks the main problem that arises is the high price and limited number of network devices the students can work with in the laboratories. Nowadays, with virtualization we can overcome this limitation. In this paper, we present a methodology that allows students to learn advanced computer network concepts through hand...
Article
In the Internet era, through the web, and access to content, products and services has evolved in a spectacular way. At the same time, different business models have been developed for access and consumption. Many of these business models are based on making a payment via the web. The use of electronic payments in the web is a complex issue since i...
Article
Full-text available
Some lecturers start their sessions by reviewing or summarizing the main contents covered in the previous session. In general, this review involves the teacher exposing the main concepts and, in some cases, asking about them. This approach, which could be called Check-Reinforce Introduction (CRI), might be seen as having one main drawback; namely,...
Article
Full-text available
The online payment for products or for the access to payment-based services can be made by means of a range of (mobile) electronic payment systems – (M)EPS. Both the industrial sector and research community, mainly World Wide Web Consortium (W3C), are working on facilitating these payment methods on Web and supporting the multiple users on how they...
Article
Full-text available
Privacy is an important research topic due to its implications in society. Among the topics covered by privacy, we can highlight how to establish anonymous communications. During the latest years we have seen an important research in this field. In order to know what the state of the art in the research in anonymous communication systems (ACS) is,...
Preprint
Full-text available
Surveys in mobile learning developed so far have analysed in a global way the effects on the usage of mobile devices by means of general apps or apps already developed. However, more and more teachers are developing their own apps to address issues not covered by existing m-learning apps. In this article, by means of a systematic literature review...
Article
Currently, healthcare is critical environment in our society which attracts attention to malicious activities and has caused an important number of damaging attacks. In parallel, the recent advancements in technologies, computing systems, and wireless communications are changing healthcare environment by adding different improvements and complexity...
Article
Full-text available
Electronic (mobile) payment systems are an important aspect of e-commerce. However, few reviews highlight the most significant findings and challenges. In this article, we have prepared a bibliometric analysis to provide a statistical overview of previously published research papers on electronic (mobile) payment systems and user preferences, with...
Article
Full-text available
Anonymous communications networks were created to protect the privacy of communications, preventing censorship and traffic analysis. The most famous anonymous communication network is Tor. This anonymous communication network provides some interesting features. Among them, we can mention that Tor can hide a user’s IP address when accessing to a ser...
Preprint
Full-text available
Anonymous communications networks were born to protect the privacy of our communications, preventing censorship and traffic analysis. The most famous anonymous communication network is Tor. This anonymous communication network provides some interesting features, among them, we can mention user’s IP location or Tor Hidden Services (THS) as a mechani...
Article
Full-text available
The availability of multiple (mobile) electronic payment systems ((M)EPS) has led to the development of web browser payment interfaces that support various payment systems, facilitate the transaction, the choice of the payment system, and perform the payment. However, so far, no in-depth study on user satisfaction determinants with these interfaces...
Article
Full-text available
Botnets are causing severe damages to users, companies, and governments through information theft, abuse of online services, DDoS attacks, etc. Although significant research is being made to detect them and mitigate their effect, they are exponentially increasing due to new zero-day attacks, a variation of their behavior, and obfuscation techniques...
Chapter
Cyber security MOOCs (Massive Open Online Courses) can enable lifelong learning and increase the cyber security competence of experts and citizens. This paper contributes with a review of existing cyber security MOOCs and MOOC quality assurance frameworks. It then presents quality criteria, which we elicited for evaluating whether cyber security MO...
Chapter
Internet users progressively have realized that due to our online activities our privacy can be compromised and that much personal information can be gathered. To cope with this problem, both technological solutions and regulations have emerged which are steadily being improved. But, apart from these privacy-preserving tools, we need tools to show...
Chapter
Bullying is the deliberate physical and psychological abuse that a child receives from other children. The term cyberbullying has recently emerged to denote a new type of bullying that takes place over digital platforms, where the stalkers can perform their crimes on the vulnerable victims. In severe cases, the harassment has lead the victims to th...
Chapter
Full-text available
Automotive systems are widely upgraded with Internet-based applications. In these applications, we could be interested in preserving anonymity of communications and that senders (automotive system) could communicate in an anonymous way. For this purpose, we need to introduce the model of an anonymous communication system in automotive systems. The...
Chapter
This chapter presents what an electronic payment framework is, its main features and benefits, what the main electronic payment frameworks proposed so far are, and the current initiatives that are being developed. For each framework developed so far, the chapter presents its key features and differences with previous works. The presentation of the...
Article
Full-text available
Working with specific m-learning apps is useful for learning/teaching purposes. However, its development requires advanced knowledge in programming mobile devices. We present a case study that evaluates the usefulness of App Inventor as a visual, blocks platform that allows teachers, without any advanced programming knowledge, to develop customized...
