Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Juan Manuel González Nieto
@article{DBLP:journals/cj/RadkeBNB15, author = {Kenneth Radke and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Harry Bartlett}, title = {CHURNs: Freshness Assurance for Humans}, journal = {Comput. J.}, volume = {58}, number = {10}, pages = {2404--2425}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxu073}, doi = {10.1093/COMJNL/BXU073}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/RadkeBNB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/NietoMS14, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Dongdong Sun}, title = {Forward-Secure Hierarchical Predicate Encryption}, journal = {Comput. J.}, volume = {57}, number = {4}, pages = {510--536}, year = {2014}, url = {https://doi.org/10.1093/comjnl/bxt029}, doi = {10.1093/COMJNL/BXT029}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/NietoMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/NgoBN14, author = {Long Ngo and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Automated Proofs for Computational Indistinguishability}, journal = {Comput. J.}, volume = {57}, number = {10}, pages = {1513--1536}, year = {2014}, url = {https://doi.org/10.1093/comjnl/bxt078}, doi = {10.1093/COMJNL/BXT078}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/NgoBN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AlbeshriBN14, author = {Aiiad Albeshri and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Enhanced GeoProof: improved geographic assurance for data in the cloud}, journal = {Int. J. Inf. Sec.}, volume = {13}, number = {2}, pages = {191--198}, year = {2014}, url = {https://doi.org/10.1007/s10207-013-0217-6}, doi = {10.1007/S10207-013-0217-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AlbeshriBN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/RadkeBNMS14, author = {Kenneth Radke and Colin Boyd and Juanma Gonz{\'{a}}lez Nieto and Mark Manulis and Douglas Stebila}, editor = {Udaya Parampalli and Ian Welch}, title = {Formalising Human Recognition: a Fundamental Building Block for Security Proofs}, booktitle = {Twelfth Australasian Information Security Conference, {AISC} 2014, Auckland, New Zealand, January 2014}, series = {{CRPIT}}, volume = {149}, pages = {37--45}, publisher = {Australian Computer Society}, year = {2014}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Radke.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/RadkeBNMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/NietoMPRS13, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila}, title = {Publicly verifiable ciphertexts}, journal = {J. Comput. Secur.}, volume = {21}, number = {5}, pages = {749--778}, year = {2013}, url = {https://doi.org/10.3233/JCS-130473}, doi = {10.3233/JCS-130473}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/NietoMPRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SunBN13, author = {Dongdong Sun and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Predicate encryption for multi-inner-products}, journal = {Secur. Commun. Networks}, volume = {6}, number = {3}, pages = {325--339}, year = {2013}, url = {https://doi.org/10.1002/sec.566}, doi = {10.1002/SEC.566}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SunBN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ozchi/RadkeBNB13, author = {Kenneth Radke and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Laurie Buys}, editor = {Haifeng Shen and Ross T. Smith and Jeni Paay and Paul R. Calder and Theodor G. Wyeld}, title = {"Who decides?": security and privacy in the wild}, booktitle = {Augmentation, Application, Innovation, Collaboration, OzCHI '13, Adelaide, Australia - November 25 - 29, 2013}, pages = {27--36}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2541016.2541043}, doi = {10.1145/2541016.2541043}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ozchi/RadkeBNB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnds/AlzaidFNP12, author = {Hani Alzaid and Ernest Foo and Juan Manuel Gonz{\'{a}}lez Nieto and DongGook Park}, title = {A taxonomy of secure data aggregation in wireless sensor networks}, journal = {Int. J. Commun. Networks Distributed Syst.}, volume = {8}, number = {1/2}, pages = {101--148}, year = {2012}, url = {https://doi.org/10.1504/IJCNDS.2012.044325}, doi = {10.1504/IJCNDS.2012.044325}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnds/AlzaidFNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AlzaidFNA12, author = {Hani Alzaid and Ernest Foo and Juan Manuel Gonz{\'{a}}lez Nieto and Ejaz Ahmed}, title = {Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {5}, number = {2}, pages = {125--144}, year = {2012}, url = {https://doi.org/10.1002/sec.286}, doi = {10.1002/SEC.286}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AlzaidFNA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/RangasamySBNK12, author = {Jothi Rangasamy and Douglas Stebila and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Lakshmi Kuppusamy}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Effort-Release Public-Key Encryption from Cryptographic Puzzles}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {194--207}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_15}, doi = {10.1007/978-3-642-31448-3\_15}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/RangasamySBNK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NietoMS12, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Dongdong Sun}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Fully Private Revocable Predicate Encryption}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {350--363}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_26}, doi = {10.1007/978-3-642-31448-3\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/NietoMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeBN12, author = {Kaleb Lee and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Minimizing Information Leakage of Tree-Based {RFID} Authentication Protocols Using Alternate Tree-Walking}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {434--441}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_33}, doi = {10.1007/978-3-642-31448-3\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeeBN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/RadkeBNB12, author = {Kenneth Radke and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Margot Brereton}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Towards a Secure Human-and-Computer Mutual Authentication Protocol}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {39--46}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Radke.