The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Juan Manuel González Nieto: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague
    GBD Threshold Cryptography with an Application to RSA Key Recovery. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:394-405 [Conf]
  2. Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto
    Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:166-179 [Conf]
  3. Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto
    Protocols with Security Proofs for Mobile Applications. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:358-369 [Conf]
  4. Jason Smith, Juan Manuel González Nieto, Colin Boyd
    Modelling denial of service attacks on JFK with Meadows's cost-based framework. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2006, pp:125-134 [Conf]
  5. Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto
    SKMA: a key management architecture for SCADA systems. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2006, pp:183-192 [Conf]
  6. Jaimee Brown, Juan Manuel González Nieto, Colin Boyd
    Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:1-18 [Conf]
  7. Jaimee Brown, Ed Dawson, Juan Manuel González Nieto
    Implementation of the GBD Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:94-109 [Conf]
  8. Jason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji
    Detecting relay attacks with timing-based protocols. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:204-213 [Conf]
  9. Juan Manuel González Nieto, Ed Dawson, Eiji Okamoto
    Privacy and Trusted Computing. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:383-388 [Conf]
  10. Jason Reid, Andrew Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan
    Denial of Service Issues in Voice Over IP Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:230-237 [Conf]
  11. Juan Manuel González Nieto, Colin Boyd, Ed Dawson
    A Public Key Cryptosystem Based on the Subgroup Membership Problem. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:352-363 [Conf]
  12. Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson
    Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:296-309 [Conf]
  13. Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
    Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:17-32 [Conf]
  14. Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague
    A Password-Based Authenticator: Security Proof and Applications. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:388-401 [Conf]
  15. Jaimee Brown, Juan Manuel González Nieto, Colin Boyd
    Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:176-190 [Conf]
  16. Harikrishna Vasanta, Yiu Shing Terry Tin, Colin Boyd, Mark Looi, Juan Manuel González Nieto
    A Secure Framework for User Privacy in Heterogeneous Location Networks. [Citation Graph (0, 0)][DBLP]
    MATA, 2004, pp:264-274 [Conf]
  17. Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto
    Examining the DoS Resistance of HIP. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:616-625 [Conf]
  18. Colin Boyd, Juan Manuel González Nieto
    Round-Optimal Contributory Conference Key Agreement. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:161-174 [Conf]
  19. Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto
    Security-Mediated Certificateless Cryptography. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:508-524 [Conf]
  20. Rong Du, Ernest Foo, Juan González Nieto, Colin Boyd
    Designing Secure E-Tendering Systems. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:70-79 [Conf]
  21. Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
    Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:405-438 [Journal]
  22. Juan Manuel González Nieto, Colin Boyd, Ed Dawson
    A Public Key Cryptosystem Based On A Subgroup Membership Problem. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:3, pp:301-316 [Journal]
  23. Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson
    Key recovery for the commercial environment. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:3, pp:161-174 [Journal]
  24. Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto
    Toward Non-parallelizable Client Puzzles. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:247-264 [Conf]
  25. Mark Burdon, Juan Gonzalez Nieto, Sharon Christensen, Ed Dawson, W. D. Duncan, Bill Lane
    Access Control in Federated Databases: How Legal Issues Shape Security. [Citation Graph (0, 0)][DBLP]
    EGOV, 2007, pp:228-239 [Conf]

  26. Efficient One-Round Key Exchange in the Standard Model. [Citation Graph (, )][DBLP]


  27. How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. [Citation Graph (, )][DBLP]


  28. Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets. [Citation Graph (, )][DBLP]


  29. Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA. [Citation Graph (, )][DBLP]


  30. Universally composable contributory group key exchange. [Citation Graph (, )][DBLP]


  31. Low-Cost and Strong-Security RFID Authentication Protocol. [Citation Graph (, )][DBLP]


  32. HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System. [Citation Graph (, )][DBLP]


  33. Generic One Round Group Key Exchange in the Standard Model. [Citation Graph (, )][DBLP]


  34. Efficient Certificateless KEM in the Standard Model. [Citation Graph (, )][DBLP]


  35. On the Connection Between Signcryption and One-Pass Key Establishment. [Citation Graph (, )][DBLP]


  36. Verifier-Key-Flexible Universal Designated-Verifier Signatures. [Citation Graph (, )][DBLP]


  37. Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP). [Citation Graph (, )][DBLP]


  38. RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  39. Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. [Citation Graph (, )][DBLP]


  40. Faster Pairings on Special Weierstrass Curves. [Citation Graph (, )][DBLP]


  41. Strongly Secure Certificateless Key Agreement. [Citation Graph (, )][DBLP]


  42. Delaying Mismatched Field Multiplications in Pairing Computations. [Citation Graph (, )][DBLP]


  43. Avoiding Full Extension Field Arithmetic in Pairing Computations. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002