2009 |
79 | EE | Tarik Taleb,
Javier Lopez:
Next generation wireless communications and mobile computing/networking technologies.
Wireless Communications and Mobile Computing 9(4): 441-443 (2009) |
2008 |
78 | EE | David Galindo,
Rodrigo Roman,
Javier Lopez:
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks.
CANS 2008: 120-132 |
77 | EE | Vicente Benjumea,
Seung Geol Choi,
Javier Lopez,
Moti Yung:
Fair Traceable Multi-Group Signatures.
Financial Cryptography 2008: 231-246 |
76 | EE | Isaac Agudo,
M. Carmen Fernández Gago,
Javier Lopez:
Delegating Privileges over Finite Resources: A Quota Based Delegation Approach.
Formal Aspects in Security and Trust 2008: 302-315 |
75 | EE | Jianying Zhou,
Tanmoy Kanti Das,
Javier Lopez:
An Asynchronous Node Replication Attack in Wireless Sensor Networks.
SEC 2008: 125-139 |
74 | EE | Isaac Agudo,
M. Carmen Fernández Gago,
Javier Lopez:
A Model for Trust Metrics Analysis.
TrustBus 2008: 28-37 |
73 | EE | Jose Antonio Onieva,
Jianying Zhou,
Javier Lopez:
Multiparty nonrepudiation: A survey.
ACM Comput. Surv. 41(1): (2008) |
72 | EE | Isaac Agudo,
Javier Lopez,
José A. Montenegro:
Enabling Attribute Delegation in Ubiquitous Environments.
MONET 13(3-4): 398-410 (2008) |
2007 |
71 | | Javier Lopez,
Pierangela Samarati,
Josep L. Ferrer:
Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings
Springer 2007 |
70 | | Joachim Biskup,
Javier Lopez:
Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings
Springer 2007 |
69 | EE | Rodrigo Roman,
M. Carmen Fernández Gago,
Javier Lopez:
Featuring trust and reputation management systems for constrained hardware devices.
Autonomics 2007: 6 |
68 | EE | Vicente Benjumea,
Seung Geol Choi,
Javier Lopez,
Moti Yung:
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication.
CANS 2007: 265-281 |
67 | EE | Javier Lopez,
Cristina Alcaraz,
Rodrigo Roman:
On the Protection and Technologies of Critical Information Infrastructures.
FOSAD 2007: 160-182 |
66 | EE | Mildrey Carbonell,
José María Sierra,
Jose Antonio Onieva,
Javier Lopez,
Jianying Zhou:
Estimation of TTP Features in Non-repudiation Service.
ICCSA (2) 2007: 549-558 |
65 | EE | Alejandro Muñoz,
Armando Ferro,
Fidel Liberal,
Javier Lopez:
Ksensor: Multithreaded kernel-level probe for passive QoS monitoring.
ICPADS 2007: 1-8 |
64 | EE | Isaac Agudo,
Javier Lopez,
José A. Montenegro:
Attribute delegation in ubiquitous environments.
MobiMedia 2007: 43 |
63 | EE | Isaac Agudo,
Javier Lopez,
José A. Montenegro:
Implementation aspects of a delegation system.
MobiMedia 2007: 50 |
62 | EE | Rodrigo Roman,
Cristina Alcaraz,
Javier Lopez:
A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes.
MONET 12(4): 231-244 (2007) |
61 | EE | Jose Antonio Onieva,
Javier Lopez,
Rodrigo Roman,
Jianying Zhou,
Stefanos Gritzalis:
Integration of non-repudiation services in mobile DRM scenarios.
Telecommunication Systems 35(3-4): 161-176 (2007) |
2006 |
60 | | Sokratis K. Katsikas,
Javier Lopez,
Michael Backes,
Stefanos Gritzalis,
Bart Preneel:
Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings
Springer 2006 |
59 | EE | Isaac Agudo,
Javier Lopez,
José A. Montenegro:
Graphical Representation of Authorization Policies for Weighted Credentials.
ACISP 2006: 383-394 |
58 | EE | Isaac Agudo,
Javier Lopez,
José A. Montenegro:
Attribute Delegation Based on Ontologies and Context Information.
Communications and Multimedia Security 2006: 54-66 |
57 | EE | Jianying Zhou,
Jose Antonio Onieva,
Javier Lopez:
A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps.
SEC 2006: 221-232 |
56 | EE | Javier Lopez,
José A. Montenegro,
Rodrigo Roman:
Service-Oriented Security Architecture for CII based on Sensor Networks.
SecPerU 2006: 1-6 |
55 | EE | Javier Lopez,
Antonio Maña,
Antonio Muñoz:
A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios.
UIC 2006: 977-987 |
54 | EE | Rodrigo Roman,
Jianying Zhou,
Javier Lopez:
An anti-spam scheme using pre-challenges.
Computer Communications 29(15): 2739-2749 (2006) |
53 | EE | Jianying Zhou,
Javier Lopez:
Preface.
Int. J. Inf. Sec. 5(2): 65-66 (2006) |
52 | EE | Javier Lopez:
Unleashing public-key cryptography in wireless sensor networks.
