dblp.uni-trier.dewww.uni-trier.de

Javier Lopez

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
79EETarik Taleb, Javier Lopez: Next generation wireless communications and mobile computing/networking technologies. Wireless Communications and Mobile Computing 9(4): 441-443 (2009)
2008
78EEDavid Galindo, Rodrigo Roman, Javier Lopez: A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. CANS 2008: 120-132
77EEVicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung: Fair Traceable Multi-Group Signatures. Financial Cryptography 2008: 231-246
76EEIsaac Agudo, M. Carmen Fernández Gago, Javier Lopez: Delegating Privileges over Finite Resources: A Quota Based Delegation Approach. Formal Aspects in Security and Trust 2008: 302-315
75EEJianying Zhou, Tanmoy Kanti Das, Javier Lopez: An Asynchronous Node Replication Attack in Wireless Sensor Networks. SEC 2008: 125-139
74EEIsaac Agudo, M. Carmen Fernández Gago, Javier Lopez: A Model for Trust Metrics Analysis. TrustBus 2008: 28-37
73EEJose Antonio Onieva, Jianying Zhou, Javier Lopez: Multiparty nonrepudiation: A survey. ACM Comput. Surv. 41(1): (2008)
72EEIsaac Agudo, Javier Lopez, José A. Montenegro: Enabling Attribute Delegation in Ubiquitous Environments. MONET 13(3-4): 398-410 (2008)
2007
71 Javier Lopez, Pierangela Samarati, Josep L. Ferrer: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings Springer 2007
70 Joachim Biskup, Javier Lopez: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings Springer 2007
69EERodrigo Roman, M. Carmen Fernández Gago, Javier Lopez: Featuring trust and reputation management systems for constrained hardware devices. Autonomics 2007: 6
68EEVicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung: Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication. CANS 2007: 265-281
67EEJavier Lopez, Cristina Alcaraz, Rodrigo Roman: On the Protection and Technologies of Critical Information Infrastructures. FOSAD 2007: 160-182
66EEMildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier Lopez, Jianying Zhou: Estimation of TTP Features in Non-repudiation Service. ICCSA (2) 2007: 549-558
65EEAlejandro Muñoz, Armando Ferro, Fidel Liberal, Javier Lopez: Ksensor: Multithreaded kernel-level probe for passive QoS monitoring. ICPADS 2007: 1-8
64EEIsaac Agudo, Javier Lopez, José A. Montenegro: Attribute delegation in ubiquitous environments. MobiMedia 2007: 43
63EEIsaac Agudo, Javier Lopez, José A. Montenegro: Implementation aspects of a delegation system. MobiMedia 2007: 50
62EERodrigo Roman, Cristina Alcaraz, Javier Lopez: A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes. MONET 12(4): 231-244 (2007)
61EEJose Antonio Onieva, Javier Lopez, Rodrigo Roman, Jianying Zhou, Stefanos Gritzalis: Integration of non-repudiation services in mobile DRM scenarios. Telecommunication Systems 35(3-4): 161-176 (2007)
2006
60 Sokratis K. Katsikas, Javier Lopez, Michael Backes, Stefanos Gritzalis, Bart Preneel: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings Springer 2006
59EEIsaac Agudo, Javier Lopez, José A. Montenegro: Graphical Representation of Authorization Policies for Weighted Credentials. ACISP 2006: 383-394
58EEIsaac Agudo, Javier Lopez, José A. Montenegro: Attribute Delegation Based on Ontologies and Context Information. Communications and Multimedia Security 2006: 54-66
57EEJianying Zhou, Jose Antonio Onieva, Javier Lopez: A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. SEC 2006: 221-232
56EEJavier Lopez, José A. Montenegro, Rodrigo Roman: Service-Oriented Security Architecture for CII based on Sensor Networks. SecPerU 2006: 1-6
55EEJavier Lopez, Antonio Maña, Antonio Muñoz: A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios. UIC 2006: 977-987
54EERodrigo Roman, Jianying Zhou, Javier Lopez: An anti-spam scheme using pre-challenges. Computer Communications 29(15): 2739-2749 (2006)
53EEJianying Zhou, Javier Lopez: Preface. Int. J. Inf. Sec. 5(2): 65-66 (2006)
52EEJavier Lopez: Unleashing public-key cryptography in wireless sensor networks. Journal of Computer Security 14(5): 469-482 (2006)
51EEVicente Benjumea, Javier Lopez, José María Troya Linero: Specification of a framework for the anonymous use of privileges. Telematics and Informatics 23(3): 179-195 (2006)
2005
50 Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings Springer 2005
49 Jianying Zhou, Javier Lopez, Robert H. Deng, Feng Bao: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings Springer 2005
