The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

José María Sierra: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Julio César Hernández Castro, José María Sierra, Pedro Isasi, Arturo Ribagorda
    Genetic Cryptoanalysis of Two Rounds TEA. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2002, pp:1024-1031 [Conf]
  2. Almudena Alcaide, Juan M. Estévez-Tapiador, Antonio Izquierdo, José María Sierra
    A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2005, pp:1309-1318 [Conf]
  3. Carlos Javier Hernández Castro, L. Javier García-Villalba, Julio César Hernández Castro, José María Sierra
    On MARS's s-boxes Strength against Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2003, pp:79-83 [Conf]
  4. Julio César Hernández Castro, José María Sierra, André Seznec
    The SAC Test: A New Randomness Test, with Some Applications to PRNG Analysis. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:960-967 [Conf]
  5. Antonio Izquierdo, José María Sierra, Julio César Hernández Castro, Arturo Ribagorda
    Security Issues in Network File Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:812-820 [Conf]
  6. José María Sierra, Julio César Hernández, Almudena Alcaide, Joaquín Torres Márquez
    Validating the Use of BAN LOGIC. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:851-858 [Conf]
  7. José María Sierra, Julio César Hernández, Eva Ponce, Jaime Manera
    Marketing on Internet Communications Security for Online Bank Transactions. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2005, pp:1301-1308 [Conf]
  8. José María Sierra, Julio César Hernández Castro, Eva Ponce, Arturo Ribagorda
    Protection of Multiagent Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2003, pp:123-128 [Conf]
  9. Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos, J. Carlos Mex-Perera
    Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:374-377 [Conf]
  10. David Sánchez, Agustín Orfila, Julio César Hernández Castro, José María Sierra
    Robust New Method in Frequency Domain Watermarking. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:166-182 [Conf]
  11. Benjamín Ramos, José María Sierra, Daniel Garzón Rubio
    Modelo de Seguridad en Bases de Datos: Autenticación Mediante Contraseñas de Un Solo Uso y Cifrado Mediante un Sistema Pseudo-asimétrico. [Citation Graph (0, 0)][DBLP]
    JIDBD, 1997, pp:189-190 [Conf]
  12. José María Sierra, Julio César Hernández Castro, Antonio Izquierdo, Arturo Ribagorda
    Secure Communications in Multi-Agent Systems Protecting KQML. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:305-313 [Conf]
  13. Julio César Hernández Castro, Eva María Cebrián, José María Sierra, Arturo Ribagorda, Benjamín Ramos
    Project WebOracle: Developing an advanced web server security assesment tool. [Citation Graph (0, 0)][DBLP]
    WebNet, 2001, pp:526-529 [Conf]
  14. Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos
    Search Engines as a security thread. [Citation Graph (0, 0)][DBLP]
    WebNet, 2001, pp:530-533 [Conf]
  15. Antonio Izquierdo Manzanares, José María Sierra, Joaquín Torres Márquez
    On the implementation of security policies with adaptative encryption. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2750-2758 [Journal]
  16. Joaquín Torres Márquez, Antonio Izquierdo, José María Sierra, Arturo Ribagorda
    Towards self-authenticable smart cards. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2781-2787 [Journal]
  17. José María Sierra
    Editorial for the special issue on Internet Communications Security. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2737-2738 [Journal]
  18. Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos
    Search Engines as a Security Threat. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:10, pp:25-30 [Journal]
  19. Javier Ignacio Carbó Rubiera, José María Sierra
    Fast and Secure Recommendations Protocols among Members of a Community of Agents. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:63, n:, pp:- [Journal]
  20. José María Sierra, Julio César Hernández Castro, Narayana Jayaram, Arturo Ribagorda
    Low computational cost integrity for block ciphers. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2004, v:20, n:5, pp:857-863 [Journal]
  21. Julio César Hernández Castro, José María Sierra, André Seznec, Antonio Izquierdo, Arturo Ribagorda
    The strict avalanche criterion randomness test. [Citation Graph (0, 0)][DBLP]
    Mathematics and Computers in Simulation, 2005, v:68, n:1, pp:1-7 [Journal]
  22. Mildrey Carbonell, José María Sierra, Joaquín Torres Márquez, Antonio Izquierdo
    Security analysis of a new multi-party payment protocol with intermediary service. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:698-702 [Conf]
  23. Mildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier Lopez, Jianying Zhou
    Estimation of TTP Features in Non-repudiation Service. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:549-558 [Conf]
  24. Antonio Izquierdo, Joaquín Torres Márquez, José María Sierra, Mildrey Carbonell
    Using Adaptative Encryption for Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:540-548 [Conf]
  25. Joaquín Torres Márquez, Antonio Izquierdo, José María Sierra
    Advances in network smart cards authentication. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:9, pp:2249-2261 [Journal]

  26. Application of Network Smart Cards to Citizens Identification Systems. [Citation Graph (, )][DBLP]


  27. Network Smart Card Performing U(SIM) Functionalities in AAA Protocol Architectures. [Citation Graph (, )][DBLP]


  28. Secure multiparty payment with an intermediary entity. [Citation Graph (, )][DBLP]


Search in 0.149secs, Finished in 0.152secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002