Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Javier Lopez
2010 – today
- 2013
[j66]Cristina Alcaraz, Rodrigo Roman, Pablo Najera, Javier Lopez: Security of industrial sensor network-based remote substations in the context of the Internet of Things. Ad Hoc Networks 11(3): 1091-1104 (2013)
[j65]Javier Lopez, Svetla Nikova, Andreas Pashalidis, Günther Pernul, Bart Preneel: Preface. Computers & Mathematics with Applications 65(5): 747 (2013)
[j64]Rodrigo Roman, Jianying Zhou, Javier Lopez: On the features and challenges of security and privacy in distributed internet of things. Computer Networks 57(10): 2266-2279 (2013)
[j63]Javier Lopez, Cristina Alcaraz, Rodrigo Roman: Smart control of operational threats in control substations. Computers & Security 38: 14-27 (2013)
[j62]Cristina Alcaraz, Javier Lopez: Wide-Area Situational Awareness for Critical Infrastructure Protection. IEEE Computer 46(4): 30-37 (2013)
[j61]José A. Montenegro, Michael J. Fischer, Javier Lopez, René Peralta: Secure sealed-bid online auctions using discreet cryptographic proofs. Mathematical and Computer Modelling 57(11-12): 2583-2595 (2013)
[j60]Ruben Rios, Javier Lopez: (Un)Suitability of Anonymous Communication Systems to WSN. IEEE Systems Journal 7(2): 298-310 (2013)
[c79]Francisco Moyano, M. Carmen Fernández Gago, Javier Lopez: Towards Engineering Trust-Aware Future Internet Systems. CAiSE Workshops 2013: 490-501
[c78]Francisco Moyano, Benoit Baudry, Javier Lopez: Towards Trust-Aware and Self-adaptive Systems. IFIPTM 2013: 255-262
[e19]Steven Furnell, Costas Lambrinoudakis, Javier Lopez (Eds.): Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings. Lecture Notes in Computer Science 8058, Springer 2013, ISBN 978-3-642-40342-2- 2012
[j59]Cristina Alcaraz, Javier Lopez, Rodrigo Roman, Hsiao-Hwa Chen: Selecting key management schemes for WSN applications. Computers & Security 31(8): 956-966 (2012)
[j58]Rodrigo Roman, Javier Lopez, Olivier Dugeon, Marc Lacoste, Pierre Yves Plaza, Marta Bel: Advanced secure multimedia services for digital homes. Information Systems Frontiers 14(3): 527-540 (2012)
[j57]Gilles Barthe, Jorge Cuéllar, Javier Lopez, Alexander Pretschner: Preface. Journal of Computer Security 20(4): 307-308 (2012)
[j56]David Galindo, Rodrigo Roman, Javier Lopez: On the energy cost of authenticated key agreement in wireless sensor networks. Wireless Communications and Mobile Computing 12(1): 133-143 (2012)
[c77]Ana Nieto, Javier Lopez: Traffic Classifier for Heterogeneous and Cooperative Routing through Wireless Sensor Networks. AINA Workshops 2012: 607-612
[c76]Ana Nieto, Javier Lopez: Security and QoS Tradeoffs: Towards a FI Perspective. AINA Workshops 2012: 745-750
[c75]David Nuñez, Isaac Agudo, Javier Lopez: Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services. CloudCom 2012: 241-248
[c74]Siani Pearson, Vasilis Tountopoulos, Daniele Catteddu, Mario Südholt, Refik Molva, Christoph Reich, Simone Fischer-Hübner, Christopher Millard, Volkmar Lotz, Martin Gilje Jaatun, Ronald Leenes, Chunming Rong, Javier Lopez: Accountability for cloud and other future Internet services. CloudCom 2012: 629-632
[c73]Ruben Rios, Jorge Cuéllar, Javier Lopez: Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN. ESORICS 2012: 163-180
[c72]Francisco Moyano, M. Carmen Fernández Gago, Isaac Agudo, Javier Lopez: A Task Ordering Approach for Automatic Trust Establishment. ESSoS 2012: 75-88
[c71]Sarita Agrawal, Rodrigo Roman, Manik Lal Das, Anish Mathuria, Javier Lopez: A Novel Key Update Protocol in Mobile Sensor Networks. ICISS 2012: 194-207
[c70]Iñigo Hernáez, Javier Lopez: Complete description of a heavy hailstorm over the Basque Country providing a 3D representation of lightning detections and weather radar data. IGARSS 2012: 2388-2391
[c69]
[c68]Cristina Alcaraz, Javier Lopez: Addressing Situational Awareness in Critical Domains of a Smart Grid. NSS 2012: 58-71
[c67]Ruben Rios, Jose Antonio Onieva, Javier Lopez: HIDE_DHCP: Covert Communications through Network Configuration Messages. SEC 2012: 162-173
[c66]James Clarke, Rodrigo Roman Castro, Abhishek Sharma, Javier Lopez, Neeraj Suri: Trust & security RTD in the internet of things: opportunities for international cooperation. SECURIT 2012: 172-178
[c65]Francisco Moyano, M. Carmen Fernández Gago, Javier Lopez: Building Trust and Reputation In: A Development Framework for Trust Models Implementation. STM 2012: 113-128
[c64]Francisco Moyano, M. Carmen Fernández Gago, Javier Lopez: A Conceptual Framework for Trust Models. TrustBus 2012: 93-104
[p1]Javier Lopez, Roberto Setola, Stephen D. Wolthusen: Overview of Critical Information Infrastructure Protection. Critical Infrastructure Protection 2012: 1-14
[e18]Yang Xiang, Javier Lopez, C.-C. Jay Kuo, Wanlei Zhou (Eds.): Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings. Lecture Notes in Computer Science 7672, Springer 2012, ISBN 978-3-642-35361-1
[e17]Javier Lopez, Roberto Setola, Stephen D. Wolthusen (Eds.): Critical Infrastructure Protection - Information Infrastructure Models, Analysis, and Defense. Lecture Notes in Computer Science 7130, Springer 2012, ISBN 978-3-642-28919-4- 2011
[j55]Rodrigo Roman, Cristina Alcaraz, Javier Lopez, Nicolas Sklavos: Key management systems for sensor networks in the context of the Internet of Things. Computers & Electrical Engineering 37(2): 147-159 (2011)
[j54]Ruben Rios, Javier Lopez: Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks. Comput. J. 54(10): 1603-1615 (2011)
[j53]Rodrigo Roman, Pablo Najera, Javier Lopez: Securing the Internet of Things. IEEE Computer 44(9): 51-58 (2011)
[j52]Yang Xiang, Javier Lopez, Haining Wang, Wanlei Zhou: Special Issue: Securing Distributed Networks and Systems. Concurrency and Computation: Practice and Experience 23(12): 1311-1312 (2011)
[j51]Cristina Alcaraz, Javier Lopez, Jianying Zhou, Rodrigo Roman: Secure SCADA framework for the protection of energy control systems. Concurrency and Computation: Practice and Experience 23(12): 1431-1442 (2011)
[j50]Pablo Najera, Javier Lopez, Rodrigo Roman: Real-time location and inpatient care systems based on passive RFID. J. Network and Computer Applications 34(3): 980-989 (2011)
[j49]José Luis Vivas, Isaac Agudo, Javier Lopez: A methodology for security assurance-driven system development. Requir. Eng. 16(1): 55-73 (2011)
[j48]Cristina Alcaraz, M. Carmen Fernández Gago, Javier Lopez: An Early Warning System Based on Reputation for Energy Control Systems. IEEE Trans. Smart Grid 2(4): 827-834 (2011)
[j47]Rodrigo Roman, Javier Lopez, Pablo Najera: A cross-layer approach for integrating security mechanisms in sensor networks architectures. Wireless Communications and Mobile Computing 11(2): 267-276 (2011)
[c63]Rodrigo Roman, Javier Lopez, Cristina Alcaraz, Hsiao-Hwa Chen: SenseKey - Simplifying the Selection of Key Management Schemes for Sensor Networks. AINA Workshops 2011: 789-794
[c62]Cristina Alcaraz, Isaac Agudo, David Nuñez, Javier Lopez: Managing Incidents in Smart Grids à la Cloud. CloudCom 2011: 527-531
[c61]Wouter Joosen, Javier Lopez, Fabio Martinelli, Fabio Massacci: Engineering Secure Future Internet Services. Future Internet Assembly 2011: 177-192
[c60]Pablo Najera, Rodrigo Roman, Javier Lopez: Secure Architecure for the Integration of RFID and Sensors in Personal Networks. STM 2011: 207-222
[e16]Javier Lopez, Gene Tsudik (Eds.): Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings. Lecture Notes in Computer Science 6715, 2011, ISBN 978-3-642-21553-7
