Jesus Diaz

According to our database1, Jesus Diaz authored at least 20 papers between 2011 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Hyot: Leveraging Hyperledger for Constructing an Event-Based Traceability System in IoT.
Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), 2019

A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Encrypted Cloud: A Software Solution for the Secure Use of Free-Access Cloud Storage Services.
Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, 2017

Fair and Accountable Anonymity for the Tor Network.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

2016
Combining Usability and Privacy Protection in Free-Access Public Cloud Storage Servers: Review of the Main Threats and Challenges.
CoRR, 2016

2015
libgroupsig: An extensible C library for group signatures.
IACR Cryptology ePrint Archive, 2015

Privacy Threats in E-Shopping (Position Paper).
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Non-conventional Digital Signatures and Their Implementations - A Review.
Proceedings of the International Joint Conference, 2015

On the Difficult Tradeoff Between Security and Privacy: Challenges for the Management of Digital Identities.
Proceedings of the International Joint Conference, 2015

2014
On securing online registration protocols: Formal verification of a new proposal.
Knowl.-Based Syst., 2014

Fair anonymity for the Tor network.
CoRR, 2014

New X.509-based mechanisms for fair anonymity management.
Computers & Security, 2014

Methodological Security Verification of a Registration Protocol.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

2013
Cryptanalysis of a one round chaos-based Substitution Permutation Network.
Signal Processing, 2013

2012
A formal methodology for integral security design and verification of network protocols
CoRR, 2012

Formal security analysis of registration protocols for interactive systems: a methodology and a case of study
CoRR, 2012

Anonymity Revocation through Standard Infrastructures.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

2011
An Approach for Adapting Moodle into a Secure Infrastructure.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011


  Loading...