A suite of algorithms for key distribution and authentication in centralized secure multicast environments JAM Naranjo, N Antequera, LG Casado, JA López-Ramos Journal of Computational and Applied Mathematics 236 (12), 3042-3051, 2012 | 50 | 2012 |
Applications of the extended Euclidean algorithm to privacy and secure communications JAM Naranjo, JA López-Ramos, LG Casado Proc. of 10th international conference on computational and mathematical …, 2010 | 33 | 2010 |
Bárbaros hoscos: historia de la (des) territorialización de los negros de la comunidad de Roche R Ramírez, R Ustate, S Arregocés, L Múnera, M Granados, S Teherán, ... Recuprado de http://biblioteca. clacso. edu. ar/Colombia/cinep …, 2015 | 12 | 2015 |
Honeypots and honeynets: Analysis and case study JMF Marín, JÁM Naranjo, LG Casado Handbook of research on digital crime, cyberspace security, and information …, 2015 | 10 | 2015 |
Iptv using p2psp and html5+ webrtc C Medina-López, JPG Ortiz, JAM Naranjo, LG Casado, V González-Ruiz The Fourth W3C Web and TV Workshop. Munich, Germany, 2014 | 9 | 2014 |
Execution of the P2PSP protocol in parallel environments C Medina-López, JAM Naranjo, JP García-Ortiz, LG Casado, ... XXIV Jornadas de Paralelismo. Madrid, Spain, 2013 | 9 | 2013 |
Asynchronous privacy-preserving iterative computation on peer-to-peer networks JAM Naranjo, LG Casado, M Jelasity Computing 94, 763-782, 2012 | 9 | 2012 |
Lightweight user access control in energy-constrained wireless network services JAM Naranjo, P Orduna, A Gómez-Goiri, D López-de-Ipina, LG Casado Ubiquitous Computing and Ambient Intelligence: 6th International Conference …, 2012 | 7 | 2012 |
Key management schemes for peer-to-peer multimedia streaming overlay networks JAM Naranjo, JA López-Ramos, LG Casado Information Security Theory and Practice. Smart Devices, Pervasive Systems …, 2009 | 7 | 2009 |
Paxquery: Parallel analytical XML processing J Camacho-Rodríguez, D Colazzo, I Manolescu, JAM Naranjo Proceedings of the 2015 ACM SIGMOD International Conference on Management of …, 2015 | 6 | 2015 |
Enabling User Access Control in Energy-constrained Wireless Smart Environments. JÁM Naranjo, P Orduna, A Gómez-Goiri, D López-de-Ipina, LG Casado J. Univers. Comput. Sci. 19 (17), 2490-2505, 2013 | 6 | 2013 |
Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services D Ventura, A Gómez-Goiri, V Catania, D López-de-Ipiña, JAM Naranjo, ... Logic Journal of IGPL 24 (1), 80-91, 2016 | 4 | 2016 |
Group oriented renewal of secrets and its application to secure multicast JAM Naranjo, LG Casado, JAL Ramos Journal of information science and engineering 27 (4), 1303-1313, 2011 | 4 | 2011 |
A key distribution scheme for live streaming multi-tree overlays JAM Naranjo, JAL Ramos, LG Casado Computational Intelligence in Security for Information Systems 2010 …, 2010 | 4 | 2010 |
Key Refreshment in overlay networks: a centralized secure multicast scheme proposal JAM Naranjo, JA López-Ramos, LG Casado XXI Jornadas de Paralelismo, Valencia, Spain, 931-938, 2010 | 4 | 2010 |
Integration of Cisco certification programs on Computer Networks subjects JFR Herrera, LG Casado, VG Ruiz, EM Garzón, JFS Estrada, ... Experiencias Docentes en Redes de Computadores 1 (1), 57-66, 2015 | 3 | 2015 |
An updated view on centralized secure group communications JAM Naranjo, LG Casado Logic Journal of the IGPL 21 (4), 659-670, 2013 | 3 | 2013 |
Fully distributed authentication with locality exploitation for the CoDiP2P peer-to-peer computing platform JAM Naranjo, F Cores, LG Casado, F Guirado The Journal of Supercomputing 65, 1037-1049, 2013 | 2 | 2013 |
Keeping group communications private: An up-to-date review on centralized secure multicast JAM Naranjo, LG Casado Computational Intelligence in Security for Information Systems: 4th …, 2011 | 2 | 2011 |
Ejecutando Peers P2PSP en Google Chromecast C Medina-López, V González-Ruiz, LG Casado, JAM Naranjo, ... Actas de VI Jornadas de Computación Empotrada, 123-129, 2015 | 1 | 2015 |