[e15]Javier Lopez, Pierangela Samarati (Eds.): SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. SciTePress 2011, ISBN 978-989-8425-71-3
[e14]Jorge Cuéllar, Javier Lopez, Gilles Barthe, Alexander Pretschner (Eds.): Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6710, Springer 2011, ISBN 978-3-642-22443-0- 2010
[j46]Isaac Agudo, M. Carmen Fernández Gago, Javier Lopez: A scale based trust model for multi-context environments. Computers & Mathematics with Applications 60(2): 209-216 (2010)
[j45]Javier Lopez, Rodrigo Roman, Isaac Agudo, M. Carmen Fernández Gago: Trust management systems for wireless sensor networks: Best practices. Computer Communications 33(9): 1086-1093 (2010)
[j44]Josep Lluís Ferrer-Gomila, Jose Antonio Onieva, Magdalena Payeras-Capellà, Javier Lopez: Certified electronic mail: Properties revisited. Computers & Security 29(2): 167-179 (2010)
[j43]Jordi Forné, M. Francisca Hinarejos, Andrés Marín, Florina Almenárez Mendoza, Javier Lopez, José A. Montenegro, Marc Lacoste, Daniel Díaz Sánchez: Pervasive authentication and authorization infrastructures for mobile users. Computers & Security 29(4): 501-514 (2010)
[j42]
[j41]José Luis Vivas, M. Carmen Fernández Gago, Javier Lopez, Andrés Benjumea: A security framework for a workflow-based grid development platform. Computer Standards & Interfaces 32(5-6): 230-245 (2010)
[j40]Jan Camenisch, Javier Lopez, Fabio Massacci, Massimo Ciscato, Thomas Skordas: JCS special issue on EU-funded ICT research on Trust and Security. Journal of Computer Security 18(1): 1-5 (2010)
[j39]
[j38]Cristina Alcaraz, Javier Lopez: A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C 40(4): 419-428 (2010)
[c59]Cristina Alcaraz, Angel Balastegui, Javier Lopez: Early Warning System for Cascading Effect Control in Energy Control Systems. CRITIS 2010: 55-66
[c58]Santiago Tenorio, Paul Spence, Beatriz Garriga, Javier Lopez, Aitor Garcia, Miguel Arranz: 3G HSPA for Broadband Communications with High Speed Vehicles. VTC Spring 2010: 1-5
[e13]Sokratis K. Katsikas, Javier Lopez, Miguel Soriano (Eds.): Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings. Lecture Notes in Computer Science 6264, Springer 2010, ISBN 978-3-642-15151-4
2000 – 2009
- 2009
[b1]Jose Antonio Onieva, Javier Lopez, Jianying Zhou: Secure Multi-Party Non-Repudiation Protocols and Applications. Advances in Information Security 43, Springer 2009, ISBN 978-0-387-75629-5, pp. 1-47
[j37]Mildrey Carbonell, José María Sierra, Javier Lopez: Secure multiparty payment with an intermediary entity. Computers & Security 28(5): 289-300 (2009)
[j36]
[j35]Isaac Agudo, M. Carmen Fernández Gago, Javier Lopez: Concurrent access control for multi-user and multi-processor systems based on trust relationships. Concurrency and Computation: Practice and Experience 21(10): 1389-1403 (2009)
[j34]Isaac Agudo, M. Carmen Fernández Gago, Javier Lopez: An Evolutionary Trust and Distrust Model. Electr. Notes Theor. Comput. Sci. 244: 3-12 (2009)
[j33]Rodrigo Roman, Javier Lopez: Integrating wireless sensor networks and the internet: a security analysis. Internet Research 19(2): 246-259 (2009)
[j32]Pablo Najera, Francisco Moyano, Javier Lopez: Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents. J. UCS 15(5): 970-991 (2009)
[j31]Tarik Taleb, Javier Lopez: Next generation wireless communications and mobile computing/networking technologies. Wireless Communications and Mobile Computing 9(4): 441-443 (2009)
[c57]Isaac Agudo, José Luis Vivas, Javier Lopez: Security assurance during the software development cycle. CompSysTech 2009: 20
[c56]Isaac Agudo, M. Carmen Fernández Gago, Javier Lopez: A Multidimensional Reputation Scheme for Identity Federations. EuroPKI 2009: 225-238