48 Sihan Qing, Wenbo Mao, Javier Lopez, Guilin Wang: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings Springer 2005
47EEKun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier Lopez: A Novel Method to Maintain Privacy in Mobile Agent Applications. CANS 2005: 247-260
46EEAntonio Muñoz, Jose Antonio Onieva, Javier Lopez: On Secure Profiling. DEXA Workshops 2005: 214-218
45EEJavier Lopez, Rolf Oppliger, Günther Pernul: Classifying Public Key Certificates. EuroPKI 2005: 135-143
44EERodrigo Roman, Jianying Zhou, Javier Lopez: On the Security of Wireless Sensor Networks. ICCSA (3) 2005: 681-690
43EEJose Antonio Onieva, Jianying Zhou, Javier Lopez: Attacking an Asynchronous Multi-party Contract Signing Protocol. INDOCRYPT 2005: 311-321
42EESokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, Privacy and Security in E-Business: Requirements and Solutions. Panhellenic Conference on Informatics 2005: 548-558
41 Rodrigo Roman, Jianying Zhou, Javier Lopez: Protection Against Spam Using Pre-Challenges. SEC 2005: 281-294
40EEIsaac Agudo, Javier Lopez, José A. Montenegro: A Representation Model of Trust Relationships with Delegation Extensions. iTrust 2005: 116-130
39 Rodrigo Roman, Javier Lopez, Jianying Zhou: Casual virtual private network. Comput. Syst. Sci. Eng. 20(3): (2005)
38 Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Editorial. Comput. Syst. Sci. Eng. 20(6): (2005)
37 Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, privacy and security in digital business. Comput. Syst. Sci. Eng. 20(6): (2005)
2004
36 Sokratis K. Katsikas, Stefanos Gritzalis, Javier Lopez: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings Springer 2004
35 Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings Springer 2004
34 Javier Lopez, Sihan Qing, Eiji Okamoto: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings Springer 2004
33EEJavier Lopez, Niko Myller, Erkki Sutinen: Sorting out sorting through concretization with robotics. AVI 2004: 377-380
32EEJianying Zhou, Jose Antonio Onieva, Javier Lopez: Analysis of a Free Roaming Agent Result-Truncation Defense Scheme. CEC 2004: 221-226
31EEMildrey Carbonell, Jose Antonio Onieva, Javier Lopez, Deborah Galpert, Jianying Zhou: Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. ICCSA (1) 2004: 903-914
30EEVicente Benjumea, Javier Lopez, José A. Montenegro, José M. Troya: A First Approach to Provide Anonymity in Attribute Certificates. Public Key Cryptography 2004: 402-415
29EEJose Antonio Onieva, Jianying Zhou, Javier Lopez: Non-repudiation protocols for multiple entities. Computer Communications 27(16): 1608-1616 (2004)
28EEJavier Lopez, Rolf Oppliger, Günther Pernul: Authentication and authorization infrastructures (AAIs): a comparative survey. Computers & Security 23(7): 578-590 (2004)
27EEJose Antonio Onieva, Jianying Zhou, Javier Lopez, Mildrey Carbonell: Agent-mediated non-repudiation protocols. Electronic Commerce Research and Applications 3(2): 152-162 (2004)
26EEJavier Lopez, Antonio Mana, José A. Montenegro, Juan J. Ortega: PKI design based on the use of on-line certification authorities. Int. J. Inf. Sec. 2(2): 91-102 (2004)
25EEAntonio Mana, Javier Lopez, Juan J. Ortega, Ernesto Pimentel, José M. Troya: A framework for secure execution of software. Int. J. Inf. Sec. 3(2): 99-112 (2004)
2003
24EEJose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez: Intermediary Non-repudiation Protocols. CEC 2003: 207-214
23EEJavier Lopez, Juan J. Ortega, José Luis Vivas, José M. Troya: How to Specify Security Services: A Practical Approach. Communications and Multimedia Security 2003: 158-171
22EEMariemma Inmaculada Yagüe del Valle, Antonio Mana, Javier Lopez, José M. Troya: Applying the Semantic Web Layers to Access Control. DEXA Workshops 2003: 622-626
21EEJose Antonio Onieva, Jianying Zhou, Javier Lopez: Practical Service Charge for P2P Content Distribution. ICICS 2003: 112-123
20EEJosé Luis Vivas, José A. Montenegro, Javier Lopez: Towards a Business Process-Driven Framework for Security Engineering with the UML. ISC 2003: 381-395
19EEJavier Lopez, Juan J. Ortega, José M. Troya: Applying SDL to Formal Analysis of Security Systems. SDL Forum 2003: 300-316
18 Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez: A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. SEC 2003: 37-48
