Jose Antonio Onieva

Orcid: 0000-0002-7280-090X

Affiliations:
  • University of Malaga, Computer Science Department, Spain


According to our database1, Jose Antonio Onieva authored at least 23 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Malware similarity and a new fuzzy hash: Compound Code Block Hash (CCBHash).
Comput. Secur., 2024

2022
Personal IoT Privacy Control at the Edge.
IEEE Secur. Priv., 2022

2019
Immune System for the Internet of Things Using Edge Technologies.
IEEE Internet Things J., 2019

Edge-Assisted Vehicular Networks Security.
IEEE Internet Things J., 2019

2017
From SMOG to Fog: A security perspective.
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017

2013
Covert communications through network configuration messages.
Comput. Secur., 2013

2012
HIDE_DHCP: Covert Communications through Network Configuration Messages.
Proceedings of the Information Security and Privacy Research, 2012

2010
Certified electronic mail: Properties revisited.
Comput. Secur., 2010

2009
Secure Multi-Party Non-Repudiation Protocols and Applications
Advances in Information Security 43, Springer, ISBN: 978-0-387-75629-5, 2009

2008
Multiparty nonrepudiation: A survey.
ACM Comput. Surv., 2008

2007
Integration of non-repudiation services in mobile DRM scenarios.
Telecommun. Syst., 2007

Estimation of TTP Features in Non-repudiation Service.
Proceedings of the Computational Science and Its Applications, 2007

2006
A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

2005
Optimized multi-party certified email protocols.
Inf. Manag. Comput. Security, 2005

Attacking an Asynchronous Multi-party Contract Signing Protocol.
Proceedings of the Progress in Cryptology, 2005

On Secure Profiling.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

2004
Agent-mediated non-repudiation protocols.
Electron. Commer. Res. Appl., 2004

Non-repudiation protocols for multiple entities.
Comput. Commun., 2004

Analysis of a Free Roaming Agent Result-Truncation Defense Scheme.
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004

Timeout Estimation Using a Simulation Model for Non-repudiation Protocols.
Proceedings of the Computational Science and Its Applications, 2004

2003
Intermediary Non-repudiation Protocols.
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003

A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Practical Service Charge for P2P Content Distribution.
Proceedings of the Information and Communications Security, 5th International Conference, 2003


  Loading...