Trust management systems for wireless sensor networks: Best practices J Lopez, R Roman, I Agudo, C Fernandez-Gago Computer Communications 33 (9), 1086-1093, 2010 | 442 | 2010 |
Proxy re-encryption: Analysis of constructions and its application to secure access delegation D Nuñez, I Agudo, J Lopez Journal of Network and Computer Applications 87, 193-209, 2017 | 88 | 2017 |
BlindIdM: A privacy-preserving approach for identity management as a service D Nuñez, I Agudo International Journal of Information Security 13, 199-215, 2014 | 70 | 2014 |
NTRUReEncrypt: An efficient proxy re-encryption scheme based on NTRU D Nunez, I Agudo, J Lopez Proceedings of the 10th ACM symposium on information, computer and …, 2015 | 69 | 2015 |
Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services D Nunez, I Agudo, J Lopez 4th IEEE International Conference on Cloud Computing Technology and Science …, 2012 | 54 | 2012 |
Cryptography goes to the cloud I Agudo, D Nuñez, G Giammatteo, P Rizomiliotis, C Lambrinoudakis Secure and Trust Computing, Data Management, and Applications: STA 2011 …, 2011 | 54 | 2011 |
Managing Incidents in Smart Grids à la Cloud C Alcaraz, I Agudo, D Nunez, J Lopez IEEE Third International Conference on Cloud Computing Technology and …, 2011 | 40 | 2011 |
A model for trust metrics analysis I Agudo, C Fernandez-Gago, J Lopez International Conference on Trust, Privacy and Security in Digital Business …, 2008 | 38 | 2008 |
A methodology for security assurance-driven system development JL Vivas, I Agudo, J López Requirements Engineering, 1-19, 2011 | 33 | 2011 |
A blockchain approach for decentralized V2X (D-V2X) I Agudo, M Montenegro-Gómez, J Lopez IEEE Transactions on Vehicular Technology 70 (5), 4001-4010, 2020 | 31 | 2020 |
A representation model of trust relationships with delegation extensions I Agudo, J Lopez, J Montenegro 3th International Conference on Trust Management (iTRUST'05), 9-22, 2005 | 26 | 2005 |
Private set intersection: A systematic literature review D Morales, I Agudo, J Lopez Computer Science Review 49, 100567, 2023 | 25 | 2023 |
Building trust from context similarity measures C Fernandez-Gago, I Agudo, J Lopez Computer Standards & Interfaces 36 (4), 792-800, 2014 | 23 | 2014 |
Identity management challenges for intercloud applications D Núñez, I Agudo, P Drogkaris, S Gritzalis Secure and Trust Computing, Data Management, and Applications: STA 2011 …, 2011 | 23 | 2011 |
A parametric family of attack models for proxy re-encryption D Nunez, I Agudo, J Lopez 2015 IEEE 28th Computer Security Foundations Symposium, 290-301, 2015 | 22 | 2015 |
High-performance access management and data protection for distributed messaging applications M Egorov, MLS Wilkison, D Nu, I Agudo US Patent 10,574,440, 2020 | 21 | 2020 |
A privacy-aware continuous authentication scheme for proximity-based access control I Agudo, R Rios, J Lopez Computers & security 39, 117-126, 2013 | 21 | 2013 |
A scale based trust model for multi-context environments I Agudo, C Fernandez-Gago, J Lopez Computers & Mathematics with Applications 60 (2), 209-216, 2010 | 20 | 2010 |
Encryption for distributed storage and processing M Egorov, MLS Wilkison, D Nu, I Agudo US Patent 10,691,817, 2020 | 16 | 2020 |
Method and system for secure delegated access to encrypted data in big data computing clusters M Egorov, MLS Wilkison, D Nu, I Agudo US Patent 10,581,603, 2020 | 14 | 2020 |