[c55]Javier Lopez, Rodrigo Roman, Cristina Alcaraz: Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks. FOSAD 2009: 289-338
[c54]Cristina Alcaraz, Isaac Agudo, M. Carmen Fernández Gago, Rodrigo Roman, Gerardo Fernandez, Javier Lopez: Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems. TrustBus 2009: 86-94
[e12]Yang Xiang, Javier Lopez, Haining Wang, Wanlei Zhou (Eds.): Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3838-9
[e11]Dimitris Gritzalis, Javier Lopez (Eds.): Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings. IFIP Advances in Information and Communication Technology 297, Springer 2009, ISBN 978-3-642-01243-3- 2008
[j30]Vicente Benjumea, Javier Lopez, José M. Troya: Anonymity analysis in credentials-based systems: A formal framework. Computer Standards & Interfaces 30(4): 253-261 (2008)
[j29]Jose Antonio Onieva, Jianying Zhou, Javier Lopez: Multiparty nonrepudiation: A survey. ACM Comput. Surv. 41(1) (2008)
[j28]Isaac Agudo, Javier Lopez, José A. Montenegro: Enabling Attribute Delegation in Ubiquitous Environments. MONET 13(3-4): 398-410 (2008)
[c53]David Galindo, Rodrigo Roman, Javier Lopez: A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. CANS 2008: 120-132
[c52]Vicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung: Fair Traceable Multi-Group Signatures. Financial Cryptography 2008: 231-246
[c51]Isaac Agudo, M. Carmen Fernández Gago, Javier Lopez: Delegating Privileges over Finite Resources: A Quota Based Delegation Approach. Formal Aspects in Security and Trust 2008: 302-315
[c50]Rodrigo Roman, Javier Lopez: KeyLED - transmitting sensitive data over out-of-band channels in wireless sensor networks. MASS 2008: 796-801
[c49]Jianying Zhou, Tanmoy Kanti Das, Javier Lopez: An Asynchronous Node Replication Attack in Wireless Sensor Networks. SEC 2008: 125-139
[c48]Isaac Agudo, M. Carmen Fernández Gago, Javier Lopez: A Model for Trust Metrics Analysis. TrustBus 2008: 28-37
[e10]Javier Lopez, Bernhard M. Hämmerli (Eds.): Critical Information Infrastructures Security, Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papers. Lecture Notes in Computer Science 5141, Springer 2008, ISBN 978-3-540-89095-9
[i1]Vicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung: Fair Traceable Multi-Group Signatures. IACR Cryptology ePrint Archive 2008: 47 (2008)- 2007
[j27]Rodrigo Roman, Cristina Alcaraz, Javier Lopez: The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection. Inf. Sec. Techn. Report 12(1): 24-31 (2007)
[j26]Javier Lopez, Isaac Agudo, José A. Montenegro: On the deployment of a real scalable delegation service. Inf. Sec. Techn. Report 12(3): 139-146 (2007)
[j25]Jianying Zhou, Wee-Yung Chin, Rodrigo Roman, Javier Lopez: An effective multi-layered defense framework against spam. Inf. Sec. Techn. Report 12(3): 179-185 (2007)
[j24]Rodrigo Roman, Cristina Alcaraz, Javier Lopez: A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes. MONET 12(4): 231-244 (2007)
[j23]Jose Antonio Onieva, Javier Lopez, Rodrigo Roman, Jianying Zhou, Stefanos Gritzalis: Integration of non-repudiation services in mobile DRM scenarios. Telecommunication Systems 35(3-4): 161-176 (2007)
[c47]Rodrigo Roman, M. Carmen Fernández Gago, Javier Lopez: Featuring trust and reputation management systems for constrained hardware devices. Autonomics 2007: 6
[c46]Vicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung: Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication. CANS 2007: 265-281
[c45]Javier Lopez, Cristina Alcaraz, Rodrigo Roman: On the Protection and Technologies of Critical Information Infrastructures. FOSAD 2007: 160-182
[c44]Mildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier Lopez, Jianying Zhou: Estimation of TTP Features in Non-repudiation Service. ICCSA (2) 2007: 549-558
