dblp.uni-trier.dewww.uni-trier.de

Juan Manuel González Nieto Vis

Juanma González Nieto

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
46EEColin Boyd, Juan Manuel González Nieto: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings Springer 2009
45EEYvonne Cliff, Colin Boyd, Juan Manuel González Nieto: How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. ACNS 2009: 53-70
44EEM. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto: Universally composable contributory group key exchange. ASIACCS 2009: 146-156
43EEGeorg Lippold, Colin Boyd, Juan Manuel González Nieto: Strongly Secure Certificateless Key Agreement. Pairing 2009: 206-230
42EECraig Costello, Hüseyin Hisil, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong: Faster Pairings on Special Weierstrass Curves. Pairing 2009: 89-101
41EEM. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto: Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. Public Key Cryptography 2009: 105-123
40EEColin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson: One-round key exchange in the standard model. IJACT 1(3): 181-199 (2009)
2008
39EEColin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson: Efficient One-Round Key Exchange in the Standard Model. ACISP 2008: 69-83
38EEHani Alzaid, Ernest Foo, Juan Manuel González Nieto: RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks. PDCAT 2008: 419-424
2007
37EESuratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto: Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets. ACSC 2007: 191-200
36EEJason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji: Detecting relay attacks with timing-based protocols. ASIACCS 2007: 204-213
35EESuratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto: Toward Non-parallelizable Client Puzzles. CANS 2007: 247-264
34EEMark Burdon, Juan Manuel González Nieto, Sharon Christensen, Ed Dawson, W. D. Duncan, Bill Lane: Access Control in Federated Databases: How Legal Issues Shape Security. EGOV 2007: 228-239
33EEJaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd: HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System. EUC Workshops 2007: 557-567
32EEJaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd: Low-Cost and Strong-Security RFID Authentication Protocol. EUC Workshops 2007: 795-807
31EEM. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto: On the Connection Between Signcryption and One-Pass Key Establishment. IMA Int. Conf. 2007: 277-301
30EERaylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto: Verifier-Key-Flexible Universal Designated-Verifier Signatures. IMA Int. Conf. 2007: 403-421
29EEJaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd: Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP). PAKDD Workshops 2007: 574-583
28EEJason Smith, Suratose Tritilanunt, Colin Boyd, Juan Manuel González Nieto, Ernest Foo: Denial-of-service resistance in key establishment. IJWMC 2(1): 59-71 (2007)
2006
27EEJason Smith, Juan Manuel González Nieto, Colin Boyd: Modelling denial of service attacks on JFK with Meadows's cost-based framework. ACSW Frontiers 2006: 125-134
26EERobert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto: SKMA: a key management architecture for SCADA systems. ACSW Frontiers 2006: 183-192
25EEJaimee Brown, Juan Manuel González Nieto, Colin Boyd: Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. CANS 2006: 1-18
24EEKun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson: Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. ICISC 2006: 296-309
23EEJaimee Brown, Juan Manuel González Nieto, Colin Boyd: Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. INDOCRYPT 2006: 176-190
22EESuratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto: Examining the DoS Resistance of HIP. OTM Workshops (1) 2006: 616-625
21EESherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto: Security-Mediated Certificateless Cryptography. Public Key Cryptography 2006: 508-524
20EEYvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto: Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. Appl. Algebra Eng. Commun. Comput. 16(6): 405-438 (2006)
2005
19 Colin Boyd, Juan Manuel González Nieto: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings Springer 2005
18EEChris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague: GBD Threshold Cryptography with an Application to RSA Key Recovery. ACISP 2005: 394-405
17EEKun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier Lopez: A Novel Method to Maintain Privacy in Mobile Agent Applications. CANS 2005: 247-260
16EERong Du, Ernest Foo, Juan Manuel González Nieto, Colin Boyd: Designing Secure E-Tendering Systems. TrustBus 2005: 70-79
15EEJuan Manuel González Nieto, Colin Boyd, Ed Dawson: A Public Key Cryptosystem Based On A Subgroup Membership Problem. Des. Codes Cryptography 36(3): 301-316 (2005)
2004
14EEYiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto: Protocols with Security Proofs for Mobile Applications. ACISP 2004: 358-369
13 Jaimee Brown, Ed Dawson, Juan Manuel González Nieto: Implementation of the GBD Cryptosystem. Cryptographic Algorithms and their Uses 2004: 94-109
12 Jason Reid, Andrew Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan: Denial of Service Issues in Voice Over IP Networks. ICETE (2) 2004: 230-237
11EEYvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto: Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. INDOCRYPT 2004: 17-32
10EEHarikrishna Vasanta, Yiu Shing Terry Tin, Colin Boyd, Mark Looi, Juan Manuel González Nieto: A Secure Framework for User Privacy in Heterogeneous Location Networks. MATA 2004: 264-274
2003
9EEYiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto: Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. ACISP 2003: 166-179
8EEYiu Shing Terry Tin, Colin Boyd, Juanma González Nieto: Provably Secure Key Exchange: An Engineering Approach. ACSW Frontiers 2003: 97-104
7EEJuan Manuel González Nieto, Ed Dawson, Eiji Okamoto: Privacy and Trusted Computing. DEXA Workshops 2003: 383-388
6EEYvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague: A Password-Based Authenticator: Security Proof and Applications. INDOCRYPT 2003: 388-401
5EEColin Boyd, Juan Manuel González Nieto: Round-Optimal Contributory Conference Key Agreement. Public Key Cryptography 2003: 161-174
2002
4EEJuan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson: Key recovery for the commercial environment. Int. J. Inf. Sec. 1(3): 161-174 (2002)
2001
3EEJuan Manuel González Nieto, Colin Boyd, Ed Dawson: A Public Key Cryptosystem Based on the Subgroup Membership Problem. ICICS 2001: 352-363
2000
2 Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson: Key Recovery System for the Commercial Environment. ACISP 2000: 149-162
1 Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson: Key Recovery in Third Generation Wireless Communication Systems. Public Key Cryptography 2000: 223-237

