Följ
Juan Gonzalez
Juan Gonzalez
Teron Labs
Verifierad e-postadress på teronlabs.com
Titel
Citeras av
Citeras av
År
Detecting relay attacks with timing-based protocols
J Reid, JMG Nieto, T Tang, B Senadji
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2802007
Round-optimal contributory conference key agreement
C Boyd, JMG Nieto
International Workshop on Public Key Cryptography, 161-174, 2002
2182002
Secure data aggregation in wireless sensor network: a survey
H Al Zaid, E Foo, J Gonzalez Nieto
Proceedings of the Sixth Australasian Information Security Conference (AISC …, 2008
1682008
Strongly secure certificateless key agreement
G Lippold, C Boyd, J Gonzalez Nieto
International conference on pairing-based cryptography, 206-230, 2009
1402009
SKMA-A key management architecture for SCADA systems
R Dawson, C Boyd, E Dawson, J Gonzalez Nieto
ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid …, 2006
1282006
Efficient one-round key exchange in the standard model
C Boyd, Y Cliff, J Gonzalez Nieto, KG Paterson
Information Security and Privacy: 13th Australasian Conference, ACISP 2008 …, 2008
1252008
Security-mediated certificateless cryptography
SSM Chow, C Boyd, JMG Nieto
Public Key Cryptography-PKC 2006: 9th International Conference on Theory and …, 2006
1172006
Towards secure and legal e-tendering
M Betts, P Black, S Christensen, E Dawson, R Du, B Duncan, E Foo, ...
Journal of Information Technology in Construction 11 (e-Commerce in …, 2006
862006
Modeling key compromise impersonation attacks on group key exchange protocols
MC Gorantla, C Boyd, JMG Nieto, M Manulis
ACM Transactions on Information and System Security (TISSEC) 14 (4), 1-24, 2008
822008
Privacy and trusted computing
J Reid, JMG Nieto, E Dawson, E Okamoto
14th International Workshop on Database and Expert Systems Applications …, 2003
752003
Attribute-based authenticated key exchange
MC Gorantla, C Boyd, JM González Nieto
Australasian Conference on Information Security and Privacy, 300-317, 2010
712010
Geoproof: Proofs of geographic location for cloud computing environment
A Albeshri, C Boyd, JG Nieto
2012 32nd International Conference on Distributed Computing Systems …, 2012
692012
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
D Stebila, L Kuppusamy, J Rangasamy, C Boyd, J Gonzalez Nieto
Topics in Cryptology–CT-RSA 2011: The Cryptographers’ Track at the RSA …, 2011
692011
Toward non-parallelizable client puzzles
S Tritilanunt, C Boyd, E Foo, JM González Nieto
Cryptology and Network Security: 6th International Conference, CANS 2007 …, 2007
622007
Who is more susceptible to phishing emails?: a Saudi Arabian study
I Alseadoon, T Chan, E Foo, J Gonzalez Nieto
592012
RSDA: Reputation-based secure data aggregation in wireless sensor networks
H Alzaid, E Foo, JG Nieto
2008 Ninth International Conference on Parallel and Distributed Computing …, 2008
582008
One-round key exchange in the standard model
C Boyd, Y Cliff, JMG Nieto, KG Paterson
International Journal of Applied Cryptography 1 (3), 181-199, 2009
512009
Low-cost and strong-security RFID authentication protocol
JC Ha, SJ Moon, JMG Nieto, C Boyd
Emerging Directions in Embedded and Ubiquitous Computing: EUC 2007 Workshops …, 2007
492007
ID-based one-pass authenticated key establishment
C Gorantla, C Boyd, J Gonzalez Nieto
Proceedings of the Sixth Australasian Information Security Conference (AISC …, 2008
452008
Faster pairings on special Weierstrass curves
C Costello, H Hisil, C Boyd, J Gonzalez Nieto, KKH Wong
Pairing-Based Cryptography–Pairing 2009: Third International Conference Palo …, 2009
432009
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20