Jorge L. Hernandez-Ardieta

Jorge L. Hernandez-Ardieta
Indra · Cybersecurity

Ph.D. in Computer Science

About

34
Publications
7,589
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
159
Citations
Introduction
Head of Cybersecurity Research Group at Indra, and Part Time Professor at University Carlos III of Madrid. Leading applied research and innovation in cybersecurity and cyberdefence.
Additional affiliations
February 2016 - present
Indra
Position
  • Head of Department
January 2013 - January 2016
Indra
Position
  • Head of Department
Description
  • The CRG conducts cutting-edge research and innovation in cybersecurity and cyberdefence, producing innovative solutions that effectively solve challenging open problems as well as counter advanced and emerging cyberthreats.
January 2010 - present
University Carlos III de Madrid
Position
  • Part Time Professor
Description
  • Affiliate Researcher
Education
November 2006 - March 2011
University Carlos III de Madrid
Field of study
  • Security in Information Technologies
October 2003 - September 2005
Universidad Autónoma de Madrid
Field of study
  • Computer Engineering
September 1999 - September 2003
Universidad Autónoma de Madrid
Field of study
  • Computer Engineering

Publications

Publications (34)
Article
Full-text available
This paper proposes NetVote, an internet voting protocol where usability and ease in deployment are a priority. We introduce the notion of strict coercion resistance, to distinguish between vote-buying and coercion resistance. We propose a protocol with ballot secrecy, practical everlasting privacy, verifiability and strict coercion resistance in t...
Chapter
This paper proposes a coercion-resistant internet voting protocol using a re-voting approach. It is not assumed for voters to own cryptographic keys prior to the election and the voting experience remains simple by only requiring voters to keep their authentication credentials. Furthermore, we reduce complexity in the filtering stage by leveraging...
Conference Paper
The consolidation of cyber threats as a primary concern of governments, the industry and society in general along with the ever increasing diversity and complexity of technology lie behind the recent explosion in the demand for highly skilled and trained cybersecurity professionals. In regard to this, much effort has been expended and many initiati...
Conference Paper
Full-text available
The rapid rate of change in technology and the increasing sophistication of cyber attacks require any organization to have a continuous preparation. However, the resource and time intensive nature of cybersecurity education and training renders traditional approaches highly inefficient. Simulators have attracted the attention in the last years as a...
Article
In Higher Education Engineering studies, there exists the need of engaging students in performing drill and practice activities with the goal of reinforcing routine mathematical skills. The usual optionality of these tasks entails the risk of students not fulfilling them in an effective way. Although competitive approaches are not a trend in curren...
Conference Paper
Full-text available
The globalisation and increasing complexity of modern cyber security operations have made it virtually impossible for any organisation to properly manage cyber threats and cyber incidents without leveraging various collaboration instruments with different partners and allies. This is especially relevant in certain areas of national security, like t...
Article
Non-repudiation is a desired property of current electronic transactions, by which a further repudiation of the commitments made by any involved party is prevented. Digital signatures are recognized by current standards and legislation as non-repudiation evidence that can be used to protect the parties involved in a transaction against the other's...
Article
Full-text available
An adequate enforcement process is essential to make road traffic fines effective. Automatising such process is intended to provide such effectiveness. However, current enforcement practices do not achieve this goal, as they usually have weaknesses regarding the reliable identification of the offender, the immediacy of feedback after the violation...
Conference Paper
Full-text available
Formal threat and risk analysis methodologies (TRA) are paramount to know and manage the risks to which information systems are exposed, reducing such risks to acceptable levels. On the other hand, Common Criteria (CC) is the reference standard methodology for the evaluation of the security of information technology products. The security target, a...
Conference Paper
Full-text available
The European Committee for Standardization (CEN), and in particular, the Technical Committee 224 Personal identification, electronic signature and cards and their related systems and operations - WG 17 Protection profiles in the context of electronic signature (CEN TC224 WG17), signed an agreement with the European Commission to update the existing...
Article
Full-text available
Traditional sensitive operations, like banking transactions, purchase processes, contract agreements etc. need to tie down the involved parties respecting the commitments made, avoiding a further repudiation of the responsibilities taken. Depending on the context, the commitment is made in one way or another, being handwritten signatures possibly t...
Conference Paper
Full-text available
Common Criteria (CC) establishes a methodology to evaluate the security claimed by information technology products. As a requisite of CC-based evaluations, the manufacturer has to provide a formal document named security target, in which a security problem definition must be included along with the security objectives met by the product and the imp...
Article
Full-text available
The STORK project aims to achieve the interoperability of the European electronic identifiers, which will allow European citizens to establish new e-relations with the Public Administration and private sectors. These new e-relations will be tested by means of pan-European pilots, with new service providers being connected to the platform on a regul...
