Juan Manuel González Nieto

Affiliations:
  • Queensland University of Technology, Brisbane, Australia


According to our database1, Juan Manuel González Nieto authored at least 89 papers between 2000 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2015
CHURNs: Freshness Assurance for Humans.
Comput. J., 2015

2014
Enhanced GeoProof: improved geographic assurance for data in the cloud.
Int. J. Inf. Sec., 2014

Automated Proofs for Computational Indistinguishability.
Comput. J., 2014

Formalising Human Recognition: a Fundamental Building Block for Security Proofs.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

2013
Predicate encryption for multi-inner-products.
Secur. Commun. Networks, 2013

"Who decides?": security and privacy in the wild.
Proceedings of the Augmentation, Application, Innovation, Collaboration, OzCHI '13, Adelaide, Australia - November 25, 2013

2012
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks.
Secur. Commun. Networks, 2012

A taxonomy of secure data aggregation in wireless sensor networks.
Int. J. Commun. Networks Distributed Syst., 2012

Fully Private Revocable Predicate Encryption.
IACR Cryptol. ePrint Arch., 2012

Forward-Secure Hierarchical Predicate Encryption.
IACR Cryptol. ePrint Arch., 2012

Publicly Verifiable Ciphertexts.
IACR Cryptol. ePrint Arch., 2012

A Framework for Security Analysis of Key Derivation Functions.
Proceedings of the Information Security Practice and Experience, 2012

GeoProof: Proofs of Geographic Location for Cloud Computing Environment.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

A State-Aware RFID Privacy Model with Reader Corruption.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Practical client puzzles in the standard model.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Towards a Secure Human-and-Computer Mutual Authentication Protocol.
Proceedings of the Tenth Australasian Information Security Conference, 2012

Improving the Efficiency of RFID Authentication with Pre-Computation.
Proceedings of the Tenth Australasian Information Security Conference, 2012

Effort-Release Public-Key Encryption from Cryptographic Puzzles.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Modeling key compromise impersonation attacks on group key exchange protocols.
ACM Trans. Inf. Syst. Secur., 2011

Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection.
IACR Cryptol. ePrint Arch., 2011

Ceremony Analysis: Strengths and Weaknesses.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Tensions in Developing a Secure Collective Information Practice - The Case of Agile Ridesharing.
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011

Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

On Forward Secrecy in One-Round Key Exchange.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

Automated Proofs for Diffie-Hellman-Based Key Exchanges.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

An integrated approach to cryptographic mitigation of denial-of-service attacks.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols.
IACR Cryptol. ePrint Arch., 2010

Attribute-based Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2010

One Round Group Key Exchange with Forward Security in the Standard Model.
IACR Cryptol. ePrint Arch., 2010

Delaying Mismatched Field Multiplications in Pairing Computations.
IACR Cryptol. ePrint Arch., 2010

Avoiding Full Extension Field Arithmetic in Pairing Computations.
IACR Cryptol. ePrint Arch., 2010

Delegation in Predicate Encryption Supporting Disjunctive Queries.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Automating Computational Proofs for Public-Key-Based Key Exchange.
Proceedings of the Provable Security - 4th International Conference, 2010

How HCI design influences web security decisions.
Proceedings of the 22nd Australasian Computer-Human Interaction Conference, 2010

Certificateless Key Agreement in the Standard Model.
Proceedings of the 8th Australasian Information Security Conference 2010, 2010

Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
One-round key exchange in the standard model.
Int. J. Appl. Cryptogr., 2009

Efficient Certificateless KEM in the Standard Model.
IACR Cryptol. ePrint Arch., 2009

Strongly Secure Certificateless Key Agreement.
IACR Cryptol. ePrint Arch., 2009

Generic One Round Group Key Exchange in the Standard Model.
IACR Cryptol. ePrint Arch., 2009

On the Connection between Signcryption and One-pass Key Establishment.
IACR Cryptol. ePrint Arch., 2009

