BibTeX records: Juan Manuel González Nieto

download as .bib file

@article{DBLP:journals/cj/RadkeBNB15,
  author       = {Kenneth Radke and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Harry Bartlett},
  title        = {CHURNs: Freshness Assurance for Humans},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {10},
  pages        = {2404--2425},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxu073},
  doi          = {10.1093/COMJNL/BXU073},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/RadkeBNB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/NietoMS14,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Dongdong Sun},
  title        = {Forward-Secure Hierarchical Predicate Encryption},
  journal      = {Comput. J.},
  volume       = {57},
  number       = {4},
  pages        = {510--536},
  year         = {2014},
  url          = {https://doi.org/10.1093/comjnl/bxt029},
  doi          = {10.1093/COMJNL/BXT029},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/NietoMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/NgoBN14,
  author       = {Long Ngo and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Automated Proofs for Computational Indistinguishability},
  journal      = {Comput. J.},
  volume       = {57},
  number       = {10},
  pages        = {1513--1536},
  year         = {2014},
  url          = {https://doi.org/10.1093/comjnl/bxt078},
  doi          = {10.1093/COMJNL/BXT078},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/NgoBN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AlbeshriBN14,
  author       = {Aiiad Albeshri and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Enhanced GeoProof: improved geographic assurance for data in the cloud},
  journal      = {Int. J. Inf. Sec.},
  volume       = {13},
  number       = {2},
  pages        = {191--198},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10207-013-0217-6},
  doi          = {10.1007/S10207-013-0217-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AlbeshriBN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/RadkeBNMS14,
  author       = {Kenneth Radke and
                  Colin Boyd and
                  Juanma Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Douglas Stebila},
  editor       = {Udaya Parampalli and
                  Ian Welch},
  title        = {Formalising Human Recognition: a Fundamental Building Block for Security
                  Proofs},
  booktitle    = {Twelfth Australasian Information Security Conference, {AISC} 2014,
                  Auckland, New Zealand, January 2014},
  series       = {{CRPIT}},
  volume       = {149},
  pages        = {37--45},
  publisher    = {Australian Computer Society},
  year         = {2014},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Radke.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/RadkeBNMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/NietoMPRS13,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Bertram Poettering and
                  Jothi Rangasamy and
                  Douglas Stebila},
  title        = {Publicly verifiable ciphertexts},
  journal      = {J. Comput. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {749--778},
  year         = {2013},
  url          = {https://doi.org/10.3233/JCS-130473},
  doi          = {10.3233/JCS-130473},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/NietoMPRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SunBN13,
  author       = {Dongdong Sun and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Predicate encryption for multi-inner-products},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {3},
  pages        = {325--339},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.566},
  doi          = {10.1002/SEC.566},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SunBN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ozchi/RadkeBNB13,
  author       = {Kenneth Radke and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Laurie Buys},
  editor       = {Haifeng Shen and
                  Ross T. Smith and
                  Jeni Paay and
                  Paul R. Calder and
                  Theodor G. Wyeld},
  title        = {"Who decides?": security and privacy in the wild},
  booktitle    = {Augmentation, Application, Innovation, Collaboration, OzCHI '13, Adelaide,
                  Australia - November 25 - 29, 2013},
  pages        = {27--36},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2541016.2541043},
  doi          = {10.1145/2541016.2541043},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ozchi/RadkeBNB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnds/AlzaidFNP12,
  author       = {Hani Alzaid and
                  Ernest Foo and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  DongGook Park},
  title        = {A taxonomy of secure data aggregation in wireless sensor networks},
  journal      = {Int. J. Commun. Networks Distributed Syst.},
  volume       = {8},
  number       = {1/2},
  pages        = {101--148},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJCNDS.2012.044325},
  doi          = {10.1504/IJCNDS.2012.044325},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnds/AlzaidFNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AlzaidFNA12,
  author       = {Hani Alzaid and
                  Ernest Foo and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Ejaz Ahmed},
  title        = {Mitigating On-Off attacks in reputation-based secure data aggregation
                  for wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {2},
  pages        = {125--144},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.286},
  doi          = {10.1002/SEC.286},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AlzaidFNA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/RangasamySBNK12,
  author       = {Jothi Rangasamy and
                  Douglas Stebila and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Lakshmi Kuppusamy},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Effort-Release Public-Key Encryption from Cryptographic Puzzles},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {194--207},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_15},
  doi          = {10.1007/978-3-642-31448-3\_15},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/RangasamySBNK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NietoMS12,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Dongdong Sun},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Fully Private Revocable Predicate Encryption},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {350--363},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_26},
  doi          = {10.1007/978-3-642-31448-3\_26},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/NietoMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeBN12,
  author       = {Kaleb Lee and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Minimizing Information Leakage of Tree-Based {RFID} Authentication
                  Protocols Using Alternate Tree-Walking},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {434--441},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_33},
  doi          = {10.1007/978-3-642-31448-3\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LeeBN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/RadkeBNB12,
  author       = {Kenneth Radke and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Margot Brereton},
  editor       = {Josef Pieprzyk and
                  Clark D. Thomborson},
  title        = {Towards a Secure Human-and-Computer Mutual Authentication Protocol},
  booktitle    = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne,
                  Australia, January 2012},
  series       = {{CRPIT}},
  volume       = {125},
  pages        = {39--46},
  publisher    = {Australian Computer Society},
  year         = {2012},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Radke.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/RadkeBNB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/LeeNB12,
  author       = {Kaleb Lee and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd},
  editor       = {Josef Pieprzyk and
                  Clark D. Thomborson},