Conference Paper
La firma electrónica se ha convertido en un elemento fundamental en la sociedad de la información, disfrutando del reconocimiento como medio de prueba en procedimientos legales. Así mismo, la firma electrónica es considerada una evidencia de no repudio respecto a los compromisos adquiridos por los participantes en una transacción electrónica. Sin e...
Conference Paper
Full-text available
El respaldo legal de la firma electrónica unido a su reconocimiento como evidencia de no repudio por parte de los estándares internacionales hace que la seguridad del proceso de creación de firmas sea una cuestión de suma importancia. Sin embargo, numerosos estudios demuestran que existe una gran variedad de ataques a entornos de creación de firmas...
Patent
Systems and methods for using cryptographic keys read an existing digital certificate from a hardware cryptographic device and extract a public key from the existing digital certificate. A certificate request message is generated that identifies a new usage and/or certificate field associated with the public key. The certificate request message is...
Conference Paper
Full-text available
Formal validation of security protocols is of utmost importance before they gain market or academic acceptance. In particular, the results obtained from the formal validation of the improved Optimistic Fair Exchange Protocol based on Signature Policies (OFEPSP+) are presented. OFEPSP+ ensures that no party gains an unfair advantage over the other d...
Conference Paper
Full-text available
Electronic signatures have been legally recognized as the key element for boosting e-commerce under secure conditions. Several legislations throughout the world establish electronic signatures as legally equivalent to hand-written signatures, assigning them the property of evidence in legal proceedings. In addition, international standards define e...
Conference Paper
Full-text available
A signature policy collects the rules to create and validate electronic signatures under which they become binding in a particular transactional context. These policies have been widely adopted to enforce the binding property of signatures in business scenarios. However, current standards only cover the definition of the requirements to be fulfille...
Conference Paper
Full-text available
El proyecto europeo STORK (Secure idenTity acrOss boRders linKed) pretende establecer una plataforma de interoperabilidad transfronteriza de las identidades electrónicas nacionales, lo que permitirá a los ciudadanos establecer nuevas e-relaciones en Europa basadas en la autenticación a través de su identidad electrónica. La Plataforma, pionera en E...
Article
The growth of the e-commerce has allowed companies and individuals to sell and purchase almost any kind of product and service through the Internet. However, during the purchase transaction there is a moment during which the seller has sensitive information from the buyer, typically his/her credit card information, while the buyer has nothing from...
Conference Paper
Full-text available
La firma electrónica como evidencia de no repudio ha adquirido un enorme respaldo tanto legal como de la propia industria. Para poder desarrollar aplicaciones de firma electrónica se necesita la existencia de una Infraestructura de Clave Pública (PKI) que permita la emisión y gestión de certificados digitales. No obstante, garantizar el no repudio...
Conference Paper
Full-text available
La aparición del comercio electrónico ha permitido a empresas y particulares la compraventa de todo tipo de productos y servicios a través de Internet. No obstante, durante la transacción de compra se produce una situación en la cual el vendedor posee la información necesaria del comprador – típicamente la información de la tarjeta de crédito – par...
Conference Paper
This paper proposes a simple solution to use reconfigurable hardware in the context of distributed applications. The remote access to the reconfigurable resources is carried out through Web Services technology. Distributed applications can exploit the synergies of these two technologies. In particular, a web service has been developed to remotely u...
Conference Paper
Este artículo propone una solución sencilla para la utilización de hardware reconfigurable en el contexto de aplicaciones distribuidas. Se ha elegido la tecnología de Servicios Web para proporcionar el acceso remoto a la plataforma reconfigurable. El objetivo es aprovechar las características propias de este tipo de servicios que facilitan el desar...
Conference Paper
This work presents a set of tools developed to implement new experiments in a remote laboratory based on reconfigurable platforms accessible through internet. The student experience has been focused on the design of digital circuits to solve an exercise on control systems. These practical experiences are an excellent complement to traditional desig...
Conference Paper
Full-text available
El proyecto europeo Emerge propone crear una red educativa que pretende la integración de experimentos de laboratorio accesibles en remoto desde Web. El objetivo final consiste en extender la utilización de los laboratorios fuera de las instituciones individuales que forman parte del proyecto. Mediante tecnologías Web e instrumentación controlada p...
Conference Paper
Full-text available
Se presentan los resultados obtenidos de la experiencia docente realizada en la asignatura de electrónica de segundo curso de ingeniería informática en la Universidad Autónoma de Madrid. Se ha incorporado un laboratorio accesible desde Web como complemento práctico de un curso de electrónica básica. El laboratorio Web dispone de una colección básic...
Conference Paper
In this paper, a framework for testing microprocessor prototypes is presented. A RISC microprocessor is designed by students using VHDL language and adapted to be implemented on a FPGA device. The correct behaviour of the designed microprocessor is checked executing test programs written and compiled by the students for this microprocessor. Using a...

Network

Cited By

Projects

Project (1)