Следене
Isaac Agudo
Isaac Agudo
Associate Professor (UMA)
Потвърден имейл адрес: lcc.uma.es - Начална страница
Заглавие
Позовавания
Позовавания
Година
Trust management systems for wireless sensor networks: Best practices
J Lopez, R Roman, I Agudo, C Fernandez-Gago
Computer Communications 33 (9), 1086-1093, 2010
4422010
Proxy re-encryption: Analysis of constructions and its application to secure access delegation
D Nuñez, I Agudo, J Lopez
Journal of Network and Computer Applications 87, 193-209, 2017
882017
BlindIdM: A privacy-preserving approach for identity management as a service
D Nuñez, I Agudo
International Journal of Information Security 13, 199-215, 2014
702014
NTRUReEncrypt: An efficient proxy re-encryption scheme based on NTRU
D Nunez, I Agudo, J Lopez
Proceedings of the 10th ACM symposium on information, computer and …, 2015
692015
Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services
D Nunez, I Agudo, J Lopez
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
542012
Cryptography goes to the cloud
I Agudo, D Nuñez, G Giammatteo, P Rizomiliotis, C Lambrinoudakis
Secure and Trust Computing, Data Management, and Applications: STA 2011 …, 2011
542011
Managing Incidents in Smart Grids à la Cloud
C Alcaraz, I Agudo, D Nunez, J Lopez
IEEE Third International Conference on Cloud Computing Technology and …, 2011
402011
A model for trust metrics analysis
I Agudo, C Fernandez-Gago, J Lopez
International Conference on Trust, Privacy and Security in Digital Business …, 2008
382008
A methodology for security assurance-driven system development
JL Vivas, I Agudo, J López
Requirements Engineering, 1-19, 2011
332011
A blockchain approach for decentralized V2X (D-V2X)
I Agudo, M Montenegro-Gómez, J Lopez
IEEE Transactions on Vehicular Technology 70 (5), 4001-4010, 2020
312020
A representation model of trust relationships with delegation extensions
I Agudo, J Lopez, J Montenegro
3th International Conference on Trust Management (iTRUST'05), 9-22, 2005
262005
Private set intersection: A systematic literature review
D Morales, I Agudo, J Lopez
Computer Science Review 49, 100567, 2023
252023
Building trust from context similarity measures
C Fernandez-Gago, I Agudo, J Lopez
Computer Standards & Interfaces 36 (4), 792-800, 2014
232014
Identity management challenges for intercloud applications
D Núñez, I Agudo, P Drogkaris, S Gritzalis
Secure and Trust Computing, Data Management, and Applications: STA 2011 …, 2011
232011
A parametric family of attack models for proxy re-encryption
D Nunez, I Agudo, J Lopez
2015 IEEE 28th Computer Security Foundations Symposium, 290-301, 2015
222015
High-performance access management and data protection for distributed messaging applications
M Egorov, MLS Wilkison, D Nu, I Agudo
US Patent 10,574,440, 2020
212020
A privacy-aware continuous authentication scheme for proximity-based access control
I Agudo, R Rios, J Lopez
Computers & security 39, 117-126, 2013
212013
A scale based trust model for multi-context environments
I Agudo, C Fernandez-Gago, J Lopez
Computers & Mathematics with Applications 60 (2), 209-216, 2010
202010
Encryption for distributed storage and processing
M Egorov, MLS Wilkison, D Nu, I Agudo
US Patent 10,691,817, 2020
162020
Method and system for secure delegated access to encrypted data in big data computing clusters
M Egorov, MLS Wilkison, D Nu, I Agudo
US Patent 10,581,603, 2020
142020
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20