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/RadkeBNB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/LeeNB12, author = {Kaleb Lee and Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Improving the Efficiency of {RFID} Authentication with Pre-Computation}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {91--100}, publisher = {Australian Computer Society}, year = {2012}, timestamp = {Fri, 01 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/auisc/LeeNB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KuppusamyRSBN12, author = {Lakshmi Kuppusamy and Jothi Rangasamy and Douglas Stebila and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Heung Youl Youm and Yoojae Won}, title = {Practical client puzzles in the standard model}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {42--43}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414480}, doi = {10.1145/2414456.2414480}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KuppusamyRSBN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/LeeNB12, author = {Kaleb Lee and Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd}, editor = {Yang Xiang and Javier L{\'{o}}pez and C.{-}C. Jay Kuo and Wanlei Zhou}, title = {A State-Aware {RFID} Privacy Model with Reader Corruption}, booktitle = {Cyberspace Safety and Security - 4th International Symposium, {CSS} 2012, Melbourne, Australia, December 12-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7672}, pages = {324--338}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35362-8\_25}, doi = {10.1007/978-3-642-35362-8\_25}, timestamp = {Fri, 22 Apr 2022 17:07:03 +0200}, biburl = {https://dblp.org/rec/conf/css/LeeNB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/AlbeshriBN12, author = {Aiiad Albeshri and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {GeoProof: Proofs of Geographic Location for Cloud Computing Environment}, booktitle = {32nd International Conference on Distributed Computing Systems Workshops {(ICDCS} 2012 Workshops), Macau, China, June 18-21, 2012}, pages = {506--514}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICDCSW.2012.50}, doi = {10.1109/ICDCSW.2012.50}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/AlbeshriBN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WenDNS12, author = {Chuah Chai Wen and Ed Dawson and Juan Manuel Gonz{\'{a}}lez Nieto and Leonie Simpson}, editor = {Mark Dermot Ryan and Ben Smyth and Guilin Wang}, title = {A Framework for Security Analysis of Key Derivation Functions}, booktitle = {Information Security Practice and Experience - 8th International Conference, {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7232}, pages = {199--216}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29101-2\_14}, doi = {10.1007/978-3-642-29101-2\_14}, timestamp = {Wed, 07 Dec 2022 23:12:45 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WenDNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/NietoMS12, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Dongdong Sun}, editor = {Michel Abdalla and Tanja Lange}, title = {Forward-Secure Hierarchical Predicate Encryption}, booktitle = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7708}, pages = {83--101}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36334-4\_6}, doi = {10.1007/978-3-642-36334-4\_6}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/NietoMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/NietoMPRS12, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila}, editor = {Ivan Visconti and Roberto De Prisco}, title = {Publicly Verifiable Ciphertexts}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {393--410}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_22}, doi = {10.1007/978-3-642-32928-9\_22}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/NietoMPRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NietoMPRS12, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila}, title = {Publicly Verifiable Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2012}, url = {http://eprint.iacr.org/2012/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NietoMPRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NietoMS12, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Dongdong Sun}, title = {Forward-Secure Hierarchical Predicate Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {402}, year = {2012}, url = {http://eprint.iacr.org/2012/402}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NietoMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NietoMS12a, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Dongdong Sun}, title = {Fully Private Revocable Predicate Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {403}, year = {2012}, url = {http://eprint.iacr.org/2012/403}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NietoMS12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GorantlaBNM11, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis}, title = {Modeling key compromise impersonation attacks on group key exchange protocols}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {4}, pages = {28:1--28:24}, year = {2011}, url = {https://doi.org/10.1145/2043628.2043629}, doi = {10.1145/2043628.2043629}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/GorantlaBNM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RangasamySBN11, author = {Jothi Rangasamy and Douglas Stebila and Colin Boyd and Juanma Gonz{\'{a}}lez Nieto}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {An integrated approach to cryptographic mitigation of denial-of-service attacks}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {114--123}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966929}, doi = {10.1145/1966913.1966929}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RangasamySBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/NgoBN11, author = {Long Ngo and Colin Boyd and Juanma Gonz{\'{a}}lez Nieto}, title = {Automated Proofs for Diffie-Hellman-Based Key Exchanges}, booktitle = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium, {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011}, pages = {51--65}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CSF.2011.11}, doi = {10.1109/CSF.2011.