Almudena Alcaide

According to our database1, Almudena Alcaide authored at least 25 papers between 2004 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management.
IET Inf. Secur., 2016

2013
Anonymous authentication for privacy-preserving IoT target-driven applications.
Comput. Secur., 2013

Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations.
Ad Hoc Networks, 2013

Coalitional games for the management of anonymous access in online social networks.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

2012
The Peer's Dilemma: A general framework to examine cooperation in pure peer-to-peer systems.
Comput. Networks, 2012

2011
Privacy-enhancing Cryptography-based Materials.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

POSTER Towards a Privacy - Respectful Telematic Verification System for Vehicle and Driver Authorizations.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2011

2010
A Strong Authentication Protocol Based on Portable One-Time Dynamic URLs.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol.
Proceedings of the Trust, 2010

A multi-agent scanner to detect stored-XSS vulnerabilities.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

A Simple Mechanism to Maintain Peer's Cooperativeness: The Peer's RPS Dilemma.
Proceedings of the 2010 International Conference on Internet Computing, 2010

L-PEP: A Logic to Reason about Privacy-Enhancing Cryptography Protocols.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

2008
On the Distinguishability of Distance-Bounded Permutations in Ordered Channels.
IEEE Trans. Inf. Forensics Secur., 2008

Cryptanalysis of Syverson's Rational Exchange Protocol.
Int. J. Netw. Secur., 2008

Bayesian rational exchange.
Int. J. Inf. Sec., 2008

Cryptanalysis of the RSA-CEGD protocol
CoRR, 2008

Nature-Inspired Synthesis of Rational Protocols.
Proceedings of the Parallel Problem Solving from Nature, 2008

2007
Bayesian Analysis of Secure P2P Sharing Protocols.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

A Multi-party Rational Exchange Protocol.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Towards Automated Design of Multi-party Rational Exchange Security Protocols.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

2006
An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
Unfairness of a protocol for certified delivery.
IACR Cryptol. ePrint Arch., 2005

Secure Electronic Payments in Heterogeneous Networking: New Authentication Protocols Approach.
Proceedings of the Computational Science and Its Applications, 2005

A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol.
Proceedings of the Computational Science and Its Applications, 2005

2004
Validating the Use of BAN LOGIC.
Proceedings of the Computational Science and Its Applications, 2004


  Loading...