QUT ePrints

Browse By Person: Gonzalez Nieto, Juan

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 70.

Journal Article

Gonzalez Nieto, Juan, Manulis, Mark, Poettering, Bertram, Rangasamy, Jothi, & Stebila, Douglas (2013) Publicly verifiable ciphertexts. Journal of Computer Security, 21(5), pp. 749-778.
Number of full-text downloads 37

Sun, Dongdong, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2013) Predicate encryption for multi-inner-products. Security and Communications Networks, 6(3), pp. 325-339.

Rangasamy, Jothi, Stebila, Douglas, Kuppusamy, Lakshmi, Boyd, Colin, & Gonzalez Nieto, Juan M. (2012) Efficient modular exponentiation-based puzzles for denial-of-service protection. Lecture Notes in Computer Science, 7259, pp. 319-331.

Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, Gonzalez Nieto, Juan M., & Kuppusamy, Lakshmi (2012) Effort-release public-key encryption from cryptographic puzzles. Lecture Notes in Computer Science, 7372, pp. 194-207.

Gonzalez Nieto, Juan M., Manulis, Mark, & Sun, Dongdong (2012) Fully private revocable predicate encryption. Lecture Notes in Computer Science, 7372/2012, pp. 350-363.
Number of citations in Scopus 2

Chuah, Chai Wen, Dawson, Edward, Gonzalez Nieto, Juan Manuel, & Simpson, Leonie (2012) A framework for security analysis of key derivation functions. Lecture Notes in Computer Science, 7232, pp. 199-216.
Number of full-text downloads 40

Lee, Kaleb, Gonzalez Nieto, Juan M., & Boyd, Colin (2012) A state-aware RFID privacy model with reader corruption. Lecture Notes in Computer Science, 7672, pp. 324-338.

Gorantla, Choudary, Boyd, Colin, Gonzalez Nieto, Juan M., & Manulis, Mark (2011) Modeling key compromise impersonation attacks on group key exchange protocols. ACM Transactions on Information and System Security, 14(4), 28:1-28:24.
Number of citations in Web of Science® 2

Lippold, Georg, Boyd, Colin, & Gonzalez Nieto, Juan M. (2009) Strongly Secure Certificateless Key Agreement. Lecture Notes in Computer Science (LNCS), 5671, pp. 206-230.
Number of full-text downloads 429
Number of citations in Scopus 16
Number of citations in Web of Science® 14

Boyd, Colin, Cliff, Yvonne, Gonzalez Nieto, Juan M., & Paterson, Kenneth (2009) Efficient one-round key exchange in the efficient one-round key exchange in the standard model. International Journal of Applied Cryptography, 1, pp. 181-199.
Number of full-text downloads 106
Number of citations in Scopus 18

Costello, Craig, Hisil, Huseyin, Boyd, Colin, Gonzalez Nieto, Juan Manuel, & Wong, Kenneth Koon-Ho (2009) Faster pairings on special Weierstrass curves. Lecture Notes in Computer Science, LNCS 5, pp. 89-101.
Number of full-text downloads 106
Number of citations in Scopus 12
Number of citations in Web of Science® 12

Smith, Jason, Tritilanunt, Suratose, Boyd, Colin A., Gonzalez Nieto, Juan M., & Foo, Ernest (2007) Denial-of-service resistance in key establishment. International Journal of Wireless and Mobile Computing, 2(1), pp. 59-71.
Number of full-text downloads 189
Number of citations in Scopus 5

Boyd, Colin, Gonzalez Nieto, Juan, Ha, Jae-Cheol, Kim, Hwan-Koo, Moon, Sang-Jae, & Park, Jea-Hoon (2007) HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed FRID System. Lecture Notes in Computer Science, 4809, pp. 557-567.

Boyd, Colin, Gonzalez Nieto, Juan, Ha, Jae-Cheol, & Moon, Sang-Jae (2007) Low Cost and Strong-Security RFID Authentication Protocol. Lecture Notes in Computer Science, 4809, pp. 795-807.
Number of citations in Scopus 10
Number of citations in Web of Science® 13

Gorantla, M. Choudary, Boyd, Colin A., & Gonzalez Nieto, Juan Manuel (2007) On the Connection Between Signcryption and One-pass Key Establishment. Cryptography and Coding (LNCS), 4887, pp. 277-301.
Number of full-text downloads 141
Number of citations in Scopus 3
Number of citations in Web of Science® 4

Tritilanunt, Suratose, Boyd, Colin A., Foo, Ernest, & Gonzalez Nieto, Juan M. (2007) Toward Non-parallelizable Client Puzzles. Cryptology and Network Security (LNCS), 4856, pp. 247-264.
Number of full-text downloads 604
Number of citations in Scopus 6
Number of citations in Web of Science® 9

Boyd, Colin, Gonzalez Nieto, Juan, Okamoto, Eiji, Okamoto, Takeshi, & Tso, Raylin (2007) Verifier-Key-Flexible Universal Designated-Verifier Signatures. Lecture Notes in Computer Science, 4887, pp. 403-421.
Number of citations in Web of Science® 2

Betts, Martin, Black, Peter, Christensen, Sharon A., Dawson, Edward, Du, Rong, Duncan, William, et al. (2006) Towards secure and legal e-tendering. Journal of Information Technology in Construction, 11, pp. 89-102.
Number of full-text downloads 1,113
Number of citations in Scopus 6

