Óscar García-Morchón

According to our database1, Óscar García-Morchón authored at least 40 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2).
RFC, May, 2023

2019
Internet of Things (IoT) Security: State of the Art and Challenges.
RFC, April, 2019

Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution.
IACR Cryptol. ePrint Arch., 2019

Round5: Compact and Fast Post-Quantum Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2019

2018
Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M.
IACR Cryptol. ePrint Arch., 2018

Round5: Compact and Fast Post-Quantum Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2018

2017
Improved key-reconciliation method.
IACR Cryptol. ePrint Arch., 2017

spKEX: An optimized lattice-based key exchange.
IACR Cryptol. ePrint Arch., 2017

Round2: KEM and PKE based on GLWR.
IACR Cryptol. ePrint Arch., 2017

2016
Attacks and parameter choices in HIMMO.
IACR Cryptol. ePrint Arch., 2016

Efficient quantum-resistant trust Infrastructure based on HIMMO.
IACR Cryptol. ePrint Arch., 2016

2015
A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO.
IACR Cryptol. ePrint Arch., 2015

Results on polynomial interpolation with mixed modular operations and unknown moduli.
IACR Cryptol. ePrint Arch., 2015

HIMMO: a collusion-resistant identity-based scheme for symmetric key generation.
ACM Commun. Comput. Algebra, 2015

DTLS-HIMMO: Achieving DTLS Certificate Security with Symmetric Key Overhead.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Privacy in the Internet of Things: threats and challenges.
Secur. Commun. Networks, 2014

HIMMO - A Lightweight, Fully Collusion Resistant Key Pre-Distribution Scheme.
IACR Cryptol. ePrint Arch., 2014

DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS.
IACR Cryptol. ePrint Arch., 2014

Interpolation and Approximation of Polynomials in Finite Fields over a Short Interval from Noisy Values.
Exp. Math., 2014

The MMO problem.
CoRR, 2014

The <i>MMO</i> problem.
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2014

2013
Cooperative security in distributed networks.
Comput. Commun., 2013

Securing the IP-based internet of things with HIP and DTLS.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

HADA: Hybrid Access Decision Architecture for Building Automation and Control Systems.
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013

Intelligent lighting control using sensor networks.
Proceedings of 10th IEEE International Conference on Networking, Sensing and Control, 2013

HIP Security Architecture for the IP-Based Internet of Things.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
End-to-End Transport Security in the IP-Based Internet of Things.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

2011
Security for pervasive healthcare.
PhD thesis, 2011

Security Challenges in the IP-based Internet of Things.
Wirel. Pers. Commun., 2011

Sensor network security for pervasive e-health.
Secur. Commun. Networks, 2011

2010
Modular context-aware access control for medical sensor networks.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Brief announcement: distributed trust management and revocation.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Efficient and context-aware access control for pervasive medical sensor networks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

2009
Brief announcement: lightweight key agreement and digital certificates for wireless sensor networks.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

Security for pervasive healthcare.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

Security for pervasive medical sensor networks.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

2008
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

2007
Distributed Node Revocation based on Cooperative Security.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Cooperative security in distributed sensor networks.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

2006
Resource-Efficient Security for Medical Body Sensor Networks.
Proceedings of the 2006 International Workshop on Wearable and Implantable Body Sensor Networks (BSN 2006), 2006


  Loading...