  title        = {Improving the Efficiency of {RFID} Authentication with Pre-Computation},
  booktitle    = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne,
                  Australia, January 2012},
  series       = {{CRPIT}},
  volume       = {125},
  pages        = {91--100},
  publisher    = {Australian Computer Society},
  year         = {2012},
  timestamp    = {Fri, 01 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/auisc/LeeNB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KuppusamyRSBN12,
  author       = {Lakshmi Kuppusamy and
                  Jothi Rangasamy and
                  Douglas Stebila and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Practical client puzzles in the standard model},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {42--43},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414480},
  doi          = {10.1145/2414456.2414480},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KuppusamyRSBN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/LeeNB12,
  author       = {Kaleb Lee and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd},
  editor       = {Yang Xiang and
                  Javier L{\'{o}}pez and
                  C.{-}C. Jay Kuo and
                  Wanlei Zhou},
  title        = {A State-Aware {RFID} Privacy Model with Reader Corruption},
  booktitle    = {Cyberspace Safety and Security - 4th International Symposium, {CSS}
                  2012, Melbourne, Australia, December 12-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7672},
  pages        = {324--338},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35362-8\_25},
  doi          = {10.1007/978-3-642-35362-8\_25},
  timestamp    = {Fri, 22 Apr 2022 17:07:03 +0200},
  biburl       = {https://dblp.org/rec/conf/css/LeeNB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/AlbeshriBN12,
  author       = {Aiiad Albeshri and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {GeoProof: Proofs of Geographic Location for Cloud Computing Environment},
  booktitle    = {32nd International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2012 Workshops), Macau, China, June 18-21, 2012},
  pages        = {506--514},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDCSW.2012.50},
  doi          = {10.1109/ICDCSW.2012.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/AlbeshriBN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WenDNS12,
  author       = {Chuah Chai Wen and
                  Ed Dawson and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Leonie Simpson},
  editor       = {Mark Dermot Ryan and
                  Ben Smyth and
                  Guilin Wang},
  title        = {A Framework for Security Analysis of Key Derivation Functions},
  booktitle    = {Information Security Practice and Experience - 8th International Conference,
                  {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7232},
  pages        = {199--216},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29101-2\_14},
  doi          = {10.1007/978-3-642-29101-2\_14},
  timestamp    = {Wed, 07 Dec 2022 23:12:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WenDNS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/NietoMS12,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Dongdong Sun},
  editor       = {Michel Abdalla and
                  Tanja Lange},
  title        = {Forward-Secure Hierarchical Predicate Encryption},
  booktitle    = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference,
                  Cologne, Germany, May 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7708},
  pages        = {83--101},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36334-4\_6},
  doi          = {10.1007/978-3-642-36334-4\_6},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/NietoMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/NietoMPRS12,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Bertram Poettering and
                  Jothi Rangasamy and
                  Douglas Stebila},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {Publicly Verifiable Ciphertexts},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {393--410},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_22},
  doi          = {10.1007/978-3-642-32928-9\_22},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/NietoMPRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NietoMPRS12,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Bertram Poettering and
                  Jothi Rangasamy and
                  Douglas Stebila},
  title        = {Publicly Verifiable Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NietoMPRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NietoMS12,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Dongdong Sun},
  title        = {Forward-Secure Hierarchical Predicate Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {402},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/402},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NietoMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NietoMS12a,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Dongdong Sun},
  title        = {Fully Private Revocable Predicate Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {403},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/403},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NietoMS12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GorantlaBNM11,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis},
  title        = {Modeling key compromise impersonation attacks on group key exchange
                  protocols},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {28:1--28:24},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043628.2043629},
  doi          = {10.1145/2043628.2043629},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/GorantlaBNM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RangasamySBN11,
  author       = {Jothi Rangasamy and
                  Douglas Stebila and
                  Colin Boyd and
                  Juanma Gonz{\'{a}}lez Nieto},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {An integrated approach to cryptographic mitigation of denial-of-service
                  attacks},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {114--123},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966929},
  doi          = {10.1145/1966913.1966929},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RangasamySBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/NgoBN11,
  author       = {Long Ngo and
                  Colin Boyd and
                  Juanma Gonz{\'{a}}lez Nieto},
  title        = {Automated Proofs for Diffie-Hellman-Based Key Exchanges},
  booktitle    = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  pages        = {51--65},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CSF.2011.11},
  doi          = {10.1109/CSF.2011.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/NgoBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/StebilaKRBN11,
  author       = {Douglas Stebila and
                  Lakshmi Kuppusamy and
                  Jothi Rangasamy and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Aggelos Kiayias},
  title        = {Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant
                  Protocols},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {284--301},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_19},
  doi          = {10.1007/978-3-642-19074-2\_19},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/StebilaKRBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/RangasamySKBN11,
  author       = {Jothi Rangasamy and
                  Douglas Stebila and
                  Lakshmi Kuppusamy and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Howon Kim},
  title        = {Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service
                  Protection},
  booktitle    = {Information Security and Cryptology - {ICISC} 2011 - 14th International
                  Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7259},
  pages        = {319--331},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31912-9\_21},
  doi          = {10.1007/978-3-642-31912-9\_21},
