Isaac Agudo
Orcid: 0000-0002-2911-2300
According to our database1,
Isaac Agudo
authored at least 46 papers
between 2004 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Comput. Sci. Rev., August, 2023
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
2022
IEEE Access, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
2021
2019
IET Inf. Secur., 2019
2017
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation.
J. Netw. Comput. Appl., 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
2016
Secur. Commun. Networks, 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
2015
A Technique for Enhanced Provision of Appropriate Access to Evidence Across Service Provision Chains.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015
Proceedings of the 15th Koli Calling Conference on Computing Education Research, 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Int. J. Inf. Sec., 2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
Proceedings of the Accountability and Security in the Cloud, 2014
2013
Comput. Secur., 2013
2012
Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber Identity.
Proceedings of the ISSE 2012, 2012
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012
Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
2011
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011
Proceedings of the IEEE 16th Conference on Emerging Technologies & Factory Automation, 2011
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
2010
Comput. Commun., 2010
2009
Concurrent access control for multi-user and multi-processor systems based on trust relationships.
Concurr. Comput. Pract. Exp., 2009
Proceedings of the Trust, 2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
Proceedings of the 2009 International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2009
2008
Proceedings of the 4th International Workshop on Security and Trust Management, 2008
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008
2007
Inf. Secur. Tech. Rep., 2007
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007
2006
Proceedings of the Communications and Multimedia Security, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
Proceedings of the Trust Management, Third International Conference, 2005
2004
Proceedings of the 5th International Conference on Computer Systems and Technologies, 2004