关注
Juan Gonzalez
Juan Gonzalez
Teron Labs
在 teronlabs.com 的电子邮件经过验证
标题
引用次数
年份
CHURNs: freshness assurance for humans
K Radke, C Boyd, JG Nieto, H Bartlett
The Computer Journal 58 (10), 2404-2425, 2015
42015
Automated proofs for computational indistinguishability
L Ngo, C Boyd, JG Nieto
The Computer Journal 57 (10), 1513-1536, 2014
2014
Enhanced geoproof: improved geographic assurance for data in the cloud
A Albeshri, C Boyd, JG Nieto
International Journal of Information Security 13, 191-198, 2014
292014
Formalising human recognition: a fundamental building block for security proofs
K Radke, C Boyd, J Gonzalez Nieto, M Manulis, D Stebila
Proceedings of the Twelfth Australasian Information Security Conference …, 2014
52014
" Who decides?" security and privacy in the wild
K Radke, C Boyd, JG Nieto, L Buys
Proceedings of the 25th Australian Computer-Human Interaction Conference …, 2013
82013
Predicate encryption for multi‐inner‐products
D Sun, C Boyd, JMG Nieto
Security and Communication Networks 6 (3), 325-339, 2013
12013
Forward-secure hierarchical predicate encryption
JM González Nieto, M Manulis, D Sun
Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013
132013
A security architecture for cloud storage combining proofs of retrievability and fairness
A Albeshri, C Boyd, JG Nieto
3rd International Conference on Cloud Computing, GRIDS and Virtualization, 30-35, 2012
112012
Geoproof: Proofs of geographic location for cloud computing environment
A Albeshri, C Boyd, JG Nieto
2012 32nd International Conference on Distributed Computing Systems …, 2012
702012
Practical client puzzles in the standard model
L Kuppusamy, J Rangasamy, D Stebila, C Boyd, JG Nieto
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
102012
Mitigating On‐Off attacks in reputation‐based secure data aggregation for wireless sensor networks
H Alzaid, E Foo, JG Nieto, E Ahmed
Security and Communication Networks 5 (2), 125-144, 2012
142012
Improving the efficiency of RFID authentication with pre-computation
K Lee, JMG Nieto, C Boyd
Proceedings of the Tenth Australasian Information Security Conference-Volume …, 2012
62012
Who is more susceptible to phishing emails?: a Saudi Arabian study
I Alseadoon, T Chan, E Foo, J Gonzalez Nieto
612012
Publicly verifiable ciphertexts
JM González Nieto, M Manulis, B Poettering, J Rangasamy, D Stebila
Security and Cryptography for Networks: 8th International Conference, SCN …, 2012
17*2012
A state-aware RFID privacy model with reader corruption
K Lee, JG Nieto, C Boyd
Cyberspace Safety and Security: 4th International Symposium, CSS 2012 …, 2012
92012
Towards a secure human-and-computer mutual authentication protocol
K Radke, C Boyd, J Gonzalez Nieto, M Brereton
Information Security 2012-Proceedings of the Tenth Australasian Information …, 2012
52012
Efficient modular exponentiation-based puzzles for denial-of-service protection
J Rangasamy, D Stebila, L Kuppusamy, C Boyd, J Gonzalez Nieto
Information Security and Cryptology-ICISC 2011: 14th International …, 2012
132012
Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking
K Lee, C Boyd, JM González-Nieto
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
12012
Fully private revocable predicate encryption
JM González-Nieto, M Manulis, D Sun
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
362012
Effort-release public-key encryption from cryptographic puzzles
J Rangasamy, D Stebila, C Boyd, JM González-Nieto, L Kuppusamy
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
22012
系统目前无法执行此操作,请稍后再试。
文章 1–20