Juan Manuel Gonzalez Nieto
Juan Manuel Gonzalez Nieto
Bestätigte E-Mail-Adresse bei qut.edu.au
Titel
Zitiert von
Zitiert von
Jahr
Detecting relay attacks with timing-based protocols
J Reid, JMG Nieto, T Tang, B Senadji
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2412007
Round-optimal contributory conference key agreement
C Boyd, JMG Nieto
International Workshop on Public Key Cryptography, 161-174, 2003
2162003
Secure data aggregation in wireless sensor networks: a survey
H Alzaid, E Foo, JM Gonzalez Nieto
Proceedings of the Sixth Australasian Information Security Conference (AISC …, 2008
1532008
SKMA-A key management architecture for SCADA systems
C Boyd, E Dawson, R Dawson, J Gonzalez Nieto
ACSW Frontiers 2006, 183-192, 2006
1172006
Information security governance
SH Solms, R Solms
Springer Science & Business Media, 2008
1112008
Efficient one-round key exchange in the standard model
C Boyd, Y Cliff, JG Nieto, KG Paterson
Australasian Conference on Information Security and Privacy, 69-83, 2008
1102008
Strongly secure certificateless key agreement
G Lippold, C Boyd, JG Nieto
International Conference on Pairing-Based Cryptography, 206-230, 2009
1082009
Security-mediated certificateless cryptography
SSM Chow, C Boyd, JMG Nieto
International Workshop on Public Key Cryptography, 508-524, 2006
992006
Towards secure and legal e-tendering
M Betts, P Black, SA Christensen, E Dawson, R Du, W Duncan, E Foo, ...
Journal of Information Technology in Construction 11, 89-102, 2006
592006
Privacy and trusted computing
J Reid, JMG Nieto, E Dawson, E Okamoto
14th International Workshop on Database and Expert Systems Applications …, 2003
582003
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
D Stebila, L Kuppusamy, J Rangasamy, C Boyd, JG Nieto
Cryptographers’ Track at the RSA Conference, 284-301, 2011
552011
Geoproof: Proofs of geographic location for cloud computing environment
A Albeshri, C Boyd, JG Nieto
2012 32nd International Conference on Distributed Computing Systems …, 2012
542012
Attribute-based authenticated key exchange
MC Gorantla, C Boyd, JMG Nieto
Australasian Conference on Information Security and Privacy, 300-317, 2010
542010
Modeling key compromise impersonation attacks on group key exchange protocols
MC Gorantla, C Boyd, JMG Nieto
International Workshop on Public Key Cryptography, 105-123, 2009
522009
Toward non-parallelizable client puzzles
S Tritilanunt, C Boyd, E Foo, JMG Nieto
International Conference on Cryptology and Network Security, 247-264, 2007
522007
RSDA: reputation-based secure data aggregation in wireless sensor networks
H Alzaid, E Foo, JG Nieto
2008 Ninth International Conference on Parallel and Distributed Computing …, 2008
502008
Low-cost and strong-security RFID authentication protocol
JC Ha, SJ Moon, JMG Nieto, C Boyd
International Conference on Embedded and Ubiquitous Computing, 795-807, 2007
452007
Modelling denial of service attacks on JFK with Meadows's cost-based framework
J Smith, JM Gonzalez-Nieto, C Boyd
Proceedings of the 2006 Australasian workshops on Grid computing and e …, 2006
442006
One-round key exchange in the standard model
C Boyd, Y Cliff, JMG Nieto, KG Paterson
International Journal of Applied Cryptography 1 (3), 181-199, 2009
422009
A public key cryptosystem based on a subgroup membership problem
J Gonzalez-Nieto, C Boyd, E Dawson
Designs, Codes, and Cryptography 36 (3), 301-316, 2005
41*2005
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20