  timestamp    = {Wed, 01 Mar 2023 16:53:12 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/RangasamySKBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BoydN11,
  author       = {Colin Boyd and
                  Juanma Gonz{\'{a}}lez Nieto},
  editor       = {Liqun Chen},
  title        = {On Forward Secrecy in One-Round Key Exchange},
  booktitle    = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
                  2011, Oxford, UK, December 12-15, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7089},
  pages        = {451--468},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25516-8\_27},
  doi          = {10.1007/978-3-642-25516-8\_27},
  timestamp    = {Wed, 18 Mar 2020 16:00:56 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BoydN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/KuppusamyRSBN11,
  author       = {Lakshmi Kuppusamy and
                  Jothi Rangasamy and
                  Douglas Stebila and
                  Colin Boyd and
                  Juanma Gonz{\'{a}}lez Nieto},
  editor       = {Daniel J. Bernstein and
                  Sanjit Chatterjee},
  title        = {Towards a Provably Secure DoS-Resilient Key Exchange Protocol with
                  Perfect Forward Secrecy},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
                  on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7107},
  pages        = {379--398},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25578-6\_27},
  doi          = {10.1007/978-3-642-25578-6\_27},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/KuppusamyRSBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/interact/RadkeBMGBN11,
  author       = {Kenneth Radke and
                  Margot Brereton and
                  Seyed Hadi Mirisaee and
                  Sunil Ghelawat and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Pedro F. Campos and
                  T. C. Nicholas Graham and
                  Joaquim A. Jorge and
                  Nuno Jardim Nunes and
                  Philippe A. Palanque and
                  Marco Winckler},
  title        = {Tensions in Developing a Secure Collective Information Practice -
                  The Case of Agile Ridesharing},
  booktitle    = {Human-Computer Interaction - {INTERACT} 2011 - 13th {IFIP} {TC} 13
                  International Conference, Lisbon, Portugal, September 5-9, 2011, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6947},
  pages        = {524--532},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23771-3\_39},
  doi          = {10.1007/978-3-642-23771-3\_39},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/interact/RadkeBMGBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/RadkeBNB11,
  author       = {Kenneth Radke and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Margot Brereton},
  editor       = {Jan Camenisch and
                  Simone Fischer{-}H{\"{u}}bner and
                  Yuko Murayama and
                  Armand Portmann and
                  Carlos Rieder},
  title        = {Ceremony Analysis: Strengths and Weaknesses},
  booktitle    = {Future Challenges in Security and Privacy for Academia and Industry
                  - 26th {IFIP} {TC} 11 International Information Security Conference,
                  {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {354},
  pages        = {104--115},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21424-0\_9},
  doi          = {10.1007/978-3-642-21424-0\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/RadkeBNB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RangasamySKBN11,
  author       = {Jothi Rangasamy and
                  Douglas Stebila and
                  Lakshmi Kuppusamy and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Efficient Modular Exponentiation-based Puzzles for Denial-of-Service
                  Protection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {665},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/665},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RangasamySKBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GorantlaBN10,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Attribute-Based Authenticated Key Exchange},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {300--317},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_19},
  doi          = {10.1007/978-3-642-14081-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GorantlaBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/CostelloBNW10,
  author       = {Craig Costello and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kenneth Koon{-}Ho Wong},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Avoiding Full Extension Field Arithmetic in Pairing Computations},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {203--224},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_13},
  doi          = {10.1007/978-3-642-12678-9\_13},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/CostelloBNW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/AlzaidPNF10,
  author       = {Hani Alzaid and
                  DongGook Park and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Ernest Foo},
  title        = {Mitigating Sandwich Attacks Against a Secure Key Management Scheme
                  in Wireless Sensor Networks for {PCS/SCADA}},
  booktitle    = {24th {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2010, Perth, Australia, 20-13 April 2010},
  pages        = {859--865},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/AINA.2010.93},
  doi          = {10.1109/AINA.2010.93},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/AlzaidPNF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/LippoldN10,
  author       = {Georg Lippold and
                  Juanma Gonz{\'{a}}lez Nieto},
  editor       = {Colin Boyd and
                  Willy Susilo},
  title        = {Certificateless Key Agreement in the Standard Model},
  booktitle    = {8th Australasian Information Security Conference 2010, {AISC} 2010,
                  Brisbane, Australia, January 2010},
  series       = {{CRPIT}},
  volume       = {105},
  pages        = {75--85},
  publisher    = {Australian Computer Society},
  year         = {2010},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Lippold.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/LippoldN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ozchi/RadkeBBN10,
  author       = {Kenneth Radke and
                  Colin Boyd and
                  Margot Brereton and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Margot Brereton and
                  Stephen Viller and
                  Ben Kraal},
  title        = {How {HCI} design influences web security decisions},
  booktitle    = {Proceedings of the 22nd Australasian Computer-Human Interaction Conference,
                  {OZCHI} 2010, Brisbane, Australia, November 22-26, 2010},
  pages        = {252--255},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1952222.1952276},
  doi          = {10.1145/1952222.1952276},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ozchi/RadkeBBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/NgoBN10,
  author       = {Long Ngo and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Automating Computational Proofs for Public-Key-Based Key Exchange},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {53--69},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_4},
  doi          = {10.1007/978-3-642-16280-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/NgoBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SunBN10,
  author       = {Dongdong Sun and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Kai Rannenberg and
                  Vijay Varadharajan and
                  Christian Weber},
  title        = {Delegation in Predicate Encryption Supporting Disjunctive Queries},
  booktitle    = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11}
                  International Information Security Conference, {SEC} 2010, Held as
                  Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {330},
  pages        = {229--240},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15257-3\_21},
