Itzel Vázquez Sandoval

According to our database1, Itzel Vázquez Sandoval authored at least 13 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Can We Formally Catch Cheating in E-exams?
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2020
A multifaceted formal analysis of end-to-end encrypted email protocols and cryptographic authentication enhancements.
PhD thesis, 2020

A Formal Security Analysis of the pEp Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email.
CoRR, 2020

PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE.
Proceedings of the E-Business and Telecommunications, 2020

Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-entropy Secrets.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
Detecting Misalignments between System Security and User Perceptions: A Preliminary Socio-technical Analysis of an E2E email Encryption System.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

A Formal Security Analysis of the p=uiv p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019

2018
A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack.
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018

A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

A Protocol to Strengthen Password-Based Authentication.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

Experience Report: How to Extract Security Protocols' Specifications from C Libraries.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2015
Completing Workflow Traces Using Action Languages.
Proceedings of the Advanced Information Systems Engineering, 2015

2014
Reasoning on Incomplete Execution Traces Using Action Languages - A First Report.
Proceedings of the Service-Oriented Computing - ICSOC 2014 Workshops, 2014


  Loading...