Isaac Agudo
Orcid: 0000-0002-2911-2300
  According to our database1,
  Isaac Agudo
  authored at least 52 papers
  between 2004 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
A Lightweight Mechanism for Dynamic Secret Sharing of Private Data by Constrained Devices.
    
  
    IEEE Internet Things J., July, 2025
    
  
Toward a Framework for Cost-Effective and Publicly Verifiable Confidential Computations in Blockchain.
    
  
    IEEE Commun. Mag., February, 2025
    
  
    Comput. Electr. Eng., 2025
    
  
  2024
Protecting Cryptographic Material in Ethereum Blockchain Clients Using an Open-source Secure Element.
    
  
    ERCIM News, 2024
    
  
    Proceedings of the Computer Security. ESORICS 2024 International Workshops, 2024
    
  
    Proceedings of the Computer Security. ESORICS 2024 International Workshops, 2024
    
  
  2023
    Comput. Sci. Rev., August, 2023
    
  
    Proceedings of the 98th IEEE Vehicular Technology Conference, 2023
    
  
    Proceedings of the IEEE International Conference on Metaverse Computing, 2023
    
  
  2022
    IEEE Access, 2022
    
  
    Proceedings of the 19th International Conference on Security and Cryptography, 2022
    
  
  2021
  2019
    IET Inf. Secur., 2019
    
  
  2017
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation.
    
  
    J. Netw. Comput. Appl., 2017
    
  
    Proceedings of the Data and Applications Security and Privacy XXXI, 2017
    
  
  2016
    Secur. Commun. Networks, 2016
    
  
    IACR Cryptol. ePrint Arch., 2016
    
  
  2015
A Technique for Enhanced Provision of Appropriate Access to Evidence Across Service Provision Chains.
    
  
    Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015
    
  
    Proceedings of the 15th Koli Calling Conference on Computing Education Research, 2015
    
  
    Proceedings of the Data Privacy Management, and Security Assurance, 2015
    
  
    Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
    
  
    Proceedings of the 10th ACM Symposium on Information, 2015
    
  
  2014
    Int. J. Inf. Sec., 2014
    
  
    Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
    
  
    Proceedings of the Accountability and Security in the Cloud, 2014
    
  
  2013
    Comput. Secur., 2013
    
  
  2012
Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber Identity.
    
  
    Proceedings of the ISSE 2012, 2012
    
  
    Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012
    
  
Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services.
    
  
    Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
    
  
  2011
    Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011
    
  
    Proceedings of the IEEE 16th Conference on Emerging Technologies & Factory Automation, 2011
    
  
    Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
    
  
  2010
    Comput. Commun., 2010
    
  
  2009
Concurrent access control for multi-user and multi-processor systems based on trust relationships.
    
  
    Concurr. Comput. Pract. Exp., 2009
    
  
    Proceedings of the Trust, 2009
    
  
    Proceedings of the Public Key Infrastructures, Services and Applications, 2009
    
  
    Proceedings of the 2009 International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2009
    
  
  2008
    Proceedings of the 4th International Workshop on Security and Trust Management, 2008
    
  
    Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
    
  
    Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008
    
  
  2007
    Inf. Secur. Tech. Rep., 2007
    
  
    Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007
    
  
    Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007
    
  
  2006
    Proceedings of the Communications and Multimedia Security, 2006
    
  
    Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
    
  
  2005
    Proceedings of the Trust Management, Third International Conference, 2005
    
  
  2004
    Proceedings of the 5th International Conference on Computer Systems and Technologies, 2004