Juan Manuel González Nieto
Affiliations:- Queensland University of Technology, Brisbane, Australia
According to our database1,
Juan Manuel González Nieto
authored at least 90 papers
between 2000 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
On csauthors.net:
Bibliography
2015
2014
Int. J. Inf. Sec., 2014
Proceedings of the Twelfth Australasian Information Security Conference, 2014
2013
Proceedings of the Augmentation, Application, Innovation, Collaboration, OzCHI '13, Adelaide, Australia - November 25, 2013
2012
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks.
Secur. Commun. Networks, 2012
Int. J. Commun. Networks Distributed Syst., 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the Tenth Australasian Information Security Conference, 2012
Improving the Efficiency of RFID Authentication with Pre-Computation.
Proceedings of the Tenth Australasian Information Security Conference, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
Proceedings of the Australasian Conference on Information Systems, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Tensions in Developing a Secure Collective Information Practice - The Case of Agile Ridesharing.
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011
Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Provable Security - 4th International Conference, 2010
Proceedings of the 22nd Australasian Computer-Human Interaction Conference, 2010
Proceedings of the 8th Australasian Information Security Conference 2010, 2010
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA.
Proceedings of the Sensor Systems and Software, 2009
Proceedings of the Seventh Australasian Information Security Conference, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008
Proceedings of the Sixth Australasian Information Security Conference, 2008
Proceedings of the Sixth Australasian Information Security Conference, 2008
2007
Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP).
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
Proceedings of the Cryptography and Coding, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
Proceedings of the Electronic Government, 6th International Conference, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets.
Proceedings of the Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference (ACSC2007). Ballarat, Victoria, Australia, January 30, 2007
2006
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model.
Appl. Algebra Eng. Commun. Comput., 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
2005
3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function.
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Des. Codes Cryptogr., 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Proceedings of the Mobility Aware Technologies and Applications, 2004
Proceedings of the Progress in Cryptology, 2004
Denial of Service Issues in Voice Over IP Networks.
Proceedings of the ICETE 2004, 2004
Implementation of the GBD Cryptosystem.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Proceedings of the Public Key Cryptography, 2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000