Isaac Agudo
Isaac Agudo
Associate Professor (UMA)
E-mail megerősítve itt: lcc.uma.es - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
Trust management systems for wireless sensor networks: Best practices
J Lopez, R Roman, I Agudo, C Fernandez-Gago
Computer Communications 33 (9), 1086-1093, 2010
4142010
BlindIdM: A privacy-preserving approach for identity management as a service
D Nuñez, I Agudo
International Journal of Information Security 13 (2), 199-215, 2014
522014
Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services
D Nunez, I Agudo, J Lopez
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
502012
Cryptography goes to the cloud
I Agudo, D Nuñez, G Giammatteo, P Rizomiliotis, C Lambrinoudakis
FTRA International Conference on Secure and Trust Computing, Data Management …, 2011
472011
NTRUReEncrypt: An efficient proxy re-encryption scheme based on NTRU
D Nunez, I Agudo, J Lopez
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
402015
Proxy re-encryption: Analysis of constructions and its application to secure access delegation
D Nuñez, I Agudo, J Lopez
Journal of Network and Computer Applications 87, 193-209, 2017
352017
A model for trust metrics analysis
I Agudo, C Fernandez-Gago, J Lopez
International Conference on Trust, Privacy and Security in Digital Business …, 2008
332008
Managing Incidents in Smart Grids à la Cloud
C Alcaraz, I Agudo, D Nunez, J Lopez
IEEE Third International Conference on Cloud Computing Technology and …, 2011
302011
A methodology for security assurance-driven system development
JL Vivas, I Agudo, J López
Requirements Engineering, 1-19, 2011
272011
A representation model of trust relationships with delegation extensions
I Agudo, J Lopez, J Montenegro
3th International Conference on Trust Management (iTRUST'05), 9-22, 2005
252005
Identity management challenges for intercloud applications
D Núñez, I Agudo, P Drogkaris, S Gritzalis
FTRA International Conference on Secure and Trust Computing, Data Management …, 2011
222011
A scale based trust model for multi-context environments
I Agudo, C Fernandez-Gago, J Lopez
Computers & Mathematics with Applications 60 (2), 209-216, 2010
202010
Building trust from context similarity measures
C Fernandez-Gago, I Agudo, J Lopez
Computer Standards & Interfaces 36 (4), 792-800, 2014
192014
A parametric family of attack models for proxy re-encryption
D Nunez, I Agudo, J Lopez
2015 IEEE 28th Computer Security Foundations Symposium, 290-301, 2015
182015
A privacy-aware continuous authentication scheme for proximity-based access control
I Agudo, R Rios, J Lopez
Computers & security 39, 117-126, 2013
182013
Delegated access for hadoop clusters in the cloud
D Nunez, I Agudo, J Lopez
2014 IEEE 6th International Conference on Cloud Computing Technology and …, 2014
102014
An evolutionary trust and distrust model
I Agudo, C Fernández-Gago, J Lopez
Electronic Notes in Theoretical Computer Science 244, 3-12, 2009
92009
On the application of generic CCA‐secure transformations to proxy re‐encryption
D Nunez, I Agudo, J Lopez
Security and Communication Networks 9 (12), 1769-1785, 2016
72016
OSAMI Commons—An open dynamic services platform for ambient intelligence
N Dai, AR Lopez, E Zeeb, J Krueger, O Dohndorf, J Bermejo, W Thronicke, ...
ETFA2011, 1-10, 2011
72011
Adaptive dispatching of incidences based on reputation for SCADA systems
C Alcaraz, I Agudo, C Fernandez-Gago, R Roman, G Fernandez, J Lopez
International Conference on Trust, Privacy and Security in Digital Business …, 2009
72009
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20