Coauthor Index

1Hani Alzaid [38]
2Colin Boyd [1] [2] [3] [4] [5] [6] [8] [9] [10] [11] [14] [15] [16] [19] [20] [21] [22] [23] [25] [26] [27] [28] [29] [30] [31] [32] [33] [35] [37] [39] [40] [41] [42] [43] [44] [45] [46]
3Jaimee Brown [13] [18] [23] [25]
4Mark Burdon [34]
5Sherman S. M. Chow [21]
6Sharon Christensen [34]
7Andrew Clark [4] [12]
8Yvonne Cliff [39] [40] [45]
9Craig Costello [42]
10Ed Dawson [1] [2] [3] [4] [7] [13] [15] [17] [24] [26] [34]
11Robert Dawson [26]
12Yvo Desmedt [24]
13Rong Du [16]
14W. D. Duncan [34]
15Ernest Foo [16] [22] [28] [35] [37] [38]
16M. Choudary Gorantla [31] [41] [44]
17JaeCheol Ha (Jae-Cheol Ha) [29] [32] [33]
18Hüseyin Hisil [42]
19Yvonne Hitchcock [6] [11] [20]
20Hwankoo Kim [33]
21Bill Lane [34]
22Georg Lippold [43]
23Mark Looi [10]
24Javier Lopez [17]
25Paul Montague [6] [18]
26Sang-Jae Moon [29] [32] [33]
27Eiji Okamoto [7] [17] [30]
28Takeshi Okamoto [30]
29DongGook Park [1]
30JeaHoon Park [33]
31Kenneth G. Paterson [39] [40]
32Kun Peng [17] [24]
33Jason Reid [12] [36]
34Bouchra Senadji [36]
35Jason Smith [12] [27] [28]
36Chris Steketee [18]
37Tee Tang [36]
38Yiu Shing Terry Tin [6] [8] [9] [10] [14]
39Suratose Tritilanunt [22] [28] [35] [37]
40Raylin Tso [30]
41Harikrishna Vasanta [10] [14]
42Kapali Viswanathan [2] [4] [12]
43Kenneth Koon-Ho Wong [42]

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)