Universally Composable Contributory Group Key Exchange.
IACR Cryptol. ePrint Arch., 2009

Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols.
IACR Cryptol. ePrint Arch., 2009

Faster Pairings on Special Weierstrass Curves.
IACR Cryptol. ePrint Arch., 2009

How to Extract and Expand Randomness: A Summary and Explanation of Existing Results.
IACR Cryptol. ePrint Arch., 2009

A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA.
Proceedings of the Sensor Systems and Software, 2009

Strong Designated Verifier Signature in a Multi-user Setting.
Proceedings of the Seventh Australasian Information Security Conference, 2009

2008
Efficient One-round Key Exchange in the Standard Model.
IACR Cryptol. ePrint Arch., 2008

RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008

ID-based One-pass Authenticated Key Establishment.
Proceedings of the Sixth Australasian Information Security Conference, 2008

Secure Data Aggregation in Wireless Sensor Network: a survey.
Proceedings of the Sixth Australasian Information Security Conference, 2008

2007
Denial-of-service resistance in key establishment.
Int. J. Wirel. Mob. Comput., 2007

Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP).
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Verifier-Key-Flexible Universal Designated-Verifier Signatures.
Proceedings of the Cryptography and Coding, 2007

Low-Cost and Strong-Security RFID Authentication Protocol.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Access Control in Federated Databases: How Legal Issues Shape Security.
Proceedings of the Electronic Government, 6th International Conference, 2007

Detecting relay attacks with timing-based protocols.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Toward Non-parallelizable Client Puzzles.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets.
Proceedings of the Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference (ACSC2007). Ballarat, Victoria, Australia, January 30, 2007

2006
Towards Secure and Legal E-Tendering.
J. Inf. Technol. Constr., 2006

Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model.
Appl. Algebra Eng. Commun. Comput., 2006

Security-Mediated Certificateless Cryptography.
Proceedings of the Public Key Cryptography, 2006

Examining the DoS Resistance of HIP.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions.
Proceedings of the Progress in Cryptology, 2006

Klein Bottle Routing: An Alternative to Onion Routing and Mix Network.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

Modelling denial of service attacks on JFK with Meadows's cost-based framework.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

SKMA: a key management architecture for SCADA systems.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

2005
3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function.
IACR Cryptol. ePrint Arch., 2005

Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1.
IACR Cryptol. ePrint Arch., 2005

A Public Key Cryptosystem Based On A Subgroup Membership Problem.
Des. Codes Cryptogr., 2005

Designing Secure E-Tendering Systems.
Proceedings of the Trust, 2005

A Novel Method to Maintain Privacy in Mobile Agent Applications.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

GBD Threshold Cryptography with an Application to RSA Key Recovery.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
A Secure Framework for User Privacy in Heterogeneous Location Networks.
Proceedings of the Mobility Aware Technologies and Applications, 2004

Tripartite Key Exchange in the Canetti-Krawczyk Proof Model.
Proceedings of the Progress in Cryptology, 2004

Denial of Service Issues in Voice Over IP Networks.
Proceedings of the ICETE 2004, 2004

Implementation of the GBD Cryptosystem.
Proceedings of the Cryptographic Algorithms and their Uses, 2004

Protocols with Security Proofs for Mobile Applications.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Round-Optimal Contributory Conference Key Agreement.
Proceedings of the Public Key Cryptography, 2003

A Password-Based Authenticator: Security Proof and Applications.
Proceedings of the Progress in Cryptology, 2003

Privacy and Trusted Computing.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Provably Secure Key Exchange: An Engineering Approach.
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003

Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Key recovery for the commercial environment.
Int. J. Inf. Sec., 2002

2000
Key Recovery in Third Generation Wireless Communication Systems.
Proceedings of the Public Key Cryptography, 2000

Key Recovery System for the Commercial Environment.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000


  Loading...