Joaquín Torres Márquez

According to our database1, Joaquín Torres Márquez authored at least 17 papers between 2004 and 2011.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2011
Advantages of identity certificate segregation in P2PSIP systems.
IET Communications, 2011

2009
An analysis of conformance issues in implementations of standardized security protocols.
Computer Standards & Interfaces, 2009

2008
A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks.
Computer Communications, 2008

Network Smart Card Performing U(SIM) Functionalities in AAA Protocol Architectures.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

New E-Payment Scenarios in an Extended Version of the Traditional Model.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

Secure e-payment protocol with new involved entities.
Proceedings of the 2008 International Symposium on Collaborative Technologies and Systems, 2008

Application of Network Smart Cards to Citizens Identification Systems.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
Advances in network smart cards authentication.
Computer Networks, 2007

Using Adaptative Encryption for Ubiquitous Environments.
Proceedings of the Computational Science and Its Applications, 2007

A new domain-based payment model for emerging mobile commerce scenarios.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

Security analysis of a new multi-party payment protocol with intermediary service.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

2006
Anonymous Payment in a Kiosk Centric Model using Digital signature scheme with message recovery and Low Computational Power Devices.
JTAER, 2006

Towards self-authenticable smart cards.
Computer Communications, 2006

On the implementation of security policies with adaptative encryption.
Computer Communications, 2006

2005
Secure Electronic Payments in Heterogeneous Networking: New Authentication Protocols Approach.
Proceedings of the Computational Science and Its Applications, 2005

Attacks on Port Knocking Authentication Mechanism.
Proceedings of the Computational Science and Its Applications, 2005

2004
Validating the Use of BAN LOGIC.
Proceedings of the Computational Science and Its Applications, 2004


  Loading...