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/NgoBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/StebilaKRBN11, author = {Douglas Stebila and Lakshmi Kuppusamy and Jothi Rangasamy and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Aggelos Kiayias}, title = {Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {284--301}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_19}, doi = {10.1007/978-3-642-19074-2\_19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/StebilaKRBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/RangasamySKBN11, author = {Jothi Rangasamy and Douglas Stebila and Lakshmi Kuppusamy and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Howon Kim}, title = {Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection}, booktitle = {Information Security and Cryptology - {ICISC} 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7259}, pages = {319--331}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31912-9\_21}, doi = {10.1007/978-3-642-31912-9\_21}, timestamp = {Wed, 01 Mar 2023 16:53:12 +0100}, biburl = {https://dblp.org/rec/conf/icisc/RangasamySKBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BoydN11, author = {Colin Boyd and Juanma Gonz{\'{a}}lez Nieto}, editor = {Liqun Chen}, title = {On Forward Secrecy in One-Round Key Exchange}, booktitle = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC} 2011, Oxford, UK, December 12-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7089}, pages = {451--468}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25516-8\_27}, doi = {10.1007/978-3-642-25516-8\_27}, timestamp = {Wed, 18 Mar 2020 16:00:56 +0100}, biburl = {https://dblp.org/rec/conf/ima/BoydN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/KuppusamyRSBN11, author = {Lakshmi Kuppusamy and Jothi Rangasamy and Douglas Stebila and Colin Boyd and Juanma Gonz{\'{a}}lez Nieto}, editor = {Daniel J. Bernstein and Sanjit Chatterjee}, title = {Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7107}, pages = {379--398}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25578-6\_27}, doi = {10.1007/978-3-642-25578-6\_27}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/KuppusamyRSBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interact/RadkeBMGBN11, author = {Kenneth Radke and Margot Brereton and Seyed Hadi Mirisaee and Sunil Ghelawat and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Pedro F. Campos and T. C. Nicholas Graham and Joaquim A. Jorge and Nuno Jardim Nunes and Philippe A. Palanque and Marco Winckler}, title = {Tensions in Developing a Secure Collective Information Practice - The Case of Agile Ridesharing}, booktitle = {Human-Computer Interaction - {INTERACT} 2011 - 13th {IFIP} {TC} 13 International Conference, Lisbon, Portugal, September 5-9, 2011, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6947}, pages = {524--532}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23771-3\_39}, doi = {10.1007/978-3-642-23771-3\_39}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/interact/RadkeBMGBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/RadkeBNB11, author = {Kenneth Radke and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Margot Brereton}, editor = {Jan Camenisch and Simone Fischer{-}H{\"{u}}bner and Yuko Murayama and Armand Portmann and Carlos Rieder}, title = {Ceremony Analysis: Strengths and Weaknesses}, booktitle = {Future Challenges in Security and Privacy for Academia and Industry - 26th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {354}, pages = {104--115}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21424-0\_9}, doi = {10.1007/978-3-642-21424-0\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/RadkeBNB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RangasamySKBN11, author = {Jothi Rangasamy and Douglas Stebila and Lakshmi Kuppusamy and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {665}, year = {2011}, url = {http://eprint.iacr.org/2011/665}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RangasamySKBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GorantlaBN10, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Attribute-Based Authenticated Key Exchange}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {300--317}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_19}, doi = {10.1007/978-3-642-14081-5\_19}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GorantlaBN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/CostelloBNW10, author = {Craig Costello and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth Koon{-}Ho Wong}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Avoiding Full Extension Field Arithmetic in Pairing Computations}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {203--224}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_13}, doi = {10.1007/978-3-642-12678-9\_13}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/CostelloBNW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/AlzaidPNF10, author = {Hani Alzaid and DongGook Park and Juan Manuel Gonz{\'{a}}lez Nieto and Ernest Foo}, title = {Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for {PCS/SCADA}}, booktitle = {24th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2010, Perth, Australia, 20-13 April 2010}, pages = {859--865}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/AINA.2010.93}, doi = {10.1109/AINA.2010.93}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/AlzaidPNF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/LippoldN10, author = {Georg Lippold and Juanma Gonz{\'{a}}lez Nieto}, editor = {Colin Boyd and Willy Susilo}, title = {Certificateless Key Agreement in the Standard Model}, booktitle = {8th Australasian Information Security Conference 2010, {AISC} 2010, Brisbane, Australia, January 2010}, series = {{CRPIT}}, volume = {105}, pages = {75--85}, publisher = {Australian Computer Society}, year = {2010}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Lippold.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/LippoldN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ozchi/RadkeBBN10, author = {Kenneth Radke and Colin Boyd and Margot Brereton and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Margot Brereton and Stephen Viller and Ben Kraal}, title = {How {HCI} design influences web security decisions}, booktitle = {Proceedings of the 22nd Australasian Computer-Human Interaction Conference, {OZCHI} 2010, Brisbane, Australia, November 22-26, 2010}, pages = {252--255}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1952222.1952276}, doi = {10.1145/1952222.1952276}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ozchi/RadkeBBN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/NgoBN10, author = {Long Ngo and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Automating Computational Proofs for Public-Key-Based Key Exchange}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {53--69}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_4}, doi = {10.1007/978-3-642-16280-0\_4}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/NgoBN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SunBN10, author = {Dongdong Sun and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Kai Rannenberg and Vijay Varadharajan and Christian Weber}, title = {Delegation in Predicate Encryption Supporting Disjunctive Queries}, booktitle = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11} International Information Security Conference, {SEC} 2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {330}, pages = {229--240}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15257-3\_21}, doi = {10.1007/978-3-642-15257-3\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/SunBN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waifi/CostelloBNW10, author = {Craig Costello and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth Koon{-}Ho Wong}, editor = {M. Anwar Hasan and Tor Helleseth}, title = {Delaying Mismatched Field Multiplications in Pairing Computations}, booktitle = {Arithmetic of Finite Fields, Third International Workshop, {WAIFI} 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6087}, pages = {196--214}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13797-6\_14}, doi = {10.1007/978-3-642-13797-6\_14}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/waifi/CostelloBNW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorantlaBN10, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {One Round Group Key Exchange with Forward Security in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2010}, url = {http://eprint.iacr.org/2010/083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorantlaBN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorantlaBN10a, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Attribute-based Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2010}, url = {http://eprint.iacr.org/2010/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorantlaBN10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostelloBNW10, author = {Craig Costello and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth Koon{-}Ho Wong}, title = {Avoiding Full Extension Field Arithmetic in Pairing Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2010}, url = {http://eprint.iacr.org/2010/104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostelloBNW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostelloBNW10a, author = {Craig Costello and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth Koon{-}Ho Wong}, title = {Delaying Mismatched Field Multiplications in Pairing Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2010}, url = {http://eprint.iacr.org/2010/123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostelloBNW10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StebilaKRBN10, author = {Douglas Stebila and Lakshmi Kuppusamy and Jothi Rangasamy and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {649}, year = {2010}, url = {http://eprint.iacr.org/2010/649}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StebilaKRBN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/BoydCNP09, author = {Colin Boyd and Yvonne Cliff and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth G. Paterson}, title = {One-round key exchange in the standard model}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {3}, pages = {181--199}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.023466}, doi = {10.1504/IJACT.2009.023466}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/BoydCNP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CliffBN09, author = {Yvonne Cliff and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {How to Extract and Expand Randomness: {A} Summary and Explanation of Existing Results}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {53--70}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_4}, doi = {10.1007/978-3-642-01957-9\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/CliffBN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/GorantlaBN09, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Strong Designated Verifier Signature in a Multi-user Setting}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {21--31}, publisher = {Australian Computer Society}, year = {2009}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Gorantla.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/GorantlaBN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GorantlaBN09, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Universally composable contributory group key exchange}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {146--156}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533079}, doi = {10.1145/1533057.1533079}, timestamp = {Fri, 18 Mar 2022 11:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GorantlaBN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GorantlaBNM09, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {Generic One Round Group Key Exchange in the Standard Model}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {1--15}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_1}, doi = {10.1007/978-3-642-14423-3\_1}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/GorantlaBNM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LippoldBN09, author = {Georg Lippold and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {Efficient Certificateless {KEM} in the Standard Model}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {34--46}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_3}, doi = {10.1007/978-3-642-14423-3\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LippoldBN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/CostelloHBNW09, author = {Craig Costello and H{\"{u}}seyin Hisil and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth Koon{-}Ho Wong}, editor = {Hovav Shacham and Brent Waters}, title = {Faster Pairings on Special Weierstrass Curves}, booktitle = {Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5671}, pages = {89--101}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03298-1\_7}, doi = {10.1007/978-3-642-03298-1\_7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pairing/CostelloHBNW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/LippoldBN09, author = {Georg Lippold and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Hovav Shacham and Brent Waters}, title = {Strongly Secure Certificateless Key Agreement}, booktitle = {Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5671}, pages = {206--230}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03298-1\_14}, doi = {10.1007/978-3-642-03298-1\_14}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/LippoldBN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GorantlaBN09, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {105--123}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_7}, doi = {10.1007/978-3-642-00468-1\_7}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GorantlaBN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scube/AlzaidPNBF09, author = {Hani Alzaid and DongGook Park and Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd and Ernest Foo}, editor = {Stephen Hailes and Sabrina Sicari and George Roussos}, title = {A Forward and Backward Secure Key Management in Wireless Sensor Networks for {PCS/SCADA}}, booktitle = {Sensor Systems