  doi          = {10.1007/978-3-642-15257-3\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SunBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/CostelloBNW10,
  author       = {Craig Costello and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kenneth Koon{-}Ho Wong},
  editor       = {M. Anwar Hasan and
                  Tor Helleseth},
  title        = {Delaying Mismatched Field Multiplications in Pairing Computations},
  booktitle    = {Arithmetic of Finite Fields, Third International Workshop, {WAIFI}
                  2010, Istanbul, Turkey, June 27-30, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6087},
  pages        = {196--214},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13797-6\_14},
  doi          = {10.1007/978-3-642-13797-6\_14},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/waifi/CostelloBNW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorantlaBN10,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {One Round Group Key Exchange with Forward Security in the Standard
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorantlaBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorantlaBN10a,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Attribute-based Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorantlaBN10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostelloBNW10,
  author       = {Craig Costello and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kenneth Koon{-}Ho Wong},
  title        = {Avoiding Full Extension Field Arithmetic in Pairing Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostelloBNW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostelloBNW10a,
  author       = {Craig Costello and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kenneth Koon{-}Ho Wong},
  title        = {Delaying Mismatched Field Multiplications in Pairing Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostelloBNW10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StebilaKRBN10,
  author       = {Douglas Stebila and
                  Lakshmi Kuppusamy and
                  Jothi Rangasamy and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Stronger difficulty notions for client puzzles and denial-of-service-resistant
                  protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {649},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/649},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StebilaKRBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BoydCNP09,
  author       = {Colin Boyd and
                  Yvonne Cliff and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kenneth G. Paterson},
  title        = {One-round key exchange in the standard model},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {181--199},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.023466},
  doi          = {10.1504/IJACT.2009.023466},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/BoydCNP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CliffBN09,
  author       = {Yvonne Cliff and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {How to Extract and Expand Randomness: {A} Summary and Explanation
                  of Existing Results},
  booktitle    = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {53--70},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9\_4},
  doi          = {10.1007/978-3-642-01957-9\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CliffBN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/GorantlaBN09,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Strong Designated Verifier Signature in a Multi-user Setting},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {21--31},
  publisher    = {Australian Computer Society},
  year         = {2009},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Gorantla.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/GorantlaBN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GorantlaBN09,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Universally composable contributory group key exchange},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {146--156},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533079},
  doi          = {10.1145/1533057.1533079},
  timestamp    = {Fri, 18 Mar 2022 11:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GorantlaBN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GorantlaBNM09,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Generic One Round Group Key Exchange in the Standard Model},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_1},
  doi          = {10.1007/978-3-642-14423-3\_1},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/GorantlaBNM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LippoldBN09,
  author       = {Georg Lippold and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Efficient Certificateless {KEM} in the Standard Model},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {34--46},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_3},
  doi          = {10.1007/978-3-642-14423-3\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LippoldBN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/CostelloHBNW09,
  author       = {Craig Costello and
                  H{\"{u}}seyin Hisil and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kenneth Koon{-}Ho Wong},
  editor       = {Hovav Shacham and
                  Brent Waters},
  title        = {Faster Pairings on Special Weierstrass Curves},
  booktitle    = {Pairing-Based Cryptography - Pairing 2009, Third International Conference,
                  Palo Alto, CA, USA, August 12-14, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5671},
  pages        = {89--101},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03298-1\_7},
  doi          = {10.1007/978-3-642-03298-1\_7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pairing/CostelloHBNW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/LippoldBN09,
  author       = {Georg Lippold and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Hovav Shacham and
                  Brent Waters},
  title        = {Strongly Secure Certificateless Key Agreement},
  booktitle    = {Pairing-Based Cryptography - Pairing 2009, Third International Conference,
                  Palo Alto, CA, USA, August 12-14, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5671},
  pages        = {206--230},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03298-1\_14},
  doi          = {10.1007/978-3-642-03298-1\_14},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/LippoldBN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GorantlaBN09,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Modeling Key Compromise Impersonation Attacks on Group Key Exchange
                  Protocols},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {105--123},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_7},
  doi          = {10.1007/978-3-642-00468-1\_7},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GorantlaBN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scube/AlzaidPNBF09,
  author       = {Hani Alzaid and
                  DongGook Park and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd and
                  Ernest Foo},
  editor       = {Stephen Hailes and
                  Sabrina Sicari and
                  George Roussos},
  title        = {A Forward and Backward Secure Key Management in Wireless Sensor Networks
                  for {PCS/SCADA}},
  booktitle    = {Sensor Systems and Software - First International {ICST} Conference,
                  {S-CUBE} 2009, Pisa, Italy, September 7-9, 2009, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {24},
  pages        = {66--82},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11528-8\_6},
  doi          = {10.1007/978-3-642-11528-8\_6},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scube/AlzaidPNBF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2009,
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1},
  doi          = {10.1007/978-3-642-02620-1},
  isbn         = {978-3-642-02619-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CliffBN09,
  author       = {Yvonne Cliff and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {How to Extract and Expand Randomness: {A} Summary and Explanation
