The SCEAS System
| |||||||

## Search the dblp DataBase
Juan Manuel González Nieto:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague
**GBD Threshold Cryptography with an Application to RSA Key Recovery.**[Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:394-405 [Conf] - Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto
**Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach.**[Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:166-179 [Conf] - Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto
**Protocols with Security Proofs for Mobile Applications.**[Citation Graph (0, 0)][DBLP] ACISP, 2004, pp:358-369 [Conf] - Jason Smith, Juan Manuel González Nieto, Colin Boyd
**Modelling denial of service attacks on JFK with Meadows's cost-based framework.**[Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2006, pp:125-134 [Conf] - Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto
**SKMA: a key management architecture for SCADA systems.**[Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2006, pp:183-192 [Conf] - Jaimee Brown, Juan Manuel González Nieto, Colin Boyd
**Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems.**[Citation Graph (0, 0)][DBLP] CANS, 2006, pp:1-18 [Conf] - Jaimee Brown, Ed Dawson, Juan Manuel González Nieto
**Implementation of the GBD Cryptosystem.**[Citation Graph (0, 0)][DBLP] Cryptographic Algorithms and their Uses, 2004, pp:94-109 [Conf] - Jason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji
**Detecting relay attacks with timing-based protocols.**[Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:204-213 [Conf] - Juan Manuel González Nieto, Ed Dawson, Eiji Okamoto
**Privacy and Trusted Computing.**[Citation Graph (0, 0)][DBLP] DEXA Workshops, 2003, pp:383-388 [Conf] - Jason Reid, Andrew Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan
**Denial of Service Issues in Voice Over IP Networks.**[Citation Graph (0, 0)][DBLP] ICETE (2), 2004, pp:230-237 [Conf] - Juan Manuel González Nieto, Colin Boyd, Ed Dawson
**A Public Key Cryptosystem Based on the Subgroup Membership Problem.**[Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:352-363 [Conf] - Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson
**Klein Bottle Routing: An Alternative to Onion Routing and Mix Network.**[Citation Graph (0, 0)][DBLP] ICISC, 2006, pp:296-309 [Conf] - Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
**Tripartite Key Exchange in the Canetti-Krawczyk Proof Model.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:17-32 [Conf] - Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague
**A Password-Based Authenticator: Security Proof and Applications.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:388-401 [Conf] - Jaimee Brown, Juan Manuel González Nieto, Colin Boyd
**Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2006, pp:176-190 [Conf] - Harikrishna Vasanta, Yiu Shing Terry Tin, Colin Boyd, Mark Looi, Juan Manuel González Nieto
**A Secure Framework for User Privacy in Heterogeneous Location Networks.**[Citation Graph (0, 0)][DBLP] MATA, 2004, pp:264-274 [Conf] - Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto
**Examining the DoS Resistance of HIP.**[Citation Graph (0, 0)][DBLP] OTM Workshops (1), 2006, pp:616-625 [Conf] - Colin Boyd, Juan Manuel González Nieto
**Round-Optimal Contributory Conference Key Agreement.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2003, pp:161-174 [Conf] - Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto
**Security-Mediated Certificateless Cryptography.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2006, pp:508-524 [Conf] - Rong Du, Ernest Foo, Juan González Nieto, Colin Boyd
**Designing Secure E-Tendering Systems.**[Citation Graph (0, 0)][DBLP] TrustBus, 2005, pp:70-79 [Conf] - Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
**Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model.**[Citation Graph (0, 0)][DBLP] Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:405-438 [Journal] - Juan Manuel González Nieto, Colin Boyd, Ed Dawson
**A Public Key Cryptosystem Based On A Subgroup Membership Problem.**[Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2005, v:36, n:3, pp:301-316 [Journal] - Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson
**Key recovery for the commercial environment.**[Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2002, v:1, n:3, pp:161-174 [Journal] - Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto
**Toward Non-parallelizable Client Puzzles.**[Citation Graph (0, 0)][DBLP] CANS, 2007, pp:247-264 [Conf] - Mark Burdon, Juan Gonzalez Nieto, Sharon Christensen, Ed Dawson, W. D. Duncan, Bill Lane
**Access Control in Federated Databases: How Legal Issues Shape Security.**[Citation Graph (0, 0)][DBLP] EGOV, 2007, pp:228-239 [Conf] **Efficient One-Round Key Exchange in the Standard Model.**[Citation Graph (, )][DBLP]**How to Extract and Expand Randomness: A Summary and Explanation of Existing Results.**[Citation Graph (, )][DBLP]**Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets.**[Citation Graph (, )][DBLP]**Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA.**[Citation Graph (, )][DBLP]**Universally composable contributory group key exchange.**[Citation Graph (, )][DBLP]**Low-Cost and Strong-Security RFID Authentication Protocol.**[Citation Graph (, )][DBLP]**HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System.**[Citation Graph (, )][DBLP]**Generic One Round Group Key Exchange in the Standard Model.**[Citation Graph (, )][DBLP]**Efficient Certificateless KEM in the Standard Model.**[Citation Graph (, )][DBLP]**On the Connection Between Signcryption and One-Pass Key Establishment.**[Citation Graph (, )][DBLP]**Verifier-Key-Flexible Universal Designated-Verifier Signatures.**[Citation Graph (, )][DBLP]**Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP).**[Citation Graph (, )][DBLP]**RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks.**[Citation Graph (, )][DBLP]**Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols.**[Citation Graph (, )][DBLP]**Faster Pairings on Special Weierstrass Curves.**[Citation Graph (, )][DBLP]**Strongly Secure Certificateless Key Agreement.**[Citation Graph (, )][DBLP]**Delaying Mismatched Field Multiplications in Pairing Computations.**[Citation Graph (, )][DBLP]**Avoiding Full Extension Field Arithmetic in Pairing Computations.**[Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.007secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |