Follow
Juan Alvaro Muñoz Naranjo
Juan Alvaro Muñoz Naranjo
Verified email at ual.es
Title
Cited by
Cited by
Year
A suite of algorithms for key distribution and authentication in centralized secure multicast environments
JAM Naranjo, N Antequera, LG Casado, JA López-Ramos
Journal of Computational and Applied Mathematics 236 (12), 3042-3051, 2012
502012
Applications of the extended Euclidean algorithm to privacy and secure communications
JAM Naranjo, JA López-Ramos, LG Casado
Proc. of 10th international conference on computational and mathematical …, 2010
332010
Bárbaros hoscos: historia de la (des) territorialización de los negros de la comunidad de Roche
R Ramírez, R Ustate, S Arregocés, L Múnera, M Granados, S Teherán, ...
Recuprado de http://biblioteca. clacso. edu. ar/Colombia/cinep …, 2015
122015
Honeypots and honeynets: Analysis and case study
JMF Marín, JÁM Naranjo, LG Casado
Handbook of research on digital crime, cyberspace security, and information …, 2015
102015
Iptv using p2psp and html5+ webrtc
C Medina-López, JPG Ortiz, JAM Naranjo, LG Casado, V González-Ruiz
The Fourth W3C Web and TV Workshop. Munich, Germany, 2014
92014
Execution of the P2PSP protocol in parallel environments
C Medina-López, JAM Naranjo, JP García-Ortiz, LG Casado, ...
XXIV Jornadas de Paralelismo. Madrid, Spain, 2013
92013
Asynchronous privacy-preserving iterative computation on peer-to-peer networks
JAM Naranjo, LG Casado, M Jelasity
Computing 94, 763-782, 2012
92012
Lightweight user access control in energy-constrained wireless network services
JAM Naranjo, P Orduna, A Gómez-Goiri, D López-de-Ipina, LG Casado
Ubiquitous Computing and Ambient Intelligence: 6th International Conference …, 2012
72012
Key management schemes for peer-to-peer multimedia streaming overlay networks
JAM Naranjo, JA López-Ramos, LG Casado
Information Security Theory and Practice. Smart Devices, Pervasive Systems …, 2009
72009
Paxquery: Parallel analytical XML processing
J Camacho-Rodríguez, D Colazzo, I Manolescu, JAM Naranjo
Proceedings of the 2015 ACM SIGMOD International Conference on Management of …, 2015
62015
Enabling User Access Control in Energy-constrained Wireless Smart Environments.
JÁM Naranjo, P Orduna, A Gómez-Goiri, D López-de-Ipina, LG Casado
J. Univers. Comput. Sci. 19 (17), 2490-2505, 2013
62013
Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services
D Ventura, A Gómez-Goiri, V Catania, D López-de-Ipiña, JAM Naranjo, ...
Logic Journal of IGPL 24 (1), 80-91, 2016
42016
Group oriented renewal of secrets and its application to secure multicast
JAM Naranjo, LG Casado, JAL Ramos
Journal of information science and engineering 27 (4), 1303-1313, 2011
42011
A key distribution scheme for live streaming multi-tree overlays
JAM Naranjo, JAL Ramos, LG Casado
Computational Intelligence in Security for Information Systems 2010 …, 2010
42010
Key Refreshment in overlay networks: a centralized secure multicast scheme proposal
JAM Naranjo, JA López-Ramos, LG Casado
XXI Jornadas de Paralelismo, Valencia, Spain, 931-938, 2010
42010
Integration of Cisco certification programs on Computer Networks subjects
JFR Herrera, LG Casado, VG Ruiz, EM Garzón, JFS Estrada, ...
Experiencias Docentes en Redes de Computadores 1 (1), 57-66, 2015
32015
An updated view on centralized secure group communications
JAM Naranjo, LG Casado
Logic Journal of the IGPL 21 (4), 659-670, 2013
32013
Fully distributed authentication with locality exploitation for the CoDiP2P peer-to-peer computing platform
JAM Naranjo, F Cores, LG Casado, F Guirado
The Journal of Supercomputing 65, 1037-1049, 2013
22013
Keeping group communications private: An up-to-date review on centralized secure multicast
JAM Naranjo, LG Casado
Computational Intelligence in Security for Information Systems: 4th …, 2011
22011
Ejecutando Peers P2PSP en Google Chromecast
C Medina-López, V González-Ruiz, LG Casado, JAM Naranjo, ...
Actas de VI Jornadas de Computación Empotrada, 123-129, 2015
12015
The system can't perform the operation now. Try again later.
Articles 1–20