                  of Existing Results},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {136},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/136},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CliffBN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LippoldBN09,
  author       = {Georg Lippold and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Strongly Secure Certificateless Key Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LippoldBN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostelloHBNW09,
  author       = {Craig Costello and
                  H{\"{u}}seyin Hisil and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kenneth Koon{-}Ho Wong},
  title        = {Faster Pairings on Special Weierstrass Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/243},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostelloHBNW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorantlaBN09,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Modeling Key Compromise Impersonation Attacks on Group Key Exchange
                  Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorantlaBN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorantlaBN09a,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Universally Composable Contributory Group Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {300},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/300},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorantlaBN09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorantlaBN09b,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {On the Connection between Signcryption and One-pass Key Establishment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {436},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorantlaBN09b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LippoldBN09a,
  author       = {Georg Lippold and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Efficient Certificateless {KEM} in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {451},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/451},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LippoldBN09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorantlaBNM09,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis},
  title        = {Generic One Round Group Key Exchange in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {514},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/514},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorantlaBNM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BoydCNP08,
  author       = {Colin Boyd and
                  Yvonne Cliff and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kenneth G. Paterson},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Efficient One-Round Key Exchange in the Standard Model},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {69--83},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_6},
  doi          = {10.1007/978-3-540-70500-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BoydCNP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/GorantlaBN08,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {ID-based One-pass Authenticated Key Establishment},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {39--46},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Gorantla.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/GorantlaBN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/AlzaidFN08,
  author       = {Hani Alzaid and
                  Ernest Foo and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {Secure Data Aggregation in Wireless Sensor Network: a survey},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {93--105},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Alzaid.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/AlzaidFN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/AlzaidFN08,
  author       = {Hani Alzaid and
                  Ernest Foo and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {{RSDA:} Reputation-Based Secure Data Aggregation in Wireless Sensor
                  Networks},
  booktitle    = {Ninth International Conference on Parallel and Distributed Computing,
                  Applications and Technologies, {PDCAT} 2008, Dunedin, Otago, New Zealand,
                  1-4 December 2008},
  pages        = {419--424},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PDCAT.2008.52},
  doi          = {10.1109/PDCAT.2008.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdcat/AlzaidFN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydCNP08,
  author       = {Colin Boyd and
                  Yvonne Cliff and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kenneth G. Paterson},
  title        = {Efficient One-round Key Exchange in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydCNP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/SmithTBNF07,
  author       = {Jason Smith and
                  Suratose Tritilanunt and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Ernest Foo},
  title        = {Denial-of-service resistance in key establishment},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {2},
  number       = {1},
  pages        = {59--71},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJWMC.2007.013796},
  doi          = {10.1504/IJWMC.2007.013796},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwmc/SmithTBNF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsc/TritilanuntBFN07,
  author       = {Suratose Tritilanunt and
                  Colin Boyd and
                  Ernest Foo and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Gillian Dobbie},
  title        = {Cost-Based Framework and Simulation of DoS-Resistant Protocols Using
                  Coloured Petri Nets},
  booktitle    = {Computer Science 2007. Proceedings of the Thirtieth Australasian Computer
                  Science Conference {(ACSC2007).} Ballarat, Victoria, Australia, January
                  30 - February 2, 2007. Proceedings},
  series       = {{CRPIT}},
  volume       = {62},
  pages        = {191--200},
  publisher    = {Australian Computer Society},
  year         = {2007},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV62Tritilanunt.html},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsc/TritilanuntBFN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/TritilanuntBFN07,
  author       = {Suratose Tritilanunt and
                  Colin Boyd and
                  Ernest Foo and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Feng Bao and
                  San Ling and
                  Tatsuaki Okamoto and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {Toward Non-parallelizable Client Puzzles},
  booktitle    = {Cryptology and Network Security, 6th International Conference, {CANS}
                  2007, Singapore, December 8-10, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4856},
  pages        = {247--264},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76969-9\_16},
  doi          = {10.1007/978-3-540-76969-9\_16},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/TritilanuntBFN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ReidNTS07,
  author       = {Jason Reid and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Tee Tang and
                  Bouchra Senadji},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Detecting relay attacks with timing-based protocols},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {204--213},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229314},
  doi          = {10.1145/1229285.1229314},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ReidNTS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/egov/BurdonNCDDL07,
  author       = {Mark Burdon and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Sharon Christensen and
                  Ed Dawson and
                  William D. Duncan and
                  Bill Lane},
  editor       = {Maria A. Wimmer and
                  Hans Jochen Scholl and
                  {\AA}ke Gr{\"{o}}nlund},
  title        = {Access Control in Federated Databases: How Legal Issues Shape Security},
