Isaac Agudo

Orcid: 0000-0002-2911-2300

According to our database1, Isaac Agudo authored at least 46 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Private set intersection: A systematic literature review.
Comput. Sci. Rev., August, 2023

An empirical evaluation of BLE for ITS scenarios.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Integration of MPC into Besu through an extended private transaction model.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

2022
Learning Multi-Party Adversarial Encryption and Its Application to Secret Sharing.
IEEE Access, 2022

Real-time Crowd Counting based on Wearable Ephemeral IDs.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

2021
A Blockchain Approach for Decentralized V2X (D-V2X).
IEEE Trans. Veh. Technol., 2021

2019
Escrowed decryption protocols for lawful interception of encrypted data.
IET Inf. Secur., 2019

2017
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation.
J. Netw. Comput. Appl., 2017

The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

2016
On the application of generic CCA-secure transformations to proxy re-encryption.
Secur. Commun. Networks, 2016

Attacks to a proxy-mediated key agreement protocol based on symmetric encryption.
IACR Cryptol. ePrint Arch., 2016

A Parametric Family of Attack Models for Proxy Re-Encryption.
IACR Cryptol. ePrint Arch., 2016

2015
A Technique for Enhanced Provision of Appropriate Access to Evidence Across Service Provision Chains.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

Is the world ready or do we need more tools for programming related teamwork?
Proceedings of the 15th Koli Calling Conference on Computing Education Research, 2015

LockPic: Privacy Preserving Photo Sharing in Social Networks.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
BlindIdM: A privacy-preserving approach for identity management as a service.
Int. J. Inf. Sec., 2014

Building trust from context similarity measures.
Comput. Stand. Interfaces, 2014

Delegated Access for Hadoop Clusters in the Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Privacy-Preserving Identity Management as a Service.
Proceedings of the Accountability and Security in the Cloud, 2014

2013
A privacy-aware continuous authentication scheme for proximity-based access control.
Comput. Secur., 2013

2012
Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber Identity.
Proceedings of the ISSE 2012, 2012

A Task Ordering Approach for Automatic Trust Establishment.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
A methodology for security assurance-driven system development.
Requir. Eng., 2011

Cryptography Goes to the Cloud.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

OSAMI Commons - An open dynamic services platform for ambient intelligence.
Proceedings of the IEEE 16th Conference on Emerging Technologies & Factory Automation, 2011

Managing Incidents in Smart Grids à la Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
Trust management systems for wireless sensor networks: Best practices.
Comput. Commun., 2010

A scale based trust model for multi-context environments.
Comput. Math. Appl., 2010

2009
Concurrent access control for multi-user and multi-processor systems based on trust relationships.
Concurr. Comput. Pract. Exp., 2009

Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems.
Proceedings of the Trust, 2009

A Multidimensional Reputation Scheme for Identity Federations.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

Security assurance during the software development cycle.
Proceedings of the 2009 International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2009

2008
Enabling Attribute Delegation in Ubiquitous Environments.
Mob. Networks Appl., 2008

An Evolutionary Trust and Distrust Model.
Proceedings of the 4th International Workshop on Security and Trust Management, 2008

A Model for Trust Metrics Analysis.
Proceedings of the Trust, 2008

Secure Real-Time Integration of Services in a OSGi Distributed Environment.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Delegating Privileges over Finite Resources: A Quota Based Delegation Approach.
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008

2007
On the deployment of a real scalable delegation service.
Inf. Secur. Tech. Rep., 2007

Implementation aspects of a delegation system.
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007

Attribute delegation in ubiquitous environments.
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007

2006
Attribute Delegation Based on Ontologies and Context Information.
Proceedings of the Communications and Multimedia Security, 2006

Graphical Representation of Authorization Policies for Weighted Credentials.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
A Representation Model of Trust Relationships with Delegation Extensions.
Proceedings of the Trust Management, Third International Conference, 2005

2004
Specification and formal verification of security requirements.
Proceedings of the 5th International Conference on Computer Systems and Technologies, 2004


  Loading...