dblp.uni-trier.dewww.uni-trier.de

Juan Manuel González Nieto

Juanma González Nieto

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
40EEM. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto: Universally composable contributory group key exchange. ASIACCS 2009: 146-156
39EEM. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto: Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. Public Key Cryptography 2009: 105-123
2008
38EEHani Alzaid, Ernest Foo, Juan Manuel González Nieto: RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks. PDCAT 2008: 419-424
2007
37EESuratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto: Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets. ACSC 2007: 191-200
36EEJason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji: Detecting relay attacks with timing-based protocols. ASIACCS 2007: 204-213
35EESuratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto: Toward Non-parallelizable Client Puzzles. CANS 2007: 247-264
34EEMark Burdon, Juan Manuel González Nieto, Sharon Christensen, Ed Dawson, W. D. Duncan, Bill Lane: Access Control in Federated Databases: How Legal Issues Shape Security. EGOV 2007: 228-239
33EEJaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd: HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System. EUC Workshops 2007: 557-567
32EEJaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd: Low-Cost and Strong-Security RFID Authentication Protocol. EUC Workshops 2007: 795-807
31EEM. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto: On the Connection Between Signcryption and One-Pass Key Establishment. IMA Int. Conf. 2007: 277-301
30EERaylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto: Verifier-Key-Flexible Universal Designated-Verifier Signatures. IMA Int. Conf. 2007: 403-421
29EEJaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd: Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP). PAKDD Workshops 2007: 574-583
28EEJason Smith, Suratose Tritilanunt, Colin Boyd, Juan Manuel González Nieto, Ernest Foo: Denial-of-service resistance in key establishment. IJWMC 2(1): 59-71 (2007)
2006
27EEJason Smith, Juan Manuel González Nieto, Colin Boyd: Modelling denial of service attacks on JFK with Meadows's cost-based framework. ACSW Frontiers 2006: 125-134
26EERobert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto: SKMA: a key management architecture for SCADA systems. ACSW Frontiers 2006: 183-192
25EEJaimee Brown, Juan Manuel González Nieto, Colin Boyd: Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. CANS 2006: 1-18
24EEKun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson: Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. ICISC 2006: 296-309
23EEJaimee Brown, Juan Manuel González Nieto, Colin Boyd: Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. INDOCRYPT 2006: 176-190
22EESuratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto: Examining the DoS Resistance of HIP. OTM Workshops (1) 2006: 616-625
21EESherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto: Security-Mediated Certificateless Cryptography. Public Key Cryptography 2006: 508-524
20EEYvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto: Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. Appl. Algebra Eng. Commun. Comput. 16(6): 405-438 (2006)
2005
19 Colin Boyd, Juan Manuel González Nieto: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings Springer 2005
18EEChris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague: GBD Threshold Cryptography with an Application to RSA Key Recovery. ACISP 2005: 394-405
17EEKun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier Lopez: A Novel Method to Maintain Privacy in Mobile Agent Applications. CANS 2005: 247-260
16EERong Du, Ernest Foo, Juan Manuel González Nieto, Colin Boyd: Designing Secure E-Tendering Systems. TrustBus 2005: 70-79
15EEJuan Manuel González Nieto, Colin Boyd, Ed Dawson: A Public Key Cryptosystem Based On A Subgroup Membership Problem. Des. Codes Cryptography 36(3): 301-316 (2005)
2004
14EEYiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto: Protocols with Security Proofs for Mobile Applications. ACISP 2004: 358-369
13 Jaimee Brown, Ed Dawson, Juan Manuel González Nieto: Implementation of the GBD Cryptosystem. Cryptographic Algorithms and their Uses 2004: 94-109
12 Jason Reid, Andrew Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan: Denial of Service Issues in Voice Over IP Networks. ICETE (2) 2004: 230-237
11EEYvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto: Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. INDOCRYPT 2004: 17-32
10EEHarikrishna Vasanta, Yiu Shing Terry Tin, Colin Boyd, Mark Looi, Juan Manuel González Nieto: A Secure Framework for User Privacy in Heterogeneous Location Networks. MATA 2004: 264-274
2003
9EEYiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto: Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. ACISP 2003: 166-179
8EEYiu Shing Terry Tin, Colin Boyd, Juanma González Nieto: Provably Secure Key Exchange: An Engineering Approach. ACSW Frontiers 2003: 97-104
7EEJuan Manuel González Nieto, Ed Dawson, Eiji Okamoto: Privacy and Trusted Computing. DEXA Workshops 2003: 383-388
6EEYvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague: A Password-Based Authenticator: Security Proof and Applications. INDOCRYPT 2003: 388-401
5EEColin Boyd, Juan Manuel González Nieto: Round-Optimal Contributory Conference Key Agreement. Public Key Cryptography 2003: 161-174
2002
4EEJuan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson: Key recovery for the commercial environment. Int. J. Inf. Sec. 1(3): 161-174 (2002)
2001
3EEJuan Manuel González Nieto, Colin Boyd, Ed Dawson: A Public Key Cryptosystem Based on the Subgroup Membership Problem. ICICS 2001: 352-363
2000
2 Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson: Key Recovery System for the Commercial Environment. ACISP 2000: 149-162
1 Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson: Key Recovery in Third Generation Wireless Communication Systems. Public Key Cryptography 2000: 223-237

Coauthor Index

1Hani Alzaid [38]
2Colin Boyd [1] [2] [3] [4] [5] [6] [8] [9] [10] [11] [14] [15] [16] [19] [20] [21] [22] [23] [25] [26] [27] [28] [29] [30] [31] [32] [33] [35] [37] [39] [40]
3Jaimee Brown [13] [18] [23] [25]
4Mark Burdon [34]
5Sherman S. M. Chow [21]
6Sharon Christensen [34]
7Andrew Clark [4] [12]
8Ed Dawson [1] [2] [3] [4] [7] [13] [15] [17] [24] [26] [34]
9Robert Dawson [26]
10Yvo Desmedt [24]
11Rong Du [16]
12W. D. Duncan [34]
13Ernest Foo [16] [22] [28] [35] [37] [38]
14M. Choudary Gorantla [31] [39] [40]
15JaeCheol Ha (Jae-Cheol Ha) [29] [32] [33]
16Yvonne Hitchcock [6] [11] [20]
17Hwankoo Kim [33]
18Bill Lane [34]
19Mark Looi [10]
20Javier Lopez [17]
21Paul Montague [6] [18]
22Sang-Jae Moon [29] [32] [33]
23Eiji Okamoto [7] [17] [30]
24Takeshi Okamoto [30]
25DongGook Park [1]
26JeaHoon Park [33]
27Kun Peng [17] [24]
28Jason Reid [12] [36]
29Bouchra Senadji [36]
30Jason Smith [12] [27] [28]
31Chris Steketee [18]
32Tee Tang [36]
33Yiu Shing Terry Tin [6] [8] [9] [10] [14]
34Suratose Tritilanunt [22] [28] [35] [37]
35Raylin Tso [30]
36Harikrishna Vasanta [10] [14]
37Kapali Viswanathan [2] [4] [12]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)