17EESelwyn Russell, Ed Dawson, Eiji Okamoto, Javier Lopez: Virtual certificates and synthetic certificates: new paradigms for improving public key validation. Computer Communications 26(16): 1826-1838 (2003)
16EESigrid Gürgens, Javier Lopez, René Peralta: Analysis of e-commerce protocols: Adapting a traditional technique. Int. J. Inf. Sec. 2(1): 21-36 (2003)
2002
15EEJavier Lopez, Günther Pernul: Message from the TrustBus Workshop Chairs. DEXA Workshops 2002: 409-412
14EEJavier Lopez, Antonio Mana, Mariemma Inmaculada Yagüe del Valle: XML-Based Distributed Access Control System. EC-Web 2002: 203-213
13EEJavier Lopez, Antonio Mana, José A. Montenegro, Juan J. Ortega, José M. Troya: Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations. EGOV 2002: 211-214
12EEMariemma Inmaculada Yagüe del Valle, Antonio Mana, Javier Lopez, Ernesto Pimentel, José M. Troya: Secure Content Distribution for Digital Libraries. ICADL 2002: 483-494
11EEJavier Lopez, Antonio Mana, Ernesto Pimentel, José M. Troya, Mariemma Inmaculada Yagüe del Valle: Access Control Infrastructure for Digital Objects. ICICS 2002: 399-410
10EEEd Dawson, Javier Lopez, José A. Montenegro, Eiji Okamoto: A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. ISC 2002: 136-149
9EEJavier Lopez, Juan J. Ortega, José M. Troya: Protocol Engineering Applied to Formal Analysis of Security Systems. InfraSec 2002: 246-259
8EEJavier Lopez, José A. Montenegro, Rodrigo Roman, Jorge Davila: Design of a VPN Software Solution Integrating TCP and UDP Services. InfraSec 2002: 325-338
7 Javier Lopez, Juan J. Ortega, José M. Troya: Verification of Authentication Protocols using SDL-method. SIS 2002: 61-71
2001
6EESigrid Gürgens, Javier Lopez: Suitability of a Classical Analysis Method for E-commerce Protocols. ISC 2001: 46-62
2000
5EEJavier Lopez, Antonio Mana, Juan J. Ortega, José M. Troya: Distributed Storage and Revocation in Digital Certificate Databases. DEXA 2000: 929-938
4EEJorge Davila, Javier Lopez, Antonio Mana, Juan J. Ortega, José M. Troya: Development of Secure Internet Applications for Governmental Environments. DEXA Workshop 2000: 362-368
1999
3EEJavier Lopez, Antonio Mana, Juan J. Ortega: Cert'eM: Certification System Based on Electronic Mail Service Structure. CQRE 1999: 109-118
2EESigrid Gürgens, Javier Lopez, René Peralta: Efficient Detection of Failure Modes in Electronic Commerce Protocols. DEXA Workshop 1999: 850-857
1EEJorge Davila, Javier Lopez, René Peralta: Implementation of Virtual Private Networks at the Transport Layer. ISW 1999: 85-102

Coauthor Index

1Isaac Agudo [40] [58] [59] [63] [64] [72] [74] [76]
2Cristina Alcaraz [62] [67]
3Michael Backes [60]
4Feng Bao [49]
5Vicente Benjumea [30] [51] [68] [77]
6Joachim Biskup [70]
7Mildrey Carbonell Castro (Mildrey Carbonell) [18] [24] [27] [31] [66]
8Seung Geol Choi [68] [77]
9Tanmoy Kanti Das [75]
10Jorge Davila [1] [4] [8]
11Ed Dawson [10] [17] [47]
12Robert H. Deng (Robert Huijie Deng) [49]
13Josep L. Ferrer [71]
14Armando Ferro [65]
15M. Carmen Fernández Gago [69] [74] [76]
16David Galindo [78]
17Deborah Galpert [31]
18Stefanos Gritzalis [36] [60] [61]
19Sigrid Gürgens [2] [6] [16]
20Sokratis K. Katsikas [35] [36] [37] [38] [42] [50] [60]
21Fidel Liberal [65]
22Antonio Maña (Antonio Mana) [3] [4] [5] [11] [12] [13] [14] [22] [25] [26] [55]
23Wenbo Mao [48]
24José A. Montenegro [8] [10] [13] [20] [26] [30] [40] [56] [58] [59] [63] [64] [72]
25Alejandro Muñoz [65]
26Antonio Muñoz [46] [55]
27Niko Myller [33]
28Juan Manuel González Nieto (Juanma González Nieto) [47]
29Eiji Okamoto [10] [17] [34] [47]
30Jose Antonio Onieva [18] [21] [24] [27] [29] [31] [32] [43] [46] [57] [61] [66] [73]
31Rolf Oppliger [28] [45]
32Juan J. Ortega [3] [4] [5] [7] [9] [13] [19] [23] [25] [26]
33Kun Peng [47]
34René Peralta [1] [2] [16]
35Günther Pernul [15] [28] [35] [37] [38] [42] [45] [50]
36Ernesto Pimentel [11] [12] [25]
37Bart Preneel [60]
38Sihan Qing [34] [48]
39Rodrigo Roman [8] [39] [41] [44] [54] [56] [61] [62] [67] [69] [78]
40Selwyn Russell [17]
41Pierangela Samarati [71]
42José María Sierra [66]
43Erkki Sutinen [33]
44Tarik Taleb [79]
45José M. Troya (José María Troya Linero) [4] [5] [7] [9] [11] [12] [13] [19] [22] [23] [25] [30] [51]
46Mariemma Inmaculada Yagüe del Valle [11] [12] [14] [22]
47José Luis Vivas [20] [23]
48Guilin Wang [48]
49Moti Yung (Mordechai M. Yung) [68] [77]
50Jianying Zhou [18] [21] [24] [27] [29] [31] [32] [39] [41] [43] [44] [49] [53] [54] [57] [61] [66] [73] [75]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)