Cristina Satizábal

Orcid: 0000-0002-6823-9718

According to our database1, Cristina Satizábal authored at least 18 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Secure Internet Voting Protocol (SIVP): A secure option for electoral processes.
J. King Saud Univ. Comput. Inf. Sci., 2022

2018
Internet Voting Protocols: An Analysis of the Cryptographic Operations per Phase.
Int. J. Commun. Networks Inf. Secur., 2018

2010
TOMIN: Trustworthy Mobile Cash with Expiration-date Attached.
J. Softw., 2010

Study of mobile payment protocols and its performance evaluation on mobile devices.
Int. J. Inf. Technol. Manag., 2010

Strong Remote User Authentication Scheme using Smart Cards.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

2008
Mobile Payment Protocol for Micropayments: Withdrawal and Payment Anonymous.
Proceedings of the NTMS 2008, 2008

Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms.
Proceedings of the The Third International Conference on Availability, 2008

Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols.
Proceedings of the The Third International Conference on Availability, 2008

2007
Contribución a la validación de certificados en arquitecturas de autenticación y autorización.
PhD thesis, 2007

WAP PKI and certification path validation.
Int. J. Internet Protoc. Technol., 2007

Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks.
Comput. Commun., 2007

Reducing the Computational Cost of Certification Path Validation in Mobile Payment.
Proceedings of the Public Key Infrastructure, 2007

A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS.
Proceedings of the The Second International Conference on Availability, 2007

2006
Building a Virtual Hierarchy for Managing Trust Relationships in a Hybrid Architecture.
J. Comput., 2006

Building Hierarchical Public Key Infrastructures in Mobile Ad-Hoc Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios.
Proceedings of the Critical Information Infrastructures Security, 2006

PKI Trust Relationships: from a Hybrid Architecture to a Hierarchical Model.
Proceedings of the The First International Conference on Availability, 2006

2005
Cooperative Agents and Software Fingerprinting for Security in Intrusion Detection Systems based on Autonomous Agents.
Proceedings of the IASTED International Conference on Databases and Applications, 2005


  Loading...