Antonio Izquierdo Manzanares

According to our database1, Antonio Izquierdo Manzanares authored at least 27 papers between 2004 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Measuring the resiliency of cellular base station deployments.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

2013
Nationwide Safety: Nationwide Modeling for Broadband Network Services.
IEEE Veh. Technol. Mag., 2013

2012
Survey of Attacks and Defenses on P2PSIP Communications.
IEEE Commun. Surv. Tutorials, 2012

2009
An analysis of conformance issues in implementations of standardized security protocols.
Comput. Stand. Interfaces, 2009

Using the media independent information service to support mobile authentication in fast mobile IPv6.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Improving security information gathering with IEEE 802.21 to optimize handover performance.
Proceedings of the 12th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2009

Optimizing Authentication in Media Independent Handovers Using IEEE 802.21.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

2008
Network Smart Card Performing U(SIM) Functionalities in AAA Protocol Architectures.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

Using the EAP framework for fast media independent handover authentication.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

Security challenges in seamless mobility: how to "handover" the keys?
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

New E-Payment Scenarios in an Extended Version of the Traditional Model.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

2007
Hardening Network Infrastructure: Not Suitable for Everyone.
IEEE Distributed Syst. Online, 2007

Advances in network smart cards authentication.
Comput. Networks, 2007

Professional Pen Testing for Web Applications - Programmer to Programmer Series (P2P).
Comput. J., 2007

Using Adaptative Encryption for Ubiquitous Environments.
Proceedings of the Computational Science and Its Applications, 2007

Security analysis of a new multi-party payment protocol with intermediary service.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

2006
Anonymous Payment in a Kiosk Centric Model using Digital signature scheme with message recovery and Low Computational Power Devices.
J. Theor. Appl. Electron. Commer. Res., 2006

Towards self-authenticable smart cards.
Comput. Commun., 2006

On the implementation of security policies with adaptative encryption.
Comput. Commun., 2006

Payment in a Kiosk Centric Model with Mobile and Low Computational Power Devices.
Proceedings of the Computational Science and Its Applications, 2006

2005
The strict avalanche criterion randomness test.
Math. Comput. Simul., 2005

Sensible Network Protection.
IEEE Distributed Syst. Online, 2005

Secure Electronic Payments in Heterogeneous Networking: New Authentication Protocols Approach.
Proceedings of the Computational Science and Its Applications, 2005

Attacks on Port Knocking Authentication Mechanism.
Proceedings of the Computational Science and Its Applications, 2005

A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol.
Proceedings of the Computational Science and Its Applications, 2005

2004
Secure Communications in Multi-Agent Systems Protecting KQML.
Proceedings of the Security In Information Systems, 2004

Security Issues in Network File Systems.
Proceedings of the Computational Science and Its Applications, 2004


  Loading...