  booktitle    = {Electronic Government, 6th International Conference, {EGOV} 2007,
                  Regensburg, Germany, September 3-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4656},
  pages        = {228--239},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74444-3\_20},
  doi          = {10.1007/978-3-540-74444-3\_20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/egov/BurdonNCDDL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/HaKPMNB07,
  author       = {JaeCheol Ha and
                  Hwankoo Kim and
                  JeaHoon Park and
                  Sang{-}Jae Moon and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd},
  editor       = {Mieso K. Denko and
                  Chi{-}Sheng Shih and
                  Kuan{-}Ching Li and
                  Shiao{-}Li Tsao and
                  Qing{-}An Zeng and
                  Soo{-}Hyun Park and
                  Young{-}Bae Ko and
                  Shih{-}Hao Hung and
                  Jong Hyuk Park},
  title        = {{HGLAP} - Hierarchical Group-Index Based Lightweight Authentication
                  Protocol for Distributed {RFID} System},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007
                  Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei,
                  Taiwan, December 17-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4809},
  pages        = {557--567},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77090-9\_52},
  doi          = {10.1007/978-3-540-77090-9\_52},
  timestamp    = {Wed, 22 Jun 2022 09:02:26 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/HaKPMNB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/HaMNB07,
  author       = {JaeCheol Ha and
                  Sang{-}Jae Moon and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd},
  editor       = {Mieso K. Denko and
                  Chi{-}Sheng Shih and
                  Kuan{-}Ching Li and
                  Shiao{-}Li Tsao and
                  Qing{-}An Zeng and
                  Soo{-}Hyun Park and
                  Young{-}Bae Ko and
                  Shih{-}Hao Hung and
                  Jong Hyuk Park},
  title        = {Low-Cost and Strong-Security {RFID} Authentication Protocol},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007
                  Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei,
                  Taiwan, December 17-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4809},
  pages        = {795--807},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77090-9\_72},
  doi          = {10.1007/978-3-540-77090-9\_72},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/HaMNB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/GorantlaBN07,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Steven D. Galbraith},
  title        = {On the Connection Between Signcryption and One-Pass Key Establishment},
  booktitle    = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester,
                  UK, December 18-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4887},
  pages        = {277--301},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77272-9\_17},
  doi          = {10.1007/978-3-540-77272-9\_17},
  timestamp    = {Wed, 18 Mar 2020 16:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/GorantlaBN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/TsoNOBO07,
  author       = {Raylin Tso and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Takeshi Okamoto and
                  Colin Boyd and
                  Eiji Okamoto},
  editor       = {Steven D. Galbraith},
  title        = {Verifier-Key-Flexible Universal Designated-Verifier Signatures},
  booktitle    = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester,
                  UK, December 18-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4887},
  pages        = {403--421},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77272-9\_24},
  doi          = {10.1007/978-3-540-77272-9\_24},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/TsoNOBO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pakdd/HaMNB07,
  author       = {JaeCheol Ha and
                  Sang{-}Jae Moon and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd},
  editor       = {Takashi Washio and
                  Zhi{-}Hua Zhou and
                  Joshua Zhexue Huang and
                  Xiaohua Hu and
                  Jinyan Li and
                  Chao Xie and
                  Jieyue He and
                  Deqing Zou and
                  Kuan{-}Ching Li and
                  M{\'{a}}rio M. Freire},
  title        = {Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication
                  Protocol {(OHLCAP)}},
  booktitle    = {Emerging Technologies in Knowledge Discovery and Data Mining, {PAKDD}
                  2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4819},
  pages        = {574--583},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77018-3\_57},
  doi          = {10.1007/978-3-540-77018-3\_57},
  timestamp    = {Fri, 09 Apr 2021 17:11:17 +0200},
  biburl       = {https://dblp.org/rec/conf/pakdd/HaMNB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/HitchcockBN06,
  author       = {Yvonne Hitchcock and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk
                  model},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {16},
  number       = {6},
  pages        = {405--438},
  year         = {2006},
  url          = {https://doi.org/10.1007/s00200-005-0185-9},
  doi          = {10.1007/S00200-005-0185-9},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/HitchcockBN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itcon/BettsBCDDDFN06,
  author       = {Martin P. Betts and
                  Peter Black and
                  Sharon Christensen and
                  Ed Dawson and
                  Rong Du and
                  William D. Duncan and
                  Ernest Foo and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Towards Secure and Legal E-Tendering},
  journal      = {J. Inf. Technol. Constr.},
  volume       = {11},
  pages        = {89--102},
  year         = {2006},
  url          = {https://www.itcon.org/paper/2006/7},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itcon/BettsBCDDDFN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/SmithNB06,
  author       = {Jason Smith and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd},
  editor       = {Rajkumar Buyya and
                  Tianchi Ma and
                  Reihaneh Safavi{-}Naini and
                  Chris Steketee and
                  Willy Susilo},
  title        = {Modelling denial of service attacks on {JFK} with Meadows's cost-based
                  framework},
  booktitle    = {The proceedings of the Fourth Australasian Symposium on Grid Computing
                  and e-Research (AusGrid 2006) and the Fourth Australasian Information
                  Security Workshop (Network Security) {(AISW} 2006), Hobart, Tasmania,
                  Australia, January 2006},
  series       = {{CRPIT}},
  volume       = {54},
  pages        = {125--134},
  publisher    = {Australian Computer Society},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1151844},
  timestamp    = {Mon, 26 Nov 2018 12:14:45 +0100},
  biburl       = {https://dblp.org/rec/conf/acsw/SmithNB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/DawsonBDN06,
  author       = {Robert Dawson and
                  Colin Boyd and
                  Ed Dawson and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Rajkumar Buyya and
                  Tianchi Ma and
                  Reihaneh Safavi{-}Naini and
                  Chris Steketee and
                  Willy Susilo},
  title        = {{SKMA:} a key management architecture for {SCADA} systems},
  booktitle    = {The proceedings of the Fourth Australasian Symposium on Grid Computing
                  and e-Research (AusGrid 2006) and the Fourth Australasian Information
                  Security Workshop (Network Security) {(AISW} 2006), Hobart, Tasmania,
                  Australia, January 2006},
  series       = {{CRPIT}},
  volume       = {54},
  pages        = {183--192},