Chapter
The use of electronic payment (e-payment) systems to make payments for the access to contents and services is more and more usual. Currently, for making e-payments we can use systems such as Paypal, Bitcoin, Ripple, Apple Pay, EMV. Indeed, the use of cryptocurrencies as Bitcoin has supposed a revolution in the e-payments arena (Hileman, 2014; Vigna...
Chapter
Nowadays, many users make payments electronically rather than in person. Hundreds of electronic payment systems (EPS) and mobile payment systems (MPS) have been developed to provide secure Internet payment transactions. In this paper, we present the results of the analysis we have made on the different properties that both EPS and MPS offer, how th...
Conference Paper
Since the use of smartphones among students is usual, the introduction of mobile technologies in teaching and learning processes (m-learning) is becoming more and more frequent. Indeed, there are an important number of m-learning experiences using general purpose apps such as Dropbox, Facebook, apps provided by the mobile OS, etc. However, there ar...
Article
Financial news plays a significant role with regard to predicting the behaviour of financial markets. However, the exponential growth of financial news on the Web has led to a need for new technologies that automatically collect and categorise large volumes of information in a fast and easy manner. Sentiment analysis, or opinion mining, is the fiel...
Article
The growth of users connected to the Internet with a high bandwidth connection has favoured the increase of multimedia services. As many of these services are provided by means of SIP, adding support for payment to SIP might benefit vendors. Payments in SIP have been proposed for accessing services, for microbilling and even as a solution to SPAM i...
Article
The Semantic Web has emerged as an extension of the current Web, in which Web content has well-defined meaning through the addition of logic-based metadata. However, current mechanisms for information retrieval from semantic knowledge bases restrict their use to only experienced users. To address this gap, the natural language processing (NLP) is d...
Article
Full-text available
The increase of the capacity of processing units and the growth of distributed computing make easy to collect and process information of Internet traffic flows. This information, however, can be used to perform attacks in anonymous communications that could compromise privacy. With the aim of preventing these attacks, we propose a scheme that imple...
Book
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on secu...
Article
The development of mobile signatures could increase the spread and adoption of mobile services based on electronic signatures, such as mobile payments, mobile business transactions, and mobile government services. A Mobile Signature Service (MSS) means that a user in any of the scenarios mentioned can attach an electronic signature, anywhere, anyti...
Article
In Next Generation Networks, Kerberos is becoming a key component to support authentication and key distribution for Internet application services. However, for this purpose, Kerberos needs to rectify certain deficiencies, especially in the area of privacy, which allow an eavesdropper to obtain information of the services users are accessing. This...
Article
With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates differ...
Article
Full-text available
In the session initiation protocol (SIP), payments have been proposed as a way for vendors to obtain profit from the services they provide. Payments in SIP have also been proposed for microbilling and even as a solution to SPAM in VoIP systems. Although several proposals exist for making payments in SIP, they present some limitations when we want t...
Article
Concern for privacy when users are surfing on the Web has increased recently. Nowadays, many users are aware that when they are accessing Web sites, these Web sites can track them and create profiles on the elements they access, the advertisements they see, the different links they visit, from which Web sites they come from and to which sites they...
Article
End users' demand for electronic contents and services is increasing dramatically. Vendors and service providers might want to obtain benefits by charging for their electronic contents and services. Thus, they might need to offer different payment protocols to make the payment. Payment frameworks appeared for this purpose. However, currently, none...
Article
Full-text available
The appearance of some laws that make the electronic signature (e-signature) legally equivalent to the handwritten signature (under some circumstances) has favored its use in different fields, such as e-commerce and e-government. In these fields, the e-signatures associated to some documents have to remain valid over long periods of time. For these...
Article
Full-text available
Electronic signature (e-signature) is an important element in electronic commerce and government applications because it guarantees non-repudiation of transactions. E-signatures generated in a secure signature creation device can be considered legally equivalent to a handwritten signature. Mobile devices based on SIM/USIM cards, which are broadly e...
Chapter
This chapter describes the most important problems of current Collaborative Working Environments (CWEs), indicating some of the requirements for next generation of CWEs collected by the Expert Group@Collaboration. Moreover it analyzes Service-Oriented Architecture technologies and semantic concepts for fulfilling the requirements previously analyze...
Article
Full-text available
Resumen La virtualización permite disponer y configurar infraestructuras de red con un coste asumible para un laboratorio y, a diferencia de los simuladores, muestra un comportamiento real del sistema. Este artículo presenta la metodología que seguimos en la asignatura de Redes de la Facultad de Informática de la Universidad de Murcia para la enseñ...
Article
Full-text available
A día de hoy un amplio número de propuestas han aparecido para intentar ofrecer sistemas de pago seguros y frameworks para realizar transacciones de pago. Sin embargo, a pesar de estas propuestas, todavía quedan determinados aspectos por cubrir. Desde el punto de vista de los sistemas de pago, las características a mejorar para los escenarios del t...