and Software - First International {ICST} Conference, {S-CUBE} 2009, Pisa, Italy, September 7-9, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {24}, pages = {66--82}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11528-8\_6}, doi = {10.1007/978-3-642-11528-8\_6}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scube/AlzaidPNBF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2009, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1}, doi = {10.1007/978-3-642-02620-1}, isbn = {978-3-642-02619-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CliffBN09, author = {Yvonne Cliff and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {How to Extract and Expand Randomness: {A} Summary and Explanation of Existing Results}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {136}, year = {2009}, url = {http://eprint.iacr.org/2009/136}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CliffBN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LippoldBN09, author = {Georg Lippold and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Strongly Secure Certificateless Key Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2009}, url = {http://eprint.iacr.org/2009/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LippoldBN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostelloHBNW09, author = {Craig Costello and H{\"{u}}seyin Hisil and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth Koon{-}Ho Wong}, title = {Faster Pairings on Special Weierstrass Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2009}, url = {http://eprint.iacr.org/2009/243}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostelloHBNW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorantlaBN09, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2009}, url = {http://eprint.iacr.org/2009/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorantlaBN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorantlaBN09a, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Universally Composable Contributory Group Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {300}, year = {2009}, url = {http://eprint.iacr.org/2009/300}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorantlaBN09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorantlaBN09b, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {On the Connection between Signcryption and One-pass Key Establishment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {436}, year = {2009}, url = {http://eprint.iacr.org/2009/436}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorantlaBN09b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LippoldBN09a, author = {Georg Lippold and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Efficient Certificateless {KEM} in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2009}, url = {http://eprint.iacr.org/2009/451}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LippoldBN09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorantlaBNM09, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis}, title = {Generic One Round Group Key Exchange in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2009}, url = {http://eprint.iacr.org/2009/514}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorantlaBNM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoydCNP08, author = {Colin Boyd and Yvonne Cliff and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth G. Paterson}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Efficient One-Round Key Exchange in the Standard Model}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {69--83}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_6}, doi = {10.1007/978-3-540-70500-0\_6}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoydCNP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/GorantlaBN08, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {ID-based One-pass Authenticated Key Establishment}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {39--46}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Gorantla.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/GorantlaBN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/AlzaidFN08, author = {Hani Alzaid and Ernest Foo and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {Secure Data Aggregation in Wireless Sensor Network: a survey}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {93--105}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Alzaid.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/AlzaidFN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/AlzaidFN08, author = {Hani Alzaid and Ernest Foo and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {{RSDA:} Reputation-Based Secure Data Aggregation in Wireless Sensor Networks}, booktitle = {Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies, {PDCAT} 2008, Dunedin, Otago, New Zealand, 1-4 December 2008}, pages = {419--424}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PDCAT.2008.52}, doi = {10.1109/PDCAT.2008.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdcat/AlzaidFN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydCNP08, author = {Colin Boyd and Yvonne Cliff and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth G. Paterson}, title = {Efficient One-round Key Exchange in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2008}, url = {http://eprint.iacr.org/2008/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydCNP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/SmithTBNF07, author = {Jason Smith and Suratose Tritilanunt and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Ernest Foo}, title = {Denial-of-service resistance in key establishment}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {2}, number = {1}, pages = {59--71}, year = {2007}, url = {https://doi.org/10.1504/IJWMC.2007.013796}, doi = {10.1504/IJWMC.2007.013796}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwmc/SmithTBNF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsc/TritilanuntBFN07, author = {Suratose Tritilanunt and Colin Boyd and Ernest Foo and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Gillian Dobbie}, title = {Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets}, booktitle = {Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference {(ACSC2007).