Juanma González Nieto
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
40 | EE | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto: Universally composable contributory group key exchange. ASIACCS 2009: 146-156 |
39 | EE | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto: Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. Public Key Cryptography 2009: 105-123 |
2008 | ||
38 | EE | Hani Alzaid, Ernest Foo, Juan Manuel González Nieto: RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks. PDCAT 2008: 419-424 |
2007 | ||
37 | EE | Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto: Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets. ACSC 2007: 191-200 |
36 | EE | Jason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji: Detecting relay attacks with timing-based protocols. ASIACCS 2007: 204-213 |
35 | EE | Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto: Toward Non-parallelizable Client Puzzles. CANS 2007: 247-264 |
34 | EE | Mark Burdon, Juan Manuel González Nieto, Sharon Christensen, Ed Dawson, W. D. Duncan, Bill Lane: Access Control in Federated Databases: How Legal Issues Shape Security. EGOV 2007: 228-239 |
33 | EE | JaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd: HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System. EUC Workshops 2007: 557-567 |
32 | EE | JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd: Low-Cost and Strong-Security RFID Authentication Protocol. EUC Workshops 2007: 795-807 |
31 | EE | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto: On the Connection Between Signcryption and One-Pass Key Establishment. IMA Int. Conf. 2007: 277-301 |
30 | EE | Raylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto: Verifier-Key-Flexible Universal Designated-Verifier Signatures. IMA Int. Conf. 2007: 403-421 |
29 | EE | JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd: Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP). PAKDD Workshops 2007: 574-583 |
28 | EE | Jason Smith, Suratose Tritilanunt, Colin Boyd, Juan Manuel González Nieto, Ernest Foo: Denial-of-service resistance in key establishment. IJWMC 2(1): 59-71 (2007) |
2006 | ||
27 | EE | Jason Smith, Juan Manuel González Nieto, Colin Boyd: Modelling denial of service attacks on JFK with Meadows's cost-based framework. ACSW Frontiers 2006: 125-134 |
26 | EE | Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto: SKMA: a key management architecture for SCADA systems. ACSW Frontiers 2006: 183-192 |
25 | EE | Jaimee Brown, Juan Manuel González Nieto, Colin Boyd: Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. CANS 2006: 1-18 |
24 | EE | Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson: Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. ICISC 2006: 296-309 |
23 | EE | Jaimee Brown, Juan Manuel González Nieto, Colin Boyd: Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. INDOCRYPT 2006: 176-190 |
22 | EE | Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto: Examining the DoS Resistance of HIP. OTM Workshops (1) 2006: 616-625 |
21 | EE | Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto: Security-Mediated Certificateless Cryptography. Public Key Cryptography 2006: 508-524 |
20 | EE | Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto: Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. Appl. Algebra Eng. Commun. Comput. 16(6): 405-438 (2006) |
2005 | ||
19 | Colin Boyd, Juan Manuel González Nieto: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings Springer 2005 | |
18 | EE | Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague: GBD Threshold Cryptography with an Application to RSA Key Recovery. ACISP 2005: 394-405 |
17 | EE | Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier Lopez: A Novel Method to Maintain Privacy in Mobile Agent Applications. CANS 2005: 247-260 |
16 | EE | Rong Du, Ernest Foo, Juan Manuel González Nieto, Colin Boyd: Designing Secure E-Tendering Systems. TrustBus 2005: 70-79 |
15 | EE | Juan Manuel González Nieto, Colin Boyd, Ed Dawson: A Public Key Cryptosystem Based On A Subgroup Membership Problem. Des. Codes Cryptography 36(3): 301-316 (2005) |
2004 | ||
14 | EE | Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto: Protocols with Security Proofs for Mobile Applications. ACISP 2004: 358-369 |
13 | Jaimee Brown, Ed Dawson, Juan Manuel González Nieto: Implementation of the GBD Cryptosystem. Cryptographic Algorithms and their Uses 2004: 94-109 | |
12 | Jason Reid, Andrew Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan: Denial of Service Issues in Voice Over IP Networks. ICETE (2) 2004: 230-237 | |
11 | EE | Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto: Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. INDOCRYPT 2004: 17-32 |
10 | EE | Harikrishna Vasanta, Yiu Shing Terry Tin, Colin Boyd, Mark Looi, Juan Manuel González Nieto: A Secure Framework for User Privacy in Heterogeneous Location Networks. MATA 2004: 264-274 |
2003 | ||
9 | EE | Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto: Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. ACISP 2003: 166-179 |
8 | EE | Yiu Shing Terry Tin, Colin Boyd, Juanma González Nieto: Provably Secure Key Exchange: An Engineering Approach. ACSW Frontiers 2003: 97-104 |
7 | EE | Juan Manuel González Nieto, Ed Dawson, Eiji Okamoto: Privacy and Trusted Computing. DEXA Workshops 2003: 383-388 |
6 | EE | Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague: A Password-Based Authenticator: Security Proof and Applications. INDOCRYPT 2003: 388-401 |
5 | EE | Colin Boyd, Juan Manuel González Nieto: Round-Optimal Contributory Conference Key Agreement. Public Key Cryptography 2003: 161-174 |
2002 | ||
4 | EE | Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson: Key recovery for the commercial environment. Int. J. Inf. Sec. 1(3): 161-174 (2002) |
2001 | ||
3 | EE | Juan Manuel González Nieto, Colin Boyd, Ed Dawson: A Public Key Cryptosystem Based on the Subgroup Membership Problem. ICICS 2001: 352-363 |
2000 | ||
2 | Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson: Key Recovery System for the Commercial Environment. ACISP 2000: 149-162 | |
1 | Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson: Key Recovery in Third Generation Wireless Communication Systems. Public Key Cryptography 2000: 223-237 |