The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Paz Morillo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Paz Morillo, Miguel Angel Fiol, J. Guitart
    On the (d, D, D, s) - Digraph Problem. [Citation Graph (0, 0)][DBLP]
    AAECC, 1987, pp:334-340 [Conf]
  2. David Galindo, Paz Morillo, Carla Ràfols
    Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:81-91 [Conf]
  3. Ch. Marco, Paz Morillo
    The Use of Elliptic Curves in Smart Cards. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (1), 1994, pp:271-275 [Conf]
  4. Ch. Marco, Paz Morillo
    A New Algorithm for Smart Cards. [Citation Graph (0, 0)][DBLP]
    IFIP World Conference on Mobile Communications, 1996, pp:301-308 [Conf]
  5. David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar
    Easy Verifiable Primitives and Practical Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:69-83 [Conf]
  6. David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar
    A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:279-291 [Conf]
  7. Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar
    Computing the order of points on an elliptic curve modulo N is as difficult as factoring N. [Citation Graph (0, 0)][DBLP]
    Appl. Math. Lett., 2001, v:14, n:3, pp:341-346 [Journal]
  8. José Gómez, Paz Morillo, Carles Padró
    Large (d, D, D', s) - bipartite Digraphs. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 1995, v:59, n:2, pp:103-114 [Journal]
  9. Carles Padró, Ignacio Gracia, Sebastià Martín Molleví, Paz Morillo
    Linear Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2003, v:128, n:1, pp:223-238 [Journal]
  10. Carles Padró, Paz Morillo, Eduard Llobet Valero
    Diameter-vulnerability of Large Bipartite Digraphs. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 1996, v:64, n:3, pp:239-248 [Journal]
  11. Carles Padró, Ignacio Gracia, Sebastià Martín Molleví, Paz Morillo
    Linear Key Predistribution Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2002, v:25, n:3, pp:281-298 [Journal]
  12. Vanesa Daza, Paz Morillo, Carla Ràfols
    On Dynamic Distribution of Private Keys over MANETs. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:171, n:1, pp:33-41 [Journal]
  13. David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar
    Fujisaki-Okamoto hybrid encryption revisited. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:4, pp:228-241 [Journal]
  14. Paz Morillo, Carles Padró, Germán Sáez, Jorge Luis Villar
    Weighted Threshold Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:70, n:5, pp:211-216 [Journal]
  15. Carles Padró, Paz Morillo, Xavier Muñoz
    Fault-Tolerant Fixed Routings in Some Families of Digraphs. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 1998, v:11, n:3, pp:501-509 [Journal]
  16. Carles Padró, Paz Morillo, Miguel Angel Fiol
    Comments on "Line Digraph Iterations and Connectivity Analysis of de Bruijn and Kautz Graphs". [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1996, v:45, n:6, pp:768- [Journal]
  17. Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols
    CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. [Citation Graph (0, 0)][DBLP]
    ProvSec, 2007, pp:35-50 [Conf]
  18. Carles Padró, Paz Morillo
    Diameter vulnerability of iterated line digraphs. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1996, v:149, n:1-3, pp:189-204 [Journal]

  19. The Security of All Bits Using List Decoding. [Citation Graph (, )][DBLP]


  20. Cryptographic techniques for mobile ad-hoc networks. [Citation Graph (, )][DBLP]


  21. Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts. [Citation Graph (, )][DBLP]


Search in 0.028secs, Finished in 0.029secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002