[c43]Alejandro Muñoz, Armando Ferro, Fidel Liberal, Javier Lopez: Ksensor: Multithreaded kernel-level probe for passive QoS monitoring. ICPADS 2007: 1-8
[c42]Isaac Agudo, Javier Lopez, José A. Montenegro: Attribute delegation in ubiquitous environments. MobiMedia 2007: 43
[c41]Isaac Agudo, Javier Lopez, José A. Montenegro: Implementation aspects of a delegation system. MobiMedia 2007: 50
[e9]Joachim Biskup, Javier Lopez (Eds.): Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings. Lecture Notes in Computer Science 4734, Springer 2007, ISBN 978-3-540-74834-2
[e8]Javier Lopez, Pierangela Samarati, Josep L. Ferrer (Eds.): Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings. Lecture Notes in Computer Science 4582, Springer 2007, ISBN 978-3-540-73407-9- 2006
[j22]Rodrigo Roman, Jianying Zhou, Javier Lopez: An anti-spam scheme using pre-challenges. Computer Communications 29(15): 2739-2749 (2006)
[j21]
[j20]Vicente Benjumea, Javier Lopez, José M. Troya: Anonymous attribute certificates based on traceable signatures. Internet Research 16(2): 120-139 (2006)
[j19]Javier Lopez: Unleashing public-key cryptography in wireless sensor networks. Journal of Computer Security 14(5): 469-482 (2006)
[j18]Vicente Benjumea, Javier Lopez, José María Troya Linero: Specification of a framework for the anonymous use of privileges. Telematics and Informatics 23(3): 179-195 (2006)
[c40]Isaac Agudo, Javier Lopez, José A. Montenegro: Graphical Representation of Authorization Policies for Weighted Credentials. ACISP 2006: 383-394
[c39]Isaac Agudo, Javier Lopez, José A. Montenegro: Attribute Delegation Based on Ontologies and Context Information. Communications and Multimedia Security 2006: 54-66
[c38]Jianying Zhou, Jose Antonio Onieva, Javier Lopez: A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. SEC 2006: 221-232
[c37]Javier Lopez, José A. Montenegro, Rodrigo Roman: Service-Oriented Security Architecture for CII based on Sensor Networks. SecPerU 2006: 1-6
[c36]Javier Lopez, Antonio Maña, Antonio Muñoz: A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios. UIC 2006: 977-987
[e7]Sokratis K. Katsikas, Javier Lopez, Michael Backes, Stefanos Gritzalis, Bart Preneel (Eds.): Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings. Lecture Notes in Computer Science 4176, Springer 2006, ISBN 3-540-38341-7- 2005
[j17]Javier Lopez, José A. Montenegro, José Luis Vivas, Eiji Okamoto, Ed Dawson: Specification and design of advanced authentication and authorization services. Computer Standards & Interfaces 27(5): 467-478 (2005)
[j16]Javier Lopez, Juan J. Ortega, José M. Troya: Security protocols analysis: A SDL-based approach. Computer Standards & Interfaces 27(5): 489-499 (2005)
[j15]Rodrigo Roman, Javier Lopez, Jianying Zhou: Casual virtual private network. Comput. Syst. Sci. Eng. 20(3) (2005)
[j14]
[j13]Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, privacy and security in digital business. Comput. Syst. Sci. Eng. 20(6) (2005)
[j12]Jianying Zhou, Jose Antonio Onieva, Javier Lopez: Optimized multi-party certified email protocols. Inf. Manag. Comput. Security 13(5): 350-366 (2005)
[j11]Mariemma Inmaculada Yagüe del Valle, Antonio Maña, Javier Lopez: A metadata-based access control model for web services. Internet Research 15(1): 99-116 (2005)
[j10]Javier Lopez, Rolf Oppliger, Günther Pernul: Why have public key infrastructures failed so far? Internet Research 15(5): 544-556 (2005)
[c35]Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier Lopez: A Novel Method to Maintain Privacy in Mobile Agent Applications. CANS 2005: 247-260
[c34]
[c33]Javier Lopez, Rolf Oppliger, Günther Pernul: Classifying Public Key Certificates. EuroPKI 2005: 135-143
