José María Sierra

According to our database1, José María Sierra authored at least 55 papers between 1997 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Lightweight Access Control System for Wearable Devices.
IT Professional, 2019

2018
A systematic mapping study about socio-technical congruence.
Information & Software Technology, 2018

2017
Modeling XACML Security Policies Using Graph Databases.
IT Professional, 2017

2016
Guest Editorial.
IET Information Security, 2016

2015
Toward self-authenticable wearable devices.
IEEE Wireless Commun., 2015

Attribute-based authorization for structured Peer-to-Peer (P2P) networks.
Computer Standards & Interfaces, 2015

2012
Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems.
Peer-to-Peer Networking and Applications, 2012

A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs).
Electronic Commerce Research, 2012

Survey of Attacks and Defenses on P2PSIP Communications.
IEEE Communications Surveys and Tutorials, 2012

2011
Advantages of identity certificate segregation in P2PSIP systems.
IET Communications, 2011

Performance evaluation of highly efficient techniques for software implementation of LFSR.
Computers & Electrical Engineering, 2011

A light-weight authentication scheme for wireless sensor networks.
Ad Hoc Networks, 2011

2010
Security attacks and solutions for vehicular ad hoc networks.
IET Communications, 2010

Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks.
Electronic Commerce Research, 2010

An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

2009
An analysis of conformance issues in implementations of standardized security protocols.
Computer Standards & Interfaces, 2009

Secure multiparty payment with an intermediary entity.
Computers & Security, 2009

Testing Topologies for the Evaluation of IPSEC Implementations.
Proceedings of the Computational Science and Its Applications, 2009

2008
A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks.
Computer Communications, 2008

Network Smart Card Performing U(SIM) Functionalities in AAA Protocol Architectures.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

Secure e-payment protocol with new involved entities.
Proceedings of the 2008 International Symposium on Collaborative Technologies and Systems, 2008

Application of Network Smart Cards to Citizens Identification Systems.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
Advances in network smart cards authentication.
Computer Networks, 2007

Using Adaptative Encryption for Ubiquitous Environments.
Proceedings of the Computational Science and Its Applications, 2007

Estimation of TTP Features in Non-repudiation Service.
Proceedings of the Computational Science and Its Applications, 2007

A Secure Payment Protocol for Restricted Connectivity Scenarios in M-Commerce.
Proceedings of the E-Commerce and Web Technologies, 8th International Conference, 2007

An Anonymous Account-Based Mobile Payment Protocol for a Restricted Connectivity Scenario.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

Security analysis of a new multi-party payment protocol with intermediary service.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

2006
Anonymous Payment in a Kiosk Centric Model using Digital signature scheme with message recovery and Low Computational Power Devices.
JTAER, 2006

Editorial for the special issue on Internet Communications Security.
Computer Communications, 2006

Towards self-authenticable smart cards.
Computer Communications, 2006

On the implementation of security policies with adaptative encryption.
Computer Communications, 2006

Payment in a Kiosk Centric Model with Mobile and Low Computational Power Devices.
Proceedings of the Computational Science and Its Applications, 2006

2005
The strict avalanche criterion randomness test.
Mathematics and Computers in Simulation, 2005

Marketing on Internet Communications Security for Online Bank Transactions.
Proceedings of the Computational Science and Its Applications, 2005

A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol.
Proceedings of the Computational Science and Its Applications, 2005

2004
Beware of the Security Software.
Information Systems Security, 2004

Low computational cost integrity for block ciphers.
Future Generation Comp. Syst., 2004

Secure Communications in Multi-Agent Systems Protecting KQML.
Proceedings of the Security In Information Systems, 2004

Validating the Use of BAN LOGIC.
Proceedings of the Computational Science and Its Applications, 2004

Security Issues in Network File Systems.
Proceedings of the Computational Science and Its Applications, 2004

The SAC Test: A New Randomness Test, with Some Applications to PRNG Analysis.
Proceedings of the Computational Science and Its Applications, 2004

2003
Protection of Multiagent Systems.
Proceedings of the Computational Science and Its Applications, 2003

On MARS's s-boxes Strength against Linear Cryptanalysis.
Proceedings of the Computational Science and Its Applications, 2003

2002
Genetic Cryptoanalysis of Two Rounds TEA.
Proceedings of the Computational Science - ICCS 2002, 2002

2001
Fast and Secure Recommendations Protocols among Members of a Community of Agents.
Electr. Notes Theor. Comput. Sci., 2001

Genetic Algorithms Can be Used to Obtain Good Linear Congruential Generators.
Cryptologia, 2001

Search Engines as a Security Threat.
IEEE Computer, 2001

Search Engines as a security thread.
Proceedings of WebNet 2001, 2001

Project WebOracle: Developing an advanced web server security assesment tool.
Proceedings of WebNet 2001, 2001

Robust New Method in Frequency Domain Watermarking.
Proceedings of the Information Security, 4th International Conference, 2001

Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers.
Proceedings of the Cryptography and Coding, 2001

2000
New Phase 1 Exchange Mode for IKE framework.
Operating Systems Review, 2000

1999
IPR techniques applied to a multimedia environment in the HYPERMEDIA project.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

1997
Modelo de Seguridad en Bases de Datos: Autenticación Mediante Contraseñas de Un Solo Uso y Cifrado Mediante un Sistema Pseudo-asimétrico.
Proceedings of the II Jornadas de Investigación y Docencia en Bases de Datos, 1997


  Loading...