Reid, Jason F., Gonzalez Neito, Juan M., Tang, Tee, & Senadji, Bouchra (2006) Detecting Relay Attacks with Timing Based Protocols. .
Number of full-text downloads 1,946

Chow, Sherman, Boyd, Colin A., & Gonzalez Nieto, Juan M. (2006) Security-Mediated Certificateless Cryptography. Public Key Cryptology- PKC 2006 (LNCS), 3958, pp. 508-524.
Number of full-text downloads 117
Number of citations in Scopus 17
Number of citations in Web of Science® 18

Gonzalez Nieto, Juan M., Boyd, Colin A., & Dawson, Edward P. (2005) A Public Key Cryptosystem Based On A Subgroup Membership Problem. Designs, Codes and Cryptography, 36(3), pp. 301-316.
Number of citations in Scopus 9
Number of citations in Web of Science® 2

Steketee, Chris, Brown, Jaimee, Gonzalez Nieto, Juan M., & Montague, Paul (2005) GBD threshold cryptography with an application to RSA key recovery. Lecture Notes in Computer Science, 3574, pp. 394-405.
Number of full-text downloads 214

Boyd, Colin, Clark, Andrew, Dawson, Edward, Gonzalez Nieto, Juan, & Viswanathan, Kapaleeswaran (2002) Key Recovery for the Commercial Environment. International Journal of Information Security, 1(3), pp. 161-174.

Conference Paper

Gonzalez Nieto, Juan M., Manulis, Mark, Poettering, Bertram, Rangasamy, Jothi, & Stebila, Douglas (2012) Publicly verifiable ciphertexts. In Visconti, Ivan (Ed.) Proceedings of the 8th Conference on Security and Cryptography for Networks, Springer, Italy, pp. 393-410. (In Press)
Number of full-text downloads 137
Number of citations in Scopus 3

Gonzalez Nieto, Juan M., Manulis, Mark, & Sun, Dongdong (2012) Forward-secure hierarchical predicate encryption. In Abdalla, Michel & Lange, Tanja (Eds.) Proceedings of the 5th International Conference on Pairing-Based Cryptography, Springer, Cologne, Germany.
Number of full-text downloads 69

Albeshri, Aiiad Ahmad, Boyd, Colin, & Gonzalez Nieto, Juan M. (2012) Geoproof : proofs of geographic location for cloud computing environment. In Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops 2012, IEEE, Macau, China, pp. 506-514.
Number of full-text downloads 287
Number of citations in Scopus 2

Lee, Kaleb, Gonzalez Nieto, Juan M., & Boyd, Colin (2012) Improving the efficiency of RFID authentication with pre-computation. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012),, Australian Computer Society Inc, Melbourne, Vic., pp. 91-100.

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Brereton, Margot (2012) Towards a secure human-and-computer mutual authentication protocol. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Australian Computer Society Inc, Melbourne, Vic., pp. 39-46.
Number of full-text downloads 70

Alseadoon, Ibrahim, Chan, Taizan, Foo, Ernest, & Gonzalez Nieto, Juan M. (2012) Who is more susceptible to phishing emails? : a Saudi Arabian study. In Lamp, John (Ed.) Proceedings of the 23rd Australasian Conference on Information Systems 2012, Deakin University, Deakin University, Geelong, Victoria.

Albeshri, Aiiad Ahmad, Boyd, Colin, & Gonzalez Nieto, Juan M. (2012) A security architecture for cloud storage combining proofs of retrievability and fairness. In Zimmermann, Wolf, Lee, Yong Woo, & Demchenko, Yuri (Eds.) Proceedings of Cloud Computing 2012 : The Third International Conference on Cloud Computing, GRIDS and Virtualization, IARIA, Hotel Novotel Cap, Nice, pp. 30-35.

Boyd, Colin & Gonzalez Nieto, Juan M. (2011) On forward secrecy in one-round key exchange. In Lecture Notes in Computer Science: Cryptography and Coding, Springer Berlin / Heidelberg, Oxford, UK, pp. 451-468.
Number of full-text downloads 166
Number of citations in Scopus 4

Radke, Kenneth, Brereton, Margot, Mirisaee, Seyed Hadi, Ghelawat, Sunil, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Tensions in developing a secure collective information practice : the case of Agile Ridesharing. In 13th IFIP TC13 Conference on Human-Computer Interaction (INTERACT 2011), 5-9 September 2011, Lisbon.
Number of full-text downloads 296

Ngo, Long, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Automated proofs for Diffie–Hellman–based key exchanges. In Backes, Michael & Zdancewic, Steve (Eds.) 2011 IEEE 24th Computer Security Foundations Symposium (CSF 2011), IEEE, Abbaye des Vaux-de-Cernay, Cernay-la-Ville, pp. 51-65.
Number of full-text downloads 143
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Brereton, Margot (2011) Ceremony analysis : strengths and weaknesses. In Future Challenges in Security and Privacy for Academia and Industry : 26th IFIP TC 11 International Information Security Conference (SEC 2011) Proceedings, Springer, Lucerne University of Applied Sciences and Arts, Luzern, pp. 104-115.
Number of full-text downloads 113

Stebila, Douglas, Kuppusamy, Lakshmi, Rangasamy, Jothi, Boyd, Colin, & Gonzalez Nieto, Juan (2011) Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. In Kiayias, Aggelos (Ed.) Topics in Cryptology – CT-RSA 2011, Springer, San Francisco, California, pp. 284-301.
Number