} Ballarat, Victoria, Australia, January 30 - February 2, 2007. Proceedings}, series = {{CRPIT}}, volume = {62}, pages = {191--200}, publisher = {Australian Computer Society}, year = {2007}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV62Tritilanunt.html}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsc/TritilanuntBFN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/TritilanuntBFN07, author = {Suratose Tritilanunt and Colin Boyd and Ernest Foo and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Feng Bao and San Ling and Tatsuaki Okamoto and Huaxiong Wang and Chaoping Xing}, title = {Toward Non-parallelizable Client Puzzles}, booktitle = {Cryptology and Network Security, 6th International Conference, {CANS} 2007, Singapore, December 8-10, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4856}, pages = {247--264}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76969-9\_16}, doi = {10.1007/978-3-540-76969-9\_16}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/TritilanuntBFN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ReidNTS07, author = {Jason Reid and Juan Manuel Gonz{\'{a}}lez Nieto and Tee Tang and Bouchra Senadji}, editor = {Feng Bao and Steven Miller}, title = {Detecting relay attacks with timing-based protocols}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {204--213}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229314}, doi = {10.1145/1229285.1229314}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ReidNTS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/egov/BurdonNCDDL07, author = {Mark Burdon and Juan Manuel Gonz{\'{a}}lez Nieto and Sharon Christensen and Ed Dawson and William D. Duncan and Bill Lane}, editor = {Maria A. Wimmer and Hans Jochen Scholl and {\AA}ke Gr{\"{o}}nlund}, title = {Access Control in Federated Databases: How Legal Issues Shape Security}, booktitle = {Electronic Government, 6th International Conference, {EGOV} 2007, Regensburg, Germany, September 3-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4656}, pages = {228--239}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74444-3\_20}, doi = {10.1007/978-3-540-74444-3\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/egov/BurdonNCDDL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/HaKPMNB07, author = {JaeCheol Ha and Hwankoo Kim and JeaHoon Park and Sang{-}Jae Moon and Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd}, editor = {Mieso K. Denko and Chi{-}Sheng Shih and Kuan{-}Ching Li and Shiao{-}Li Tsao and Qing{-}An Zeng and Soo{-}Hyun Park and Young{-}Bae Ko and Shih{-}Hao Hung and Jong Hyuk Park}, title = {{HGLAP} - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed {RFID} System}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4809}, pages = {557--567}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77090-9\_52}, doi = {10.1007/978-3-540-77090-9\_52}, timestamp = {Wed, 22 Jun 2022 09:02:26 +0200}, biburl = {https://dblp.org/rec/conf/euc/HaKPMNB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/HaMNB07, author = {JaeCheol Ha and Sang{-}Jae Moon and Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd}, editor = {Mieso K. Denko and Chi{-}Sheng Shih and Kuan{-}Ching Li and Shiao{-}Li Tsao and Qing{-}An Zeng and Soo{-}Hyun Park and Young{-}Bae Ko and Shih{-}Hao Hung and Jong Hyuk Park}, title = {Low-Cost and Strong-Security {RFID} Authentication Protocol}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4809}, pages = {795--807}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77090-9\_72}, doi = {10.1007/978-3-540-77090-9\_72}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/euc/HaMNB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/GorantlaBN07, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Steven D. Galbraith}, title = {On the Connection Between Signcryption and One-Pass Key Establishment}, booktitle = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester, UK, December 18-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4887}, pages = {277--301}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77272-9\_17}, doi = {10.1007/978-3-540-77272-9\_17}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/GorantlaBN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/TsoNOBO07, author = {Raylin Tso and Juan Manuel Gonz{\'{a}}lez Nieto and Takeshi Okamoto and Colin Boyd and Eiji Okamoto}, editor = {Steven D. Galbraith}, title = {Verifier-Key-Flexible Universal Designated-Verifier Signatures}, booktitle = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester, UK, December 18-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4887}, pages = {403--421}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77272-9\_24}, doi = {10.1007/978-3-540-77272-9\_24}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/TsoNOBO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/HaMNB07, author = {JaeCheol Ha and Sang{-}Jae Moon and Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd}, editor = {Takashi Washio and Zhi{-}Hua Zhou and Joshua Zhexue Huang and Xiaohua Hu and Jinyan Li and Chao Xie and Jieyue He and Deqing Zou and Kuan{-}Ching Li and M{\'{a}}rio M. Freire}, title = {Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol {(OHLCAP)}}, booktitle = {Emerging Technologies in Knowledge Discovery and Data Mining, {PAKDD} 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4819}, pages = {574--583}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77018-3\_57}, doi = {10.1007/978-3-540-77018-3\_57}, timestamp = {Fri, 09 Apr 2021 17:11:17 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/HaMNB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/HitchcockBN06, author = {Yvonne Hitchcock and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {16}, number = {6}, pages = {405--438}, year = {2006}, url = {https://doi.org/10.1007/s00200-005-0185-9}, doi = {10.1007/S00200-005-0185-9}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/HitchcockBN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itcon/BettsBCDDDFN06, author = {Martin P. Betts and Peter Black and Sharon Christensen and Ed Dawson and Rong Du and William D. Duncan and Ernest Foo and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Towards Secure and Legal E-Tendering}, journal = {J. Inf. Technol. Constr.