Article
Full-text available
Purpose This paper aims to present a viable approach for designing and implementing a generic per‐fee‐link framework. It also aims to design this framework to be used with any payment protocol and test it with two existing ones. Design/methodology/approach The paper presents a per‐fee‐link framework based on several generic components. These compo...
Article
Full-text available
The participation of an e-notary, acting as an on-line Trusted Third Party is required in some scenarios, such as Business to Business, Intellectual Property Rights contracting, or even as a legal requirement, in contract signing is frequently necessary. This e-notary gives validity to the contract or performs some tasks related to the contract, e....
Article
Non-repudiation is an important issue in mobile business and mobile commerce in order to provide the necessary evidences to prove whether some party participated in a transaction. The basis to support non-repudiation is the electronic signature. In Europe, directive 1999/93/EC of the European Parliament and the Council establishes the conditions th...
Conference Paper
Full-text available
Proposals such as CAdES, XAdES and LTANS have made the need of remaining evidences over long periods of time clear. Between these evidences we have electronic signatures, certificates, requests and responses of validation mechanisms and so on. In order to gather these evidences, clients have to support several PKI-compliant protocols. Then, with th...
Chapter
Nowadays the use of Web Services is based on two approaches. The first approach is the use of web services freely and the second one is a restricted use of services based on payment, subscription or any other method based on a commercial agreement. However, for this last approach, the information related to the payment, and therefore needed to use...
Conference Paper
Broadband connections to Internet make possible offering new services such as multimedia on demand (MoD). To the date, content providers and distributors resort to use specifically developed software to deal with payments. The problem is that those customized solutions are limited to either a specific payment protocol, brand and payment service pro...
Conference Paper
Nowadays e-purses are not being offered as payment method on the Internet. This is mainly due to the fact that vendors have to integrate in their devices a security application module (SAM) to exchange security messages between the e-purse and that module during the payment phase. In this paper we introduce a new payment method that combines the ma...
Article
Full-text available
The development of electronic signature in mobile devices is an essential issue for the advance and expansion of the mobile electronic commerce since it provides security and trust in the system. E-signatures provide security for the transactions with authenticity and integrity characteristics that make non-repudiation of the transactions possible....
Conference Paper
Full-text available
Low value electronic content is not being offered following a model in which the content is accessed clicking in a new sort of links called per-fee-links. The goal of these links is making the (micro)payment of a web content as simple as possible: just by clicking on a link. Despite this model has been proposed as an approach to pay low-value conte...
Conference Paper
Groupware provides an essential support for the maintenance of knowledge management in many organizations. Accordingly, the use of groupware systems has become widespread. However, still some problems regarding the way in which business process are implemented exist, because they require the communication between several of these groupware systems...
Conference Paper
Full-text available
SIP is a protocol designed to create and manage multimedia sessions such as telephone calls over the Internet, distributed conferences, or, in general, every kind of communication between two or more peers. The introduction of payment in SIP is an interesting idea in order to charge for this media services. This payment services have been proposed...
Conference Paper
Broadband connections to Internet make possible offering new services such as Multimedia on Demand (MoD). The problem appears when content providers and distributors want to offer MoD services based on payment (pay-per-view). At the moment, the approach followed to perform the link between payment and distribution has been usually carried out devel...
Conference Paper
Full-text available
The participation of an e-notary, acting as an on-line Trusted Third Party is required in some scenarios, such as Business to Business, Intellectual Property Rights contracting, or even as a legal requirement, in contract signing is frequently necessary. This e-notary gives validity to the contract or performs some tasks related to the contract, e....
Conference Paper
Full-text available
One of the most important components in e-conimerce systems is the validation of digital signatures, which implies the validation of certificates in order to check the validity status of the certificates used to create a signature. Nowadays, several mechanisms to accomplish this process exist, but there is no agreement with which particular mechani...
Article
Full-text available
The mobile commerce will come true when we provide the certification services and electronic signa- ture necessaries to make the electronic transactions secure. However, at this moment, the mobile tech- nologies can not offer us theses services or they are much reduced. This paper discusses the main drawbacks of these technologies and describes the...
Conference Paper
Full-text available
In these times of the dawning of e-commerce, many issues and barriers still remain to be solved before electronic transactions over the Web can be expected to be really successful. One important unresolved problem is the issue of having efficient and secure payment models based on e-purses and including electronic product delivery and price negotia...
Article
Full-text available
The main goal of the PISCIS Project is to remedy the lack of deployment of real e-Commerce environments at the present time. Consequently, and using novel research proposals related to communication security, we have defined an advanced e-Commerce scenario composed of a certification infrastructure, smart cards and a payment model.

Network

Cited By