QUT ePrints

Browse By Person: Gonzalez-Nieto, Juan

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Jump to: 2002 | 2003 | 2004 | 2005 | 2006
Number of items: 10.

2002

Gonzalez-Nieto, Juan Manuel (2002) Key recovery systems. PhD thesis, Queensland University of Technology.

2003

Boyd, Colin, Gonzalez-Nieto, Juan, & Tin, Yiu (2003) Provably Secure Key Exchange: An Engineering Approach. In Johnson, C, Montague, P, & Steketee, C (Eds.) ACSW Frontiers 2003, February 2003, Adelaide, South Australia.
Number of full-text downloads 45

Boyd, Colin, Gonzalez-Nieto, Juan, & Tin, Yiu (2003) Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. In Safavi-Naini, R & Seberry, J (Eds.) Information Security and Privacy - ACISP 2003 (LNCS:2727), 9-111 July, 2003, Wollongong, New South Wales.
Number of full-text downloads 16
Number of citations in Scopus 6
Number of citations in Web of Science® 3

2004

Boyd, Colin, Gonzalez-Nieto, Juan, Tin, Yiu, & Vasanta, Hari (2004) Protocols with Security Proofs for Mobile Applications. In Wang, H, Pieprzyk, J, & Varadharajan, V (Eds.) Information Security and Privacy - ACISP 2004 (LNCS 3108), 13-15 July 2004, Sydney, New South Wales.
Number of full-text downloads 62
Number of citations in Scopus 3
Number of citations in Web of Science® 5

Boyd, Colin, Gonzalez-Nieto, Juan, Looi, Mark, Tin, Yiu, & Vasanta, Hari (2004) A Secure Framework for User Privacy in Heterogenous Location Networks. In Karmouch, A, Korba, L, & Madeira, E (Eds.) Mobility Aware Technologies and Applications, 20-22 October 2004, Florianopolis, Brazil.
Number of full-text downloads 50

Boyd, Colin, Gonzalez-Nieto, Juan, & Hitchcock, Yvonne (2004) Tripartite Key Exchange in the Cannetti-Krawczyk Proof Model. In Canteaut, A & Viswanathan, K (Eds.) Progress in Cryptology - INDOCRYPT 2004. Fifth International Conference on Cryptology in India., 20-22 December 2004, Chennai, India.
Number of full-text downloads 70

2005

Boyd, Colin, Du, Rong, Foo, Ernest, & Gonzalez-Nieto, Juan (2005) Designing Secure E-Tendering Systems. In Katsikas, S, Lopez, J, & Pernul, G (Eds.) Trust, Privacy, and Security in Digital Business: Proceedings of the Second International Conference, Trustbus 2005, 22 August - 26 August 2005, Denmark, Copenhagen.
Number of citations in Scopus 5
Number of citations in Web of Science® 2

Boyd, Colin, Gonzalez-Nieto, Juan, & Hitchcock, Yvonne (2005) Modular Proofs for Key Exchange: Rigorous Optimizations n the Canetti-Krawczyk Model. Applicable Algebra in Engineering, Communications and Computing, 2005(1), pp. 1-34.
Number of full-text downloads 43
Number of citations in Scopus 1

Dawson, Edward, Gonzalez-Nieto, Juan, Lopez, Javier, Okamoto, Eiji, & Peng, Kun (2005) A Novel Method to Maintain Privacy in Mobile Agent Applications. In Desmedt, Y, Wang, H, Mu, Y, & Li, Y (Eds.) Cryptology and Network Security: 4th International Conference, CANS 2005, 14-16 December, 2005, Xiamen, China.
Number of full-text downloads 36
Number of citations in Scopus 3
Number of citations in Web of Science® 2

2006

Boyd, Colin, Gonzalez-Nieto, Juan, & Smith, Jason (2006) Modelling Denial of Service Attacks on JFK with Meadow's Cost-Based Framework. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Australian Computer Society Inc., Australia, Tasmania, Hobart, pp. 125-134.
Number of citations in Scopus 4

This list was generated on Sat Oct 18 16:03:08 2014 EST.