  publisher    = {Australian Computer Society},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1151850},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsw/DawsonBDN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BrownNB06,
  author       = {Jaimee Brown and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd},
  editor       = {David Pointcheval and
                  Yi Mu and
                  Kefei Chen},
  title        = {Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership
                  Problems},
  booktitle    = {Cryptology and Network Security, 5th International Conference, {CANS}
                  2006, Suzhou, China, December 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4301},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935070\_1},
  doi          = {10.1007/11935070\_1},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/BrownNB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PengNDD06,
  author       = {Kun Peng and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Yvo Desmedt and
                  Ed Dawson},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Klein Bottle Routing: An Alternative to Onion Routing and Mix Network},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {296--309},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_25},
  doi          = {10.1007/11927587\_25},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PengNDD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BrownNB06,
  author       = {Jaimee Brown and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd},
  editor       = {Rana Barua and
                  Tanja Lange},
  title        = {Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related
                  Assumptions},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
                  on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4329},
  pages        = {176--190},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941378\_13},
  doi          = {10.1007/11941378\_13},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BrownNB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/TritilanuntBFN06,
  author       = {Suratose Tritilanunt and
                  Colin Boyd and
                  Ernest Foo and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Robert Meersman and
                  Zahir Tari and
                  Pilar Herrero},
  title        = {Examining the DoS Resistance of {HIP}},
  booktitle    = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops,
                  {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS,
                  COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM}
                  Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier,
                  France, October 29 - November 3, 2006. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4277},
  pages        = {616--625},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11915034\_85},
  doi          = {10.1007/11915034\_85},
  timestamp    = {Thu, 14 Oct 2021 10:28:26 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/TritilanuntBFN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChowBN06,
  author       = {Sherman S. M. Chow and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Security-Mediated Certificateless Cryptography},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {508--524},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_33},
  doi          = {10.1007/11745853\_33},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChowBN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NietoBD05,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd and
                  Ed Dawson},
  title        = {A Public Key Cryptosystem Based On {A} Subgroup Membership Problem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {3},
  pages        = {301--316},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1721-5},
  doi          = {10.1007/S10623-004-1721-5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/NietoBD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SteketeeBNM05,
  author       = {Chris Steketee and
                  Jaimee Brown and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Paul Montague},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {{GBD} Threshold Cryptography with an Application to {RSA} Key Recovery},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {394--405},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_33},
  doi          = {10.1007/11506157\_33},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SteketeeBNM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/PengDNOL05,
  author       = {Kun Peng and
                  Ed Dawson and
                  Juanma Gonz{\'{a}}lez Nieto and
                  Eiji Okamoto and
                  Javier L{\'{o}}pez},
  editor       = {Yvo Desmedt and
                  Huaxiong Wang and
                  Yi Mu and
                  Yongqing Li},
  title        = {A Novel Method to Maintain Privacy in Mobile Agent Applications},
  booktitle    = {Cryptology and Network Security, 4th International Conference, {CANS}
                  2005, Xiamen, China, December 14-16, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3810},
  pages        = {247--260},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599371\_21},
  doi          = {10.1007/11599371\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/PengDNOL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/DuFNB05,
  author       = {Rong Du and
                  Ernest Foo and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  G{\"{u}}nther Pernul},
  title        = {Designing Secure E-Tendering Systems},
  booktitle    = {Trust, Privacy and Security in Digital Business: Second International
                  Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3592},
  pages        = {70--79},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11537878\_8},
  doi          = {10.1007/11537878\_8},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/DuFNB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2005,
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b137750},
  doi          = {10.1007/B137750},
  isbn         = {3-540-26547-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GauravaramMND05,
  author       = {Praveen Gauravaram and
                  William Millan and
                  Juanma Gonz{\'{a}}lez Nieto and
                  Ed Dawson},
  title        = {3C- {A} Provably Secure Pseudorandom Function and Message Authentication
                  Code.A New mode of operation for Cryptographic Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {390},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/390},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GauravaramMND05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GauravaramMN05,
  author       = {Praveen Gauravaram and
                  William Millan and
                  Juanma Gonz{\'{a}}lez Nieto},
  title        = {Some thoughts on Collision Attacks in the Hash Functions MD5, {SHA-0}
                  and {SHA-1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {391},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/391},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GauravaramMN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TinVBN04,
  author       = {Yiu Shing Terry Tin and
                  Harikrishna Vasanta and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Protocols with Security Proofs for Mobile Applications},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {358--369},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_31},
  doi          = {10.1007/978-3-540-27800-9\_31},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TinVBN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cau/BrownDN04,
  author       = {Jaimee Brown and
                  Ed Dawson and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Ed Dawson and
                  Wolfgang Klemm},
  title        = {Implementation of the {GBD} Cryptosystem},
  booktitle    = {Cryptographic Algorithms and their Uses - 2004, International Workshop,
                  Gold Coast, Australia, July 5-6, 2004, Proceedings},
  pages        = {94--109},