[c32]Rodrigo Roman, Jianying Zhou, Javier Lopez: On the Security of Wireless Sensor Networks. ICCSA (3) 2005: 681-690
[c31]Jose Antonio Onieva, Jianying Zhou, Javier Lopez: Attacking an Asynchronous Multi-party Contract Signing Protocol. INDOCRYPT 2005: 311-321
[c30]Isaac Agudo, Javier Lopez, José A. Montenegro: A Representation Model of Trust Relationships with Delegation Extensions. iTrust 2005: 116-130
[c29]Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, Privacy and Security in E-Business: Requirements and Solutions. Panhellenic Conference on Informatics 2005: 548-558
[c28]Rodrigo Roman, Jianying Zhou, Javier Lopez: Protection Against Spam Using Pre-Challenges. SEC 2005: 281-294
[e6]Sihan Qing, Wenbo Mao, Javier Lopez, Guilin Wang (Eds.): Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings. Lecture Notes in Computer Science 3783, Springer 2005, ISBN 3-540-30934-9
[e5]Jianying Zhou, Javier Lopez, Robert H. Deng, Feng Bao (Eds.): Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings. Lecture Notes in Computer Science 3650, Springer 2005, ISBN 3-540-29001-X
[e4]Sokratis K. Katsikas, Javier Lopez, Günther Pernul (Eds.): Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings. Lecture Notes in Computer Science 3592, Springer 2005, ISBN 3-540-28224-6- 2004
[j9]Jose Antonio Onieva, Jianying Zhou, Javier Lopez: Non-repudiation protocols for multiple entities. Computer Communications 27(16): 1608-1616 (2004)
[j8]Javier Lopez, Rolf Oppliger, Günther Pernul: Authentication and authorization infrastructures (AAIs): a comparative survey. Computers & Security 23(7): 578-590 (2004)
[j7]Jose Antonio Onieva, Jianying Zhou, Javier Lopez, Mildrey Carbonell: Agent-mediated non-repudiation protocols. Electronic Commerce Research and Applications 3(2): 152-162 (2004)
[j6]Javier Lopez, Antonio Mana, José A. Montenegro, Juan J. Ortega: PKI design based on the use of on-line certification authorities. Int. J. Inf. Sec. 2(2): 91-102 (2004)
[j5]Antonio Mana, Javier Lopez, Juan J. Ortega, Ernesto Pimentel, José M. Troya: A framework for secure execution of software. Int. J. Inf. Sec. 3(2): 99-112 (2004)
[c27]Javier Lopez, Niko Myller, Erkki Sutinen: Sorting out sorting through concretization with robotics. AVI 2004: 377-380
[c26]Mildrey Carbonell, Jose Antonio Onieva, Javier Lopez, Deborah Galpert, Jianying Zhou: Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. ICCSA (1) 2004: 903-914
[c25]Vicente Benjumea, Javier Lopez, José A. Montenegro, José M. Troya: A First Approach to Provide Anonymity in Attribute Certificates. Public Key Cryptography 2004: 402-415
[c24]Jianying Zhou, Jose Antonio Onieva, Javier Lopez: Analysis of a Free Roaming Agent Result-Truncation Defense Scheme. CEC 2004: 221-226
[e3]Sokratis K. Katsikas, Stefanos Gritzalis, Javier Lopez (Eds.): Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Lecture Notes in Computer Science 3093, Springer 2004, ISBN 3-540-22216-2
[e2]Javier Lopez, Sihan Qing, Eiji Okamoto (Eds.): Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings. Lecture Notes in Computer Science 3269, Springer 2004, ISBN 3-540-23563-9
[e1]Sokratis K. Katsikas, Javier Lopez, Günther Pernul (Eds.): Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings. Lecture Notes in Computer Science 3184, Springer 2004, ISBN 3-540-22919-1- 2003
[j4]Selwyn Russell, Ed Dawson, Eiji Okamoto, Javier Lopez: Virtual certificates and synthetic certificates: new paradigms for improving public key validation. Computer Communications 26(16): 1826-1838 (2003)
[j3]Javier Lopez, Antonio Maña, Juan J. Ortega, José M. Troya, Mariemma Inmaculada Yagüe del Valle: Integrating PMI services in CORBA applications. Computer Standards & Interfaces 25(4): 391-409 (2003)