Journal of Computer Security 14(5): 469-482 (2006) |
51 | EE | Vicente Benjumea,
Javier Lopez,
José María Troya Linero:
Specification of a framework for the anonymous use of privileges.
Telematics and Informatics 23(3): 179-195 (2006) |
2005 |
50 | | Sokratis K. Katsikas,
Javier Lopez,
Günther Pernul:
Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings
Springer 2005 |
49 | | Jianying Zhou,
Javier Lopez,
Robert H. Deng,
Feng Bao:
Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings
Springer 2005 |
48 | | Sihan Qing,
Wenbo Mao,
Javier Lopez,
Guilin Wang:
Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings
Springer 2005 |
47 | EE | Kun Peng,
Ed Dawson,
Juanma González Nieto,
Eiji Okamoto,
Javier Lopez:
A Novel Method to Maintain Privacy in Mobile Agent Applications.
CANS 2005: 247-260 |
46 | EE | Antonio Muñoz,
Jose Antonio Onieva,
Javier Lopez:
On Secure Profiling.
DEXA Workshops 2005: 214-218 |
45 | EE | Javier Lopez,
Rolf Oppliger,
Günther Pernul:
Classifying Public Key Certificates.
EuroPKI 2005: 135-143 |
44 | EE | Rodrigo Roman,
Jianying Zhou,
Javier Lopez:
On the Security of Wireless Sensor Networks.
ICCSA (3) 2005: 681-690 |
43 | EE | Jose Antonio Onieva,
Jianying Zhou,
Javier Lopez:
Attacking an Asynchronous Multi-party Contract Signing Protocol.
INDOCRYPT 2005: 311-321 |
42 | EE | Sokratis K. Katsikas,
Javier Lopez,
Günther Pernul:
Trust, Privacy and Security in E-Business: Requirements and Solutions.
Panhellenic Conference on Informatics 2005: 548-558 |
41 | | Rodrigo Roman,
Jianying Zhou,
Javier Lopez:
Protection Against Spam Using Pre-Challenges.
SEC 2005: 281-294 |
40 | EE | Isaac Agudo,
Javier Lopez,
José A. Montenegro:
A Representation Model of Trust Relationships with Delegation Extensions.
iTrust 2005: 116-130 |
39 | | Rodrigo Roman,
Javier Lopez,
Jianying Zhou:
Casual virtual private network.
Comput. Syst. Sci. Eng. 20(3): (2005) |
38 | | Sokratis K. Katsikas,
Javier Lopez,
Günther Pernul:
Editorial.
Comput. Syst. Sci. Eng. 20(6): (2005) |
37 | | Sokratis K. Katsikas,
Javier Lopez,
Günther Pernul:
Trust, privacy and security in digital business.
Comput. Syst. Sci. Eng. 20(6): (2005) |
2004 |
36 | | Sokratis K. Katsikas,
Stefanos Gritzalis,
Javier Lopez:
Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings
Springer 2004 |
35 | | Sokratis K. Katsikas,
Javier Lopez,
Günther Pernul:
Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings
Springer 2004 |
34 | | Javier Lopez,
Sihan Qing,
Eiji Okamoto:
Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings
Springer 2004 |
33 | EE | Javier Lopez,
Niko Myller,
Erkki Sutinen:
Sorting out sorting through concretization with robotics.
AVI 2004: 377-380 |
32 | EE | Jianying Zhou,
Jose Antonio Onieva,
Javier Lopez:
Analysis of a Free Roaming Agent Result-Truncation Defense Scheme.
CEC 2004: 221-226 |
31 | EE | Mildrey Carbonell,
Jose Antonio Onieva,
Javier Lopez,
Deborah Galpert,
Jianying Zhou:
Timeout Estimation Using a Simulation Model for Non-repudiation Protocols.
ICCSA (1) 2004: 903-914 |
30 | EE | Vicente Benjumea,
Javier Lopez,
José A. Montenegro,
José M. Troya:
A First Approach to Provide Anonymity in Attribute Certificates.
Public Key Cryptography 2004: 402-415 |
29 | EE | Jose Antonio Onieva,
Jianying Zhou,
Javier Lopez:
Non-repudiation protocols for multiple entities.
Computer Communications 27(16): 1608-1616 (2004) |
28 | EE | Javier Lopez,
Rolf Oppliger,
Günther Pernul:
Authentication and authorization infrastructures (AAIs): a comparative survey.
Computers & Security 23(7): 578-590 (2004) |
27 | EE | Jose Antonio Onieva,
Jianying Zhou,
Javier Lopez,
Mildrey Carbonell:
Agent-mediated non-repudiation protocols.
Electronic Commerce Research and Applications 3(2): 152-162 (2004) |
26 | EE | Javier Lopez,
Antonio Mana,
José A. Montenegro,
Juan J. Ortega:
PKI design based on the use of on-line certification authorities.
Int. J. Inf. Sec. 2(2): 91-102 (2004) |
25 | EE | Antonio Mana,
Javier Lopez,
Juan J. Ortega,
Ernesto Pimentel,
José M. Troya:
A framework for secure execution of software.
