2009 | ||
---|---|---|
79 | EE | Tarik Taleb, Javier Lopez: Next generation wireless communications and mobile computing/networking technologies. Wireless Communications and Mobile Computing 9(4): 441-443 (2009) |
2008 | ||
78 | EE | David Galindo, Rodrigo Roman, Javier Lopez: A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. CANS 2008: 120-132 |
77 | EE | Vicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung: Fair Traceable Multi-Group Signatures. Financial Cryptography 2008: 231-246 |
76 | EE | Isaac Agudo, M. Carmen Fernández Gago, Javier Lopez: Delegating Privileges over Finite Resources: A Quota Based Delegation Approach. Formal Aspects in Security and Trust 2008: 302-315 |
75 | EE | Jianying Zhou, Tanmoy Kanti Das, Javier Lopez: An Asynchronous Node Replication Attack in Wireless Sensor Networks. SEC 2008: 125-139 |
74 | EE | Isaac Agudo, M. Carmen Fernández Gago, Javier Lopez: A Model for Trust Metrics Analysis. TrustBus 2008: 28-37 |
73 | EE | Jose Antonio Onieva, Jianying Zhou, Javier Lopez: Multiparty nonrepudiation: A survey. ACM Comput. Surv. 41(1): (2008) |
72 | EE | Isaac Agudo, Javier Lopez, José A. Montenegro: Enabling Attribute Delegation in Ubiquitous Environments. MONET 13(3-4): 398-410 (2008) |
2007 | ||
71 | Javier Lopez, Pierangela Samarati, Josep L. Ferrer: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings Springer 2007 | |
70 | Joachim Biskup, Javier Lopez: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings Springer 2007 | |
69 | EE | Rodrigo Roman, M. Carmen Fernández Gago, Javier Lopez: Featuring trust and reputation management systems for constrained hardware devices. Autonomics 2007: 6 |
68 | EE | Vicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung: Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication. CANS 2007: 265-281 |
67 | EE | Javier Lopez, Cristina Alcaraz, Rodrigo Roman: On the Protection and Technologies of Critical Information Infrastructures. FOSAD 2007: 160-182 |
66 | EE | Mildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier Lopez, Jianying Zhou: Estimation of TTP Features in Non-repudiation Service. ICCSA (2) 2007: 549-558 |
65 | EE | Alejandro Muñoz, Armando Ferro, Fidel Liberal, Javier Lopez: Ksensor: Multithreaded kernel-level probe for passive QoS monitoring. ICPADS 2007: 1-8 |
64 | EE | Isaac Agudo, Javier Lopez, José A. Montenegro: Attribute delegation in ubiquitous environments. MobiMedia 2007: 43 |
63 | EE | Isaac Agudo, Javier Lopez, José A. Montenegro: Implementation aspects of a delegation system. MobiMedia 2007: 50 |
62 | EE | Rodrigo Roman, Cristina Alcaraz, Javier Lopez: A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes. MONET 12(4): 231-244 (2007) |
61 | EE | Jose Antonio Onieva, Javier Lopez, Rodrigo Roman, Jianying Zhou, Stefanos Gritzalis: Integration of non-repudiation services in mobile DRM scenarios. Telecommunication Systems 35(3-4): 161-176 (2007) |
2006 | ||
60 | Sokratis K. Katsikas, Javier Lopez, Michael Backes, Stefanos Gritzalis, Bart Preneel: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings Springer 2006 | |
59 | EE | Isaac Agudo, Javier Lopez, José A. Montenegro: Graphical Representation of Authorization Policies for Weighted Credentials. ACISP 2006: 383-394 |
58 | EE | Isaac Agudo, Javier Lopez, José A. Montenegro: Attribute Delegation Based on Ontologies and Context Information. Communications and Multimedia Security 2006: 54-66 |
57 | EE | Jianying Zhou, Jose Antonio Onieva, Javier Lopez: A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. SEC 2006: 221-232 |
56 | EE | Javier Lopez, José A. Montenegro, Rodrigo Roman: Service-Oriented Security Architecture for CII based on Sensor Networks. SecPerU 2006: 1-6 |
55 | EE | Javier Lopez, Antonio Maña, Antonio Muñoz: A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios. UIC 2006: 977-987 |
54 | EE | Rodrigo Roman, Jianying Zhou, Javier Lopez: An anti-spam scheme using pre-challenges. Computer Communications 29(15): 2739-2749 (2006) |