[j2]Sigrid Gürgens, Javier Lopez, René Peralta: Analysis of e-commerce protocols: Adapting a traditional technique. Int. J. Inf. Sec. 2(1): 21-36 (2003)
[j1]Mariemma Inmaculada Yagüe del Valle, Antonio Maña, Javier Lopez, Ernesto Pimentel, José M. Troya: A secure solution for commercial digital libraries. Online Information Review 27(3): 147-159 (2003)
[c23]Javier Lopez, Juan J. Ortega, José Luis Vivas, José M. Troya: How to Specify Security Services: A Practical Approach. Communications and Multimedia Security 2003: 158-171
[c22]Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Javier Lopez, José M. Troya: Applying the Semantic Web Layers to Access Control. DEXA Workshops 2003: 622-626
[c21]Javier Lopez, Juan J. Ortega, José M. Troya, José Luis Vivas: High-level specification of security systems. GLOBECOM 2003: 1506-1510
[c20]Jose Antonio Onieva, Jianying Zhou, Javier Lopez: Practical Service Charge for P2P Content Distribution. ICICS 2003: 112-123
[c19]José Luis Vivas, José A. Montenegro, Javier Lopez: Towards a Business Process-Driven Framework for Security Engineering with the UML. ISC 2003: 381-395
[c18]Javier Lopez, Juan J. Ortega, José M. Troya: Applying SDL to Formal Analysis of Security Systems. SDL Forum 2003: 300-316
[c17]Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez: A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. SEC 2003: 37-48
[c16]Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez: Intermediary Non-repudiation Protocols. CEC 2003: 207-214- 2002
[c15]Javier Lopez, Günther Pernul: Message from the TrustBus Workshop Chairs. DEXA Workshops 2002: 409-412
[c14]Javier Lopez, Antonio Mana, Mariemma Inmaculada Yagüe del Valle: XML-Based Distributed Access Control System. EC-Web 2002: 203-213
[c13]Javier Lopez, Antonio Mana, José A. Montenegro, Juan J. Ortega, José M. Troya: Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations. EGOV 2002: 211-214
[c12]Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Javier Lopez, Ernesto Pimentel, José M. Troya: Secure Content Distribution for Digital Libraries. ICADL 2002: 483-494
[c11]Javier Lopez, Antonio Mana, Ernesto Pimentel, José M. Troya, Mariemma Inmaculada Yagüe del Valle: Access Control Infrastructure for Digital Objects. ICICS 2002: 399-410
[c10]Javier Lopez, Juan J. Ortega, José M. Troya: Protocol Engineering Applied to Formal Analysis of Security Systems. InfraSec 2002: 246-259
[c9]Javier Lopez, José A. Montenegro, Rodrigo Roman, Jorge Davila: Design of a VPN Software Solution Integrating TCP and UDP Services. InfraSec 2002: 325-338
[c8]Ed Dawson, Javier Lopez, José A. Montenegro, Eiji Okamoto: A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. ISC 2002: 136-149
[c7]Javier Lopez, Juan J. Ortega, José M. Troya: Verification of Authentication Protocols using SDL-method. SIS 2002: 61-71- 2001
[c6]Sigrid Gürgens, Javier Lopez: Suitability of a Classical Analysis Method for E-commerce Protocols. ISC 2001: 46-62- 2000
[c5]Javier Lopez, Antonio Mana, Juan J. Ortega, José M. Troya: Distributed Storage and Revocation in Digital Certificate Databases. DEXA 2000: 929-938
[c4]Jorge Davila, Javier Lopez, Antonio Mana, Juan J. Ortega, José M. Troya: Development of Secure Internet Applications for Governmental Environments. DEXA Workshop 2000: 362-368
1990 – 1999
- 1999
[c3]Javier Lopez, Antonio Mana, Juan J. Ortega: Cert'eM: Certification System Based on Electronic Mail Service Structure. CQRE 1999: 109-118
[c2]Sigrid Gürgens, Javier Lopez, René Peralta: Efficient Detection of Failure Modes in Electronic Commerce Protocols. DEXA Workshop 1999: 850-857
[c1]Jorge Davila, Javier Lopez, René Peralta: Implementation of Virtual Private Networks at the Transport Layer. ISW 1999: 85-102
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:16 CEST by the dblp team