Int. J. Inf. Sec. 3(2): 99-112 (2004) |
2003 |
24 | EE | Jose Antonio Onieva,
Jianying Zhou,
Mildrey Carbonell,
Javier Lopez:
Intermediary Non-repudiation Protocols.
CEC 2003: 207-214 |
23 | EE | Javier Lopez,
Juan J. Ortega,
José Luis Vivas,
José M. Troya:
How to Specify Security Services: A Practical Approach.
Communications and Multimedia Security 2003: 158-171 |
22 | EE | Mariemma Inmaculada Yagüe del Valle,
Antonio Mana,
Javier Lopez,
José M. Troya:
Applying the Semantic Web Layers to Access Control.
DEXA Workshops 2003: 622-626 |
21 | EE | Jose Antonio Onieva,
Jianying Zhou,
Javier Lopez:
Practical Service Charge for P2P Content Distribution.
ICICS 2003: 112-123 |
20 | EE | José Luis Vivas,
José A. Montenegro,
Javier Lopez:
Towards a Business Process-Driven Framework for Security Engineering with the UML.
ISC 2003: 381-395 |
19 | EE | Javier Lopez,
Juan J. Ortega,
José M. Troya:
Applying SDL to Formal Analysis of Security Systems.
SDL Forum 2003: 300-316 |
18 | | Jose Antonio Onieva,
Jianying Zhou,
Mildrey Carbonell,
Javier Lopez:
A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages.
SEC 2003: 37-48 |
17 | EE | Selwyn Russell,
Ed Dawson,
Eiji Okamoto,
Javier Lopez:
Virtual certificates and synthetic certificates: new paradigms for improving public key validation.
Computer Communications 26(16): 1826-1838 (2003) |
16 | EE | Sigrid Gürgens,
Javier Lopez,
René Peralta:
Analysis of e-commerce protocols: Adapting a traditional technique.
Int. J. Inf. Sec. 2(1): 21-36 (2003) |
2002 |
15 | EE | Javier Lopez,
Günther Pernul:
Message from the TrustBus Workshop Chairs.
DEXA Workshops 2002: 409-412 |
14 | EE | Javier Lopez,
Antonio Mana,
Mariemma Inmaculada Yagüe del Valle:
XML-Based Distributed Access Control System.
EC-Web 2002: 203-213 |
13 | EE | Javier Lopez,
Antonio Mana,
José A. Montenegro,
Juan J. Ortega,
José M. Troya:
Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations.
EGOV 2002: 211-214 |
12 | EE | Mariemma Inmaculada Yagüe del Valle,
Antonio Mana,
Javier Lopez,
Ernesto Pimentel,
José M. Troya:
Secure Content Distribution for Digital Libraries.
ICADL 2002: 483-494 |
11 | EE | Javier Lopez,
Antonio Mana,
Ernesto Pimentel,
José M. Troya,
Mariemma Inmaculada Yagüe del Valle:
Access Control Infrastructure for Digital Objects.
ICICS 2002: 399-410 |
10 | EE | Ed Dawson,
Javier Lopez,
José A. Montenegro,
Eiji Okamoto:
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI.
ISC 2002: 136-149 |
9 | EE | Javier Lopez,
Juan J. Ortega,
José M. Troya:
Protocol Engineering Applied to Formal Analysis of Security Systems.
InfraSec 2002: 246-259 |
8 | EE | Javier Lopez,
José A. Montenegro,
Rodrigo Roman,
Jorge Davila:
Design of a VPN Software Solution Integrating TCP and UDP Services.
InfraSec 2002: 325-338 |
7 | | Javier Lopez,
Juan J. Ortega,
José M. Troya:
Verification of Authentication Protocols using SDL-method.
SIS 2002: 61-71 |
2001 |
6 | EE | Sigrid Gürgens,
Javier Lopez:
Suitability of a Classical Analysis Method for E-commerce Protocols.
ISC 2001: 46-62 |
2000 |
5 | EE | Javier Lopez,
Antonio Mana,
Juan J. Ortega,
José M. Troya:
Distributed Storage and Revocation in Digital Certificate Databases.
DEXA 2000: 929-938 |
4 | EE | Jorge Davila,
Javier Lopez,
Antonio Mana,
Juan J. Ortega,
José M. Troya:
Development of Secure Internet Applications for Governmental Environments.
DEXA Workshop 2000: 362-368 |
1999 |
3 | EE | Javier Lopez,
Antonio Mana,
Juan J. Ortega:
Cert'eM: Certification System Based on Electronic Mail Service Structure.
CQRE 1999: 109-118 |
2 | EE | Sigrid Gürgens,
Javier Lopez,
René Peralta:
Efficient Detection of Failure Modes in Electronic Commerce Protocols.
DEXA Workshop 1999: 850-857 |
1 | EE | Jorge Davila,
Javier Lopez,
René Peralta:
Implementation of Virtual Private Networks at the Transport Layer.
ISW 1999: 85-102 |