The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Javier Lopez: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Isaac Agudo, Javier Lopez, José A. Montenegro
    Graphical Representation of Authorization Policies for Weighted Credentials. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:383-394 [Conf]
  2. Javier Lopez, Niko Myller, Erkki Sutinen
    Sorting out sorting through concretization with robotics. [Citation Graph (0, 0)][DBLP]
    AVI, 2004, pp:377-380 [Conf]
  3. Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier Lopez
    A Novel Method to Maintain Privacy in Mobile Agent Applications. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:247-260 [Conf]
  4. Isaac Agudo, Javier Lopez, José A. Montenegro
    Attribute Delegation Based on Ontologies and Context Information. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:54-66 [Conf]
  5. Javier Lopez, Juan J. Ortega, Jose Vivas, José M. Troya
    How to Specify Security Services: A Practical Approach. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:158-171 [Conf]
  6. Javier Lopez, Antonio Mana, Juan J. Ortega
    Cert'eM: Certification System Based on Electronic Mail Service Structure. [Citation Graph (0, 0)][DBLP]
    CQRE, 1999, pp:109-118 [Conf]
  7. Javier Lopez, Antonio Mana, Juan J. Ortega, José M. Troya
    Distributed Storage and Revocation in Digital Certificate Databases. [Citation Graph (0, 0)][DBLP]
    DEXA, 2000, pp:929-938 [Conf]
  8. Jorge Davila, Javier Lopez, Antonio Mana, Juan J. Ortega, José M. Troya
    Development of Secure Internet Applications for Governmental Environments. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 2000, pp:362-368 [Conf]
  9. Sigrid Gürgens, Javier Lopez, René Peralta
    Efficient Detection of Failure Modes in Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1999, pp:850-857 [Conf]
  10. Javier Lopez, Günther Pernul
    Message from the TrustBus Workshop Chairs. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:409-412 [Conf]
  11. Antonio Muñoz, Jose Antonio Onieva, Javier Lopez
    On Secure Profiling. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2005, pp:214-218 [Conf]
  12. Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Javier Lopez, José M. Troya
    Applying the Semantic Web Layers to Access Control. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:622-626 [Conf]
  13. Javier Lopez, Antonio Mana, Mariemma Inmaculada Yagüe del Valle
    XML-Based Distributed Access Control System. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2002, pp:203-213 [Conf]
  14. Javier Lopez, Antonio Mana, José A. Montenegro, Juan J. Ortega, José M. Troya
    Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations. [Citation Graph (0, 0)][DBLP]
    EGOV, 2002, pp:211-214 [Conf]
  15. Javier Lopez, Rolf Oppliger, Günther Pernul
    Classifying Public Key Certificates. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:135-143 [Conf]
  16. Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Javier Lopez, Ernesto Pimentel, José M. Troya
    Secure Content Distribution for Digital Libraries. [Citation Graph (0, 0)][DBLP]
    ICADL, 2002, pp:483-494 [Conf]
  17. Mildrey Carbonell, Jose Antonio Onieva, Javier Lopez, Deborah Galpert, Jianying Zhou
    Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:903-914 [Conf]
  18. Rodrigo Roman, Jianying Zhou, Javier Lopez
    On the Security of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2005, pp:681-690 [Conf]
  19. Jose Antonio Onieva, Jianying Zhou, Javier Lopez
    Practical Service Charge for P2P Content Distribution. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:112-123 [Conf]
  20. Javier Lopez, Antonio Mana, Ernesto Pimentel, José M. Troya, Mariemma Inmaculada Yagüe del Valle
    Access Control Infrastructure for Digital Objects. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:399-410 [Conf]
  21. Jose Antonio Onieva, Jianying Zhou, Javier Lopez
    Attacking an Asynchronous Multi-party Contract Signing Protocol. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:311-321 [Conf]
  22. Javier Lopez, José A. Montenegro, Rodrigo Roman, Jorge Davila
    Design of a VPN Software Solution Integrating TCP and UDP Services. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:325-338 [Conf]
  23. Javier Lopez, Juan J. Ortega, José M. Troya
    Protocol Engineering Applied to Formal Analysis of Security Systems. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:246-259 [Conf]
  24. Sigrid Gürgens, Javier Lopez
    Suitability of a Classical Analysis Method for E-commerce Protocols. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:46-62 [Conf]
  25. Jorge Davila, Javier Lopez, René Peralta
    Implementation of Virtual Private Networks at the Transport Layer. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:85-102 [Conf]
  26. Ed Dawson, Javier Lopez, José A. Montenegro, Eiji Okamoto
    A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:136-149 [Conf]
  27. José Luis Vivas, José A. Montenegro, Javier Lopez
    Towards a Business Process-Driven Framework for Security Engineering with the UML. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:381-395 [Conf]
  28. Isaac Agudo, Javier Lopez, José A. Montenegro
    A Representation Model of Trust Relationships with Delegation Extensions. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:116-130 [Conf]
  29. Sokratis K. Katsikas, Javier Lopez, Günther Pernul
    Trust, Privacy and Security in E-Business: Requirements and Solutions. [Citation Graph (0, 0)][DBLP]
    Panhellenic Conference on Informatics, 2005, pp:548-558 [Conf]
  30. Vicente Benjumea, Javier Lopez, José A. Montenegro, José M. Troya
    A First Approach to Provide Anonymity in Attribute Certificates. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:402-415 [Conf]
  31. Javier Lopez, Juan J. Ortega, José M. Troya
    Applying SDL to Formal Analysis of Security Systems. [Citation Graph (0, 0)][DBLP]
    SDL Forum, 2003, pp:300-316 [Conf]
  32. Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez
    A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:37-48 [Conf]
  33. Rodrigo Roman, Jianying Zhou, Javier Lopez
    Protection Against Spam Using Pre-Challenges. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:281-294 [Conf]
  34. Jianying Zhou, Jose Antonio Onieva, Javier Lopez
    A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:221-232 [Conf]
  35. Javier Lopez, José A. Montenegro, Rodrigo Roman
    Service-Oriented Security Architecture for CII based on Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SecPerU, 2006, pp:1-6 [Conf]
  36. Javier Lopez, Juan J. Ortega, José M. Troya
    Verification of Authentication Protocols using SDL-method. [Citation Graph (0, 0)][DBLP]
    SIS, 2002, pp:61-71 [Conf]
  37. Javier Lopez, Antonio Maña, Antonio Muñoz
    A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:977-987 [Conf]
  38. Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez
    Intermediary Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP]
    CEC, 2003, pp:207-214 [Conf]
  39. Jianying Zhou, Jose Antonio Onieva, Javier Lopez
    Analysis of a Free Roaming Agent Result-Truncation Defense Scheme. [Citation Graph (0, 0)][DBLP]
    CEC, 2004, pp:221-226 [Conf]
  40. Jose Antonio Onieva, Jianying Zhou, Javier Lopez
    Non-repudiation protocols for multiple entities. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:16, pp:1608-1616 [Journal]
  41. Selwyn Russell, Ed Dawson, Eiji Okamoto, Javier Lopez
    Virtual certificates and synthetic certificates: new paradigms for improving public key validation. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:16, pp:1826-1838 [Journal]
  42. Rodrigo Roman, Jianying Zhou, Javier Lopez
    An anti-spam scheme using pre-challenges. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2739-2749 [Journal]
  43. Javier Lopez, Rolf Oppliger, Günther Pernul
    Authentication and authorization infrastructures (AAIs): a comparative survey. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:7, pp:578-590 [Journal]
  44. Sokratis K. Katsikas, Javier Lopez, Günther Pernul
    Editorial. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
  45. Rodrigo Roman, Javier Lopez, Jianying Zhou
    Casual virtual private network. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2005, v:20, n:3, pp:- [Journal]
  46. Sokratis K. Katsikas, Javier Lopez, Günther Pernul
    Trust, privacy and security in digital business. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
  47. Jose Antonio Onieva, Jianying Zhou, Javier Lopez, Mildrey Carbonell
    Agent-mediated non-repudiation protocols. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research and Applications, 2004, v:3, n:2, pp:152-162 [Journal]
  48. Jianying Zhou, Javier Lopez
    Preface. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:2, pp:65-66 [Journal]
  49. Sigrid Gürgens, Javier Lopez, René Peralta
    Analysis of e-commerce protocols: Adapting a traditional technique. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2003, v:2, n:1, pp:21-36 [Journal]
  50. Javier Lopez, Antonio Mana, José A. Montenegro, Juan J. Ortega
    PKI design based on the use of on-line certification authorities. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:2, n:2, pp:91-102 [Journal]
  51. Antonio Mana, Javier Lopez, Juan J. Ortega, Ernesto Pimentel, José M. Troya
    A framework for secure execution of software. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:3, n:2, pp:99-112 [Journal]
  52. Javier Lopez
    Unleashing public-key cryptography in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:5, pp:469-482 [Journal]
  53. Vicente Benjumea, Javier Lopez, José María Troya Linero
    Specification of a framework for the anonymous use of privileges. [Citation Graph (0, 0)][DBLP]
    Telematics and Informatics, 2006, v:23, n:3, pp:179-195 [Journal]
  54. Vicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung
    Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:265-281 [Conf]
  55. Javier Lopez, Cristina Alcaraz, Rodrigo Roman
    On the Protection and Technologies of Critical Information Infrastructures. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:160-182 [Conf]
  56. Mildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier Lopez, Jianying Zhou
    Estimation of TTP Features in Non-repudiation Service. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:549-558 [Conf]

  57. A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  58. Fair Traceable Multi-Group Signatures. [Citation Graph (, )][DBLP]


  59. Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  60. Ksensor: Multithreaded kernel-level probe for passive QoS monitoring. [Citation Graph (, )][DBLP]


  61. Delegating Privileges over Finite Resources: A Quota Based Delegation Approach. [Citation Graph (, )][DBLP]


  62. An Asynchronous Node Replication Attack in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  63. A Model for Trust Metrics Analysis. [Citation Graph (, )][DBLP]


  64. Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems. [Citation Graph (, )][DBLP]


  65. 3G HSPA for Broadband Communications with High Speed Vehicles. [Citation Graph (, )][DBLP]


  66. Featuring trust and reputation management systems for constrained hardware devices. [Citation Graph (, )][DBLP]


  67. Attribute delegation in ubiquitous environments. [Citation Graph (, )][DBLP]


  68. Implementation aspects of a delegation system. [Citation Graph (, )][DBLP]


  69. Trust management systems for wireless sensor networks: Best practices. [Citation Graph (, )][DBLP]


  70. Editorial. [Citation Graph (, )][DBLP]


  71. Secure multiparty payment with an intermediary entity. [Citation Graph (, )][DBLP]


  72. Certified electronic mail: Properties revisited. [Citation Graph (, )][DBLP]


  73. Pervasive authentication and authorization infrastructures for mobile users. [Citation Graph (, )][DBLP]


  74. Editorial. [Citation Graph (, )][DBLP]


  75. Concurrent access control for multi-user and multi-processor systems based on trust relationships. [Citation Graph (, )][DBLP]


  76. Multiparty nonrepudiation: A survey. [Citation Graph (, )][DBLP]


  77. An Evolutionary Trust and Distrust Model. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.010secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002