|
Search the dblp DataBase
Juan Manuel González Nieto:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague
GBD Threshold Cryptography with an Application to RSA Key Recovery. [Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:394-405 [Conf]
- Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto
Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:166-179 [Conf]
- Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto
Protocols with Security Proofs for Mobile Applications. [Citation Graph (0, 0)][DBLP] ACISP, 2004, pp:358-369 [Conf]
- Jason Smith, Juan Manuel González Nieto, Colin Boyd
Modelling denial of service attacks on JFK with Meadows's cost-based framework. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2006, pp:125-134 [Conf]
- Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto
SKMA: a key management architecture for SCADA systems. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2006, pp:183-192 [Conf]
- Jaimee Brown, Juan Manuel González Nieto, Colin Boyd
Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. [Citation Graph (0, 0)][DBLP] CANS, 2006, pp:1-18 [Conf]
- Jaimee Brown, Ed Dawson, Juan Manuel González Nieto
Implementation of the GBD Cryptosystem. [Citation Graph (0, 0)][DBLP] Cryptographic Algorithms and their Uses, 2004, pp:94-109 [Conf]
- Jason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji
Detecting relay attacks with timing-based protocols. [Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:204-213 [Conf]
- Juan Manuel González Nieto, Ed Dawson, Eiji Okamoto
Privacy and Trusted Computing. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2003, pp:383-388 [Conf]
- Jason Reid, Andrew Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan
Denial of Service Issues in Voice Over IP Networks. [Citation Graph (0, 0)][DBLP] ICETE (2), 2004, pp:230-237 [Conf]
- Juan Manuel González Nieto, Colin Boyd, Ed Dawson
A Public Key Cryptosystem Based on the Subgroup Membership Problem. [Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:352-363 [Conf]
- Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. [Citation Graph (0, 0)][DBLP] ICISC, 2006, pp:296-309 [Conf]
- Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:17-32 [Conf]
- Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague
A Password-Based Authenticator: Security Proof and Applications. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:388-401 [Conf]
- Jaimee Brown, Juan Manuel González Nieto, Colin Boyd
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2006, pp:176-190 [Conf]
- Harikrishna Vasanta, Yiu Shing Terry Tin, Colin Boyd, Mark Looi, Juan Manuel González Nieto
A Secure Framework for User Privacy in Heterogeneous Location Networks. [Citation Graph (0, 0)][DBLP] MATA, 2004, pp:264-274 [Conf]
- Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto
Examining the DoS Resistance of HIP. [Citation Graph (0, 0)][DBLP] OTM Workshops (1), 2006, pp:616-625 [Conf]
- Colin Boyd, Juan Manuel González Nieto
Round-Optimal Contributory Conference Key Agreement. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2003, pp:161-174 [Conf]
- Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto
Security-Mediated Certificateless Cryptography. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2006, pp:508-524 [Conf]
- Rong Du, Ernest Foo, Juan González Nieto, Colin Boyd
Designing Secure E-Tendering Systems. [Citation Graph (0, 0)][DBLP] TrustBus, 2005, pp:70-79 [Conf]
- Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. [Citation Graph (0, 0)][DBLP] Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:405-438 [Journal]
- Juan Manuel González Nieto, Colin Boyd, Ed Dawson
A Public Key Cryptosystem Based On A Subgroup Membership Problem. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2005, v:36, n:3, pp:301-316 [Journal]
- Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson
Key recovery for the commercial environment. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2002, v:1, n:3, pp:161-174 [Journal]
- Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto
Toward Non-parallelizable Client Puzzles. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:247-264 [Conf]
- Mark Burdon, Juan Gonzalez Nieto, Sharon Christensen, Ed Dawson, W. D. Duncan, Bill Lane
Access Control in Federated Databases: How Legal Issues Shape Security. [Citation Graph (0, 0)][DBLP] EGOV, 2007, pp:228-239 [Conf]
Efficient One-Round Key Exchange in the Standard Model. [Citation Graph (, )][DBLP]
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. [Citation Graph (, )][DBLP]
Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets. [Citation Graph (, )][DBLP]
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA. [Citation Graph (, )][DBLP]
Universally composable contributory group key exchange. [Citation Graph (, )][DBLP]
Low-Cost and Strong-Security RFID Authentication Protocol. [Citation Graph (, )][DBLP]
HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System. [Citation Graph (, )][DBLP]
Generic One Round Group Key Exchange in the Standard Model. [Citation Graph (, )][DBLP]
Efficient Certificateless KEM in the Standard Model. [Citation Graph (, )][DBLP]
On the Connection Between Signcryption and One-Pass Key Establishment. [Citation Graph (, )][DBLP]
Verifier-Key-Flexible Universal Designated-Verifier Signatures. [Citation Graph (, )][DBLP]
Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP). [Citation Graph (, )][DBLP]
RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. [Citation Graph (, )][DBLP]
Faster Pairings on Special Weierstrass Curves. [Citation Graph (, )][DBLP]
Strongly Secure Certificateless Key Agreement. [Citation Graph (, )][DBLP]
Delaying Mismatched Field Multiplications in Pairing Computations. [Citation Graph (, )][DBLP]
Avoiding Full Extension Field Arithmetic in Pairing Computations. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.006secs
|