}, volume = {11}, pages = {89--102}, year = {2006}, url = {https://www.itcon.org/paper/2006/7}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itcon/BettsBCDDDFN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/SmithNB06, author = {Jason Smith and Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd}, editor = {Rajkumar Buyya and Tianchi Ma and Reihaneh Safavi{-}Naini and Chris Steketee and Willy Susilo}, title = {Modelling denial of service attacks on {JFK} with Meadows's cost-based framework}, booktitle = {The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) {(AISW} 2006), Hobart, Tasmania, Australia, January 2006}, series = {{CRPIT}}, volume = {54}, pages = {125--134}, publisher = {Australian Computer Society}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1151844}, timestamp = {Mon, 26 Nov 2018 12:14:45 +0100}, biburl = {https://dblp.org/rec/conf/acsw/SmithNB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/DawsonBDN06, author = {Robert Dawson and Colin Boyd and Ed Dawson and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Rajkumar Buyya and Tianchi Ma and Reihaneh Safavi{-}Naini and Chris Steketee and Willy Susilo}, title = {{SKMA:} a key management architecture for {SCADA} systems}, booktitle = {The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) {(AISW} 2006), Hobart, Tasmania, Australia, January 2006}, series = {{CRPIT}}, volume = {54}, pages = {183--192}, publisher = {Australian Computer Society}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1151850}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsw/DawsonBDN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BrownNB06, author = {Jaimee Brown and Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd}, editor = {David Pointcheval and Yi Mu and Kefei Chen}, title = {Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems}, booktitle = {Cryptology and Network Security, 5th International Conference, {CANS} 2006, Suzhou, China, December 8-10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4301}, pages = {1--18}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935070\_1}, doi = {10.1007/11935070\_1}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/BrownNB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PengNDD06, author = {Kun Peng and Juan Manuel Gonz{\'{a}}lez Nieto and Yvo Desmedt and Ed Dawson}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Klein Bottle Routing: An Alternative to Onion Routing and Mix Network}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {296--309}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_25}, doi = {10.1007/11927587\_25}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PengNDD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BrownNB06, author = {Jaimee Brown and Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd}, editor = {Rana Barua and Tanja Lange}, title = {Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4329}, pages = {176--190}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941378\_13}, doi = {10.1007/11941378\_13}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BrownNB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/TritilanuntBFN06, author = {Suratose Tritilanunt and Colin Boyd and Ernest Foo and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Robert Meersman and Zahir Tari and Pilar Herrero}, title = {Examining the DoS Resistance of {HIP}}, booktitle = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops, {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM} Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4277}, pages = {616--625}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11915034\_85}, doi = {10.1007/11915034\_85}, timestamp = {Thu, 14 Oct 2021 10:28:26 +0200}, biburl = {https://dblp.org/rec/conf/otm/TritilanuntBFN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChowBN06, author = {Sherman S. M. Chow and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Security-Mediated Certificateless Cryptography}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {508--524}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_33}, doi = {10.1007/11745853\_33}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChowBN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NietoBD05, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd and Ed Dawson}, title = {A Public Key Cryptosystem Based On {A} Subgroup Membership Problem}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {3}, pages = {301--316}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1721-5}, doi = {10.1007/S10623-004-1721-5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/NietoBD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SteketeeBNM05, author = {Chris Steketee and Jaimee Brown and Juan Manuel Gonz{\'{a}}lez Nieto and Paul Montague}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {{GBD} Threshold Cryptography with an Application to {RSA} Key Recovery}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {394--405}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_33}, doi = {10.1007/11506157\_33}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SteketeeBNM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/PengDNOL05, author = {Kun Peng and Ed Dawson and Juanma Gonz{\'{a}}lez Nieto and Eiji Okamoto and Javier L{\'{o}}pez}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {A Novel Method to Maintain Privacy in Mobile Agent Applications}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {247--260}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_21}, doi = {10.1007/11599371\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/PengDNOL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/DuFNB05, author = {Rong Du and Ernest Foo and Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and G{\"{u}}nther Pernul}, title = {Designing Secure E-Tendering Systems}, booktitle = {Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3592}, pages = {70--79}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11537878\_8}, doi = {10.1007/11537878\_8}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/DuFNB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2005, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b137750}, doi = {10.1007/B137750}, isbn = {3-540-26547-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GauravaramMND05, author = {Praveen Gauravaram and William Millan and Juanma Gonz{\'{a}}lez Nieto and Ed Dawson}, title = {3C- {A} Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {390}, year = {2005}, url = {http://eprint.iacr.org/2005/390}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GauravaramMND05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GauravaramMN05, author = {Praveen Gauravaram and William Millan and Juanma Gonz{\'{a}}lez Nieto}, title = {Some thoughts on Collision Attacks in the Hash Functions MD5, {SHA-0} and {SHA-1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {391}, year = {2005}, url = {http://eprint.iacr.org/2005/391}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GauravaramMN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TinVBN04, author = {Yiu Shing Terry Tin and Harikrishna Vasanta and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Protocols with Security Proofs for Mobile Applications}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {358--369}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_31}, doi = {10.1007/978-3-540-27800-9\_31}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TinVBN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cau/BrownDN04, author = {Jaimee Brown and Ed Dawson and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Ed Dawson and Wolfgang Klemm}, title = {Implementation of the {GBD} Cryptosystem}, booktitle = {Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings}, pages = {94--109}, publisher = {Queensland University of Technology}, year = {2004}, timestamp = {Fri, 16 Jul 2004 13:22:45 +0200}, biburl = {https://dblp.org/rec/conf/cau/BrownDN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/ReidCNSV04, author = {Jason Reid and Andrew J. Clark and Juan Manuel Gonz{\'{a}}lez Nieto and Jason Smith and Kapali Viswanathan}, editor = {Jo{\~{a}}o Ascenso and Carlos Belo and Luminita Vasiu and M{\'{o}}nica Saramago and Helder Coelhas}, title = {Denial of Service Issues in Voice Over {IP} Networks}, booktitle = {{ICETE} 2004, 1st International Conference on E-Business and Telecommunication Networks, Set{\'{u}}bal, Portugal, August 24-28, 2004, Proceedings}, pages = {230--237}, publisher = {{INSTICC} Press}, year = {2004}, timestamp = {Wed, 22 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/ReidCNSV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/HitchcockBN04, author = {Yvonne Hitchcock and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Anne Canteaut and Kapalee Viswanathan}, title = {Tripartite Key Exchange in the Canetti-Krawczyk Proof Model}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3348}, pages = {17--32}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30556-9\_3}, doi = {10.1007/978-3-540-30556-9\_3}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/HitchcockBN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mata/VasantaTBLN04, author = {Harikrishna Vasanta and Yiu Shing Terry Tin and Colin Boyd and Mark Looi and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Ahmed Karmouch and Larry Korba and Edmundo Roberto Mauro Madeira}, title = {A Secure Framework for User Privacy in Heterogeneous Location Networks}, booktitle = {Mobility Aware Technologies and Applications, First International Workshop,MATA 2004, Florian{\'{o}}polis, Brazil, October 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3284}, pages = {264--274}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30178-3\_25}, doi = {10.1007/978-3-540-30178-3\_25}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/mata/VasantaTBLN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TinBN03, author = {Yiu Shing Terry Tin and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {166--179}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_15}, doi = {10.1007/3-540-45067-X\_15}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TinBN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/TinBN03, author = {Yiu Shing Terry Tin and Colin Boyd and Juanma Gonz{\'{a}}lez Nieto}, editor = {Chris W. Johnson and Paul Montague and Chris Steketee}, title = {Provably Secure Key Exchange: An Engineering Approach}, booktitle = {{ACSW} Frontiers 2003, 2003 {ACSW} Workshops - the Australasian Information Security Workshop {(AISW)} and the Workshop on Wearable, Invisible, Context-Aware, Ambient, Pervasive and Ubiquitous Computing (WICAPUC), Adelaide, South Australia, February 2003}, series = {{CRPIT}}, volume = {21}, pages = {97--104}, publisher = {Australian Computer Society}, year = {2003}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV21ATin.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsw/TinBN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/NietoDO03, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Ed Dawson and Eiji Okamoto}, title = {Privacy and Trusted Computing}, booktitle = {14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic}, pages = {383--388}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/DEXA.2003.1232052}, doi = {10.1109/DEXA.2003.1232052}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/NietoDO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/HitchcockTNBM03, author = {Yvonne Hitchcock and Yiu Shing Terry Tin and Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd and Paul Montague}, editor = {Thomas Johansson and Subhamoy Maitra}, title = {A Password-Based Authenticator: Security Proof and Applications}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2904}, pages = {388--401}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24582-7\_29}, doi = {10.1007/978-3-540-24582-7\_29}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/HitchcockTNBM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BoydN03, author = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Yvo Desmedt}, title = {Round-Optimal Contributory Conference Key Agreement}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {161--174}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_12}, doi = {10.1007/3-540-36288-6\_12}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BoydN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/NietoVBCD02, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Kapali Viswanathan and Colin Boyd and Andrew J. Clark and Ed Dawson}, title = {Key recovery for the commercial environment}, journal = {Int. J. Inf. Sec.}, volume = {1}, number = {3}, pages = {161--174}, year = {2002}, url = {https://doi.org/10.1007/s10207-002-0014-0}, doi = {10.1007/S10207-002-0014-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/NietoVBCD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/NietoBD01, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd and Ed Dawson}, editor = {Sihan Qing and Tatsuaki Okamoto and Jianying Zhou}, title = {A Public Key Cryptosystem Based on the Subgroup Membership Problem}, booktitle = {Information and Communications Security, Third International Conference, {ICICS} 2001, Xian, China, November 13-16, 2001}, series = {Lecture Notes in Computer Science}, volume = {2229}, pages = {352--363}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45600-7\_38}, doi = {10.1007/3-540-45600-7\_38}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/NietoBD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NietoVBD00, author = {Juanma Gonz{\'{a}}lez Nieto and Kapali Viswanathan and Colin Boyd and Ed Dawson}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Key Recovery System for the Commercial Environment}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {149--162}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_13}, doi = {10.1007/10718964\_13}, timestamp = {Sat, 19 Oct 2019 20:34:19 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NietoVBD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ParkBD00, author = {Juanma Gonz{\'{a}}lez Nieto and DongGook Park and Colin Boyd and Ed Dawson}, editor = {Hideki Imai and Yuliang Zheng}, title = {Key Recovery in Third Generation Wireless Communication Systems}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {223--237}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_16}, doi = {10.1007/978-3-540-46588-1\_16}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ParkBD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.