  publisher    = {Queensland University of Technology},
  year         = {2004},
  timestamp    = {Fri, 16 Jul 2004 13:22:45 +0200},
  biburl       = {https://dblp.org/rec/conf/cau/BrownDN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/ReidCNSV04,
  author       = {Jason Reid and
                  Andrew J. Clark and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Jason Smith and
                  Kapali Viswanathan},
  editor       = {Jo{\~{a}}o Ascenso and
                  Carlos Belo and
                  Luminita Vasiu and
                  M{\'{o}}nica Saramago and
                  Helder Coelhas},
  title        = {Denial of Service Issues in Voice Over {IP} Networks},
  booktitle    = {{ICETE} 2004, 1st International Conference on E-Business and Telecommunication
                  Networks, Set{\'{u}}bal, Portugal, August 24-28, 2004, Proceedings},
  pages        = {230--237},
  publisher    = {{INSTICC} Press},
  year         = {2004},
  timestamp    = {Wed, 22 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/ReidCNSV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/HitchcockBN04,
  author       = {Yvonne Hitchcock and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Anne Canteaut and
                  Kapalee Viswanathan},
  title        = {Tripartite Key Exchange in the Canetti-Krawczyk Proof Model},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
                  on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3348},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30556-9\_3},
  doi          = {10.1007/978-3-540-30556-9\_3},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/HitchcockBN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mata/VasantaTBLN04,
  author       = {Harikrishna Vasanta and
                  Yiu Shing Terry Tin and
                  Colin Boyd and
                  Mark Looi and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Ahmed Karmouch and
                  Larry Korba and
                  Edmundo Roberto Mauro Madeira},
  title        = {A Secure Framework for User Privacy in Heterogeneous Location Networks},
  booktitle    = {Mobility Aware Technologies and Applications, First International
                  Workshop,MATA 2004, Florian{\'{o}}polis, Brazil, October 20-22,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3284},
  pages        = {264--274},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30178-3\_25},
  doi          = {10.1007/978-3-540-30178-3\_25},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/mata/VasantaTBLN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TinBN03,
  author       = {Yiu Shing Terry Tin and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk
                  Approach},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {166--179},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_15},
  doi          = {10.1007/3-540-45067-X\_15},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TinBN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/TinBN03,
  author       = {Yiu Shing Terry Tin and
                  Colin Boyd and
                  Juanma Gonz{\'{a}}lez Nieto},
  editor       = {Chris W. Johnson and
                  Paul Montague and
                  Chris Steketee},
  title        = {Provably Secure Key Exchange: An Engineering Approach},
  booktitle    = {{ACSW} Frontiers 2003, 2003 {ACSW} Workshops - the Australasian Information
                  Security Workshop {(AISW)} and the Workshop on Wearable, Invisible,
                  Context-Aware, Ambient, Pervasive and Ubiquitous Computing (WICAPUC),
                  Adelaide, South Australia, February 2003},
  series       = {{CRPIT}},
  volume       = {21},
  pages        = {97--104},
  publisher    = {Australian Computer Society},
  year         = {2003},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV21ATin.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsw/TinBN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/NietoDO03,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Ed Dawson and
                  Eiji Okamoto},
  title        = {Privacy and Trusted Computing},
  booktitle    = {14th International Workshop on Database and Expert Systems Applications
                  (DEXA'03), September 1-5, 2003, Prague, Czech Republic},
  pages        = {383--388},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DEXA.2003.1232052},
  doi          = {10.1109/DEXA.2003.1232052},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/NietoDO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/HitchcockTNBM03,
  author       = {Yvonne Hitchcock and
                  Yiu Shing Terry Tin and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd and
                  Paul Montague},
  editor       = {Thomas Johansson and
                  Subhamoy Maitra},
  title        = {A Password-Based Authenticator: Security Proof and Applications},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference
                  on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2904},
  pages        = {388--401},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24582-7\_29},
  doi          = {10.1007/978-3-540-24582-7\_29},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/HitchcockTNBM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BoydN03,
  author       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Yvo Desmedt},
  title        = {Round-Optimal Contributory Conference Key Agreement},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {161--174},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_12},
  doi          = {10.1007/3-540-36288-6\_12},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BoydN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/NietoVBCD02,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kapali Viswanathan and
                  Colin Boyd and
                  Andrew J. Clark and
                  Ed Dawson},
  title        = {Key recovery for the commercial environment},
  journal      = {Int. J. Inf. Sec.},
  volume       = {1},
  number       = {3},
  pages        = {161--174},
  year         = {2002},
  url          = {https://doi.org/10.1007/s10207-002-0014-0},
  doi          = {10.1007/S10207-002-0014-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/NietoVBCD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/NietoBD01,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd and
                  Ed Dawson},
  editor       = {Sihan Qing and
                  Tatsuaki Okamoto and
                  Jianying Zhou},
  title        = {A Public Key Cryptosystem Based on the Subgroup Membership Problem},
  booktitle    = {Information and Communications Security, Third International Conference,
                  {ICICS} 2001, Xian, China, November 13-16, 2001},
  series       = {Lecture Notes in Computer Science},
  volume       = {2229},
  pages        = {352--363},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45600-7\_38},
  doi          = {10.1007/3-540-45600-7\_38},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/NietoBD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NietoVBD00,
  author       = {Juanma Gonz{\'{a}}lez Nieto and
                  Kapali Viswanathan and
                  Colin Boyd and
                  Ed Dawson},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Key Recovery System for the Commercial Environment},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {149--162},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_13},
  doi          = {10.1007/10718964\_13},
  timestamp    = {Sat, 19 Oct 2019 20:34:19 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NietoVBD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ParkBD00,
  author       = {Juanma Gonz{\'{a}}lez Nieto and
                  DongGook Park and
                  Colin Boyd and
                  Ed Dawson},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Key Recovery in Third Generation Wireless Communication Systems},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_16},
  doi          = {10.1007/978-3-540-46588-1\_16},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ParkBD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics