关注
Juan Gonzalez
Juan Gonzalez
Teron Labs
在 teronlabs.com 的电子邮件经过验证
标题
引用次数
年份
" Who decides?" security and privacy in the wild
K Radke, C Boyd, JG Nieto, L Buys
Proceedings of the 25th Australian Computer-Human Interaction Conference …, 2013
82013
A forward & backward secure key management in wireless sensor networks for PCS/SCADA
H Alzaid, DG Park, JG Nieto, C Boyd, E Foo
Emerging technologies in wireless ad-hoc networks: applications and future …, 2011
262011
A framework for security analysis of key derivation functions
CC Wen, E Dawson, JM González Nieto, L Simpson
Information Security Practice and Experience: 8th International Conference …, 2012
82012
A novel method to maintain privacy in mobile agent applications
K Peng, E Dawson, JG Nieto, E Okamoto, J López
Cryptology and Network Security: 4th International Conference, CANS 2005 …, 2005
42005
A password-based authenticator: Security proof and applications
Y Hitchcock, YST Tin, JM Gonzalez-Nieto, C Boyd, P Montague
Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003
202003
A public key cryptosystem based on the subgroup membership problem
J Nieto, C Boyd, E Dawson
Information and Communications Security, 352-363, 2001
43*2001
A secure framework for user privacy in heterogeneous location networks
H Vasanta, YST Tin, C Boyd, M Looi, JM González Nieto
Mobility Aware Technologies and Applications: First International Workshop …, 2004
22004
A security architecture for cloud storage combining proofs of retrievability and fairness
A Albeshri, C Boyd, JG Nieto
3rd International Conference on Cloud Computing, GRIDS and Virtualization, 30-35, 2012
112012
A self-escrowed integer factorisation based public key infrastructure
J Gonzalez Nieto, K Viswanathan, C Boyd, E Dawson
VII Spanish Meeting on Cryptology and Information Security (RECSI VII), 315-327, 2002
32002
A state-aware RFID privacy model with reader corruption
K Lee, JG Nieto, C Boyd
Cyberspace Safety and Security: 4th International Symposium, CSS 2012 …, 2012
92012
A taxonomy of secure data aggregation in wireless sensor networks
H Alzaid, E Foo, JMG Nieto, DG Park
International Journal of Communication Networks and Distributed Systems 8 (1 …, 2012
162012
Access control in federated databases: how legal issues shape security
M Burdon, J Gonzalez Nieto, S Christensen, E Dawson, WD Duncan, ...
Electronic Government: 6th International Conference, EGOV 2007, Regensburg …, 2007
2007
An integrated approach to cryptographic mitigation of denial-of-service attacks
J Rangasamy, D Stebila, C Boyd, JG Nieto
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
222011
Attribute-based authenticated key exchange
MC Gorantla, C Boyd, JM González Nieto
Australasian Conference on Information Security and Privacy, 300-317, 2010
732010
Automated proof for formal indistinguishability and its applications
L Ngo, C Boyd, JM Gonzalez Nieto
The 7th Workshop on Formal and Computational Cryptography (FCC 2011), 2011
2011
Automated proofs for computational indistinguishability
L Ngo, C Boyd, JG Nieto
The Computer Journal 57 (10), 1513-1536, 2014
2014
Automated proofs for Diffie-Hellman-based key exchanges
L Ngo, C Boyd, J Gonz
2011 IEEE 24th Computer Security Foundations Symposium, 51-65, 2011
112011
Automating computational proofs for public-key-based key
L Ngo, C Boyd, JG Nieto
2010
Automating computational proofs for public-key-based key exchange
L Ngo, C Boyd, JG Nieto
International Conference on Provable Security, 53-69, 2010
72010
Autonomic and Trusted Computing: 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings
JG Nieto, G Wang, W Reif, J Indulska
Springer Science & Business Media, 2009
2009
系统目前无法执行此操作,请稍后再试。
文章 1–20