53 | EE | Jianying Zhou, Javier Lopez: Preface. Int. J. Inf. Sec. 5(2): 65-66 (2006) |
52 | EE | Javier Lopez: Unleashing public-key cryptography in wireless sensor networks. Journal of Computer Security 14(5): 469-482 (2006) |
51 | EE | Vicente Benjumea, Javier Lopez, José María Troya Linero: Specification of a framework for the anonymous use of privileges. Telematics and Informatics 23(3): 179-195 (2006) |
2005 | ||
50 | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings Springer 2005 | |
49 | Jianying Zhou, Javier Lopez, Robert H. Deng, Feng Bao: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings Springer 2005 | |
48 | Sihan Qing, Wenbo Mao, Javier Lopez, Guilin Wang: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings Springer 2005 | |
47 | EE | Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier Lopez: A Novel Method to Maintain Privacy in Mobile Agent Applications. CANS 2005: 247-260 |
46 | EE | Antonio Muñoz, Jose Antonio Onieva, Javier Lopez: On Secure Profiling. DEXA Workshops 2005: 214-218 |
45 | EE | Javier Lopez, Rolf Oppliger, Günther Pernul: Classifying Public Key Certificates. EuroPKI 2005: 135-143 |
44 | EE | Rodrigo Roman, Jianying Zhou, Javier Lopez: On the Security of Wireless Sensor Networks. ICCSA (3) 2005: 681-690 |
43 | EE | Jose Antonio Onieva, Jianying Zhou, Javier Lopez: Attacking an Asynchronous Multi-party Contract Signing Protocol. INDOCRYPT 2005: 311-321 |
42 | EE | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, Privacy and Security in E-Business: Requirements and Solutions. Panhellenic Conference on Informatics 2005: 548-558 |
41 | Rodrigo Roman, Jianying Zhou, Javier Lopez: Protection Against Spam Using Pre-Challenges. SEC 2005: 281-294 | |
40 | EE | Isaac Agudo, Javier Lopez, José A. Montenegro: A Representation Model of Trust Relationships with Delegation Extensions. iTrust 2005: 116-130 |
39 | Rodrigo Roman, Javier Lopez, Jianying Zhou: Casual virtual private network. Comput. Syst. Sci. Eng. 20(3): (2005) | |
38 | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Editorial. Comput. Syst. Sci. Eng. 20(6): (2005) | |
37 | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, privacy and security in digital business. Comput. Syst. Sci. Eng. 20(6): (2005) | |
2004 | ||
36 | Sokratis K. Katsikas, Stefanos Gritzalis, Javier Lopez: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings Springer 2004 | |
35 | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings Springer 2004 | |
34 | Javier Lopez, Sihan Qing, Eiji Okamoto: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings Springer 2004 | |
33 | EE | Javier Lopez, Niko Myller, Erkki Sutinen: Sorting out sorting through concretization with robotics. AVI 2004: 377-380 |
32 | EE | Jianying Zhou, Jose Antonio Onieva, Javier Lopez: Analysis of a Free Roaming Agent Result-Truncation Defense Scheme. CEC 2004: 221-226 |
31 | EE | Mildrey Carbonell, Jose Antonio Onieva, Javier Lopez, Deborah Galpert, Jianying Zhou: Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. ICCSA (1) 2004: 903-914 |
30 | EE | Vicente Benjumea, Javier Lopez, José A. Montenegro, José M. Troya: A First Approach to Provide Anonymity in Attribute Certificates. Public Key Cryptography 2004: 402-415 |
29 | EE | Jose Antonio Onieva, Jianying Zhou, Javier Lopez: Non-repudiation protocols for multiple entities. Computer Communications 27(16): 1608-1616 (2004) |
28 | EE | Javier Lopez, Rolf Oppliger, Günther Pernul: Authentication and authorization infrastructures (AAIs): a comparative survey. Computers & Security 23(7): 578-590 (2004) |
27 | EE | Jose Antonio Onieva, Jianying Zhou, Javier Lopez, Mildrey Carbonell: Agent-mediated non-repudiation protocols. Electronic Commerce Research and Applications 3(2): 152-162 (2004) |
26 | EE | Javier Lopez, Antonio Mana, José A. Montenegro, Juan J. Ortega: PKI design based on the use of on-line certification authorities. Int. J. Inf. Sec. 2(2): 91-102 (2004) |
25 | EE | Antonio Mana, Javier Lopez, Juan J. Ortega, Ernesto Pimentel, José M. Troya: A framework for secure execution of software. Int. J. Inf. Sec. 3(2): 99-112 (2004) |
2003 | ||
24 | EE | Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez: Intermediary Non-repudiation Protocols. CEC 2003: 207-214 |
23 | EE | Javier Lopez, Juan J. Ortega, José Luis Vivas, José M. Troya: How to Specify Security Services: A Practical Approach. Communications and Multimedia Security 2003: 158-171 |
22 | EE | Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Javier Lopez, José M. Troya: Applying the Semantic Web Layers to Access Control. DEXA Workshops 2003: 622-626 |
21 | EE | Jose Antonio Onieva, Jianying Zhou, Javier Lopez: Practical Service Charge for P2P Content Distribution. ICICS 2003: 112-123 |
20 | EE | José Luis Vivas, José A. Montenegro, Javier Lopez: Towards a Business Process-Driven Framework for Security Engineering with the UML. ISC 2003: 381-395 |
19 | EE | Javier Lopez, Juan J. Ortega, José M. Troya: Applying SDL to Formal Analysis of Security Systems. SDL Forum 2003: 300-316 |
18 | Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez: A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. SEC 2003: 37-48 | |
17 | EE | Selwyn Russell, Ed Dawson, Eiji Okamoto, Javier Lopez: Virtual certificates and synthetic certificates: new paradigms for improving public key validation. Computer Communications 26(16): 1826-1838 (2003) |
16 | EE | Sigrid Gürgens, Javier Lopez, René Peralta: Analysis of e-commerce protocols: Adapting a traditional technique. Int. J. Inf. Sec. 2(1): 21-36 (2003) |
2002 | ||
15 | EE | Javier Lopez, Günther Pernul: Message from the TrustBus Workshop Chairs. DEXA Workshops 2002: 409-412 |
14 | EE | Javier Lopez, Antonio Mana, Mariemma Inmaculada Yagüe del Valle: XML-Based Distributed Access Control System. EC-Web 2002: 203-213 |
13 | EE | Javier Lopez, Antonio Mana, José A. Montenegro, Juan J. Ortega, José M. Troya: Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations. EGOV 2002: 211-214 |
12 | EE | Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Javier Lopez, Ernesto Pimentel, José M. Troya: Secure Content Distribution for Digital Libraries. ICADL 2002: 483-494 |
11 | EE | Javier Lopez, Antonio Mana, Ernesto Pimentel, José M. Troya, Mariemma Inmaculada Yagüe del Valle: Access Control Infrastructure for Digital Objects. ICICS 2002: 399-410 |
10 | EE | Ed Dawson, Javier Lopez, José A. Montenegro, Eiji Okamoto: A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. ISC 2002: 136-149 |
9 | EE | Javier Lopez, Juan J. Ortega, José M. Troya: Protocol Engineering Applied to Formal Analysis of Security Systems. InfraSec 2002: 246-259 |
8 | EE | Javier Lopez, José A. Montenegro, Rodrigo Roman, Jorge Davila: Design of a VPN Software Solution Integrating TCP and UDP Services. InfraSec 2002: 325-338 |
7 | Javier Lopez, Juan J. Ortega, José M. Troya: Verification of Authentication Protocols using SDL-method. SIS 2002: 61-71 | |
2001 | ||
6 | EE | Sigrid Gürgens, Javier Lopez: Suitability of a Classical Analysis Method for E-commerce Protocols. ISC 2001: 46-62 |
2000 | ||
5 | EE | Javier Lopez, Antonio Mana, Juan J. Ortega, José M. Troya: Distributed Storage and Revocation in Digital Certificate Databases. DEXA 2000: 929-938 |
4 | EE | Jorge Davila, Javier Lopez, Antonio Mana, Juan J. Ortega, José M. Troya: Development of Secure Internet Applications for Governmental Environments. DEXA Workshop 2000: 362-368 |
1999 | ||
3 | EE | Javier Lopez, Antonio Mana, Juan J. Ortega: Cert'eM: Certification System Based on Electronic Mail Service Structure. CQRE 1999: 109-118 |
2 | EE | Sigrid Gürgens, Javier Lopez, René Peralta: Efficient Detection of Failure Modes in Electronic Commerce Protocols. DEXA Workshop 1999: 850-857 |
1 | EE | Jorge Davila, Javier Lopez, René Peralta: Implementation of Virtual Private Networks at the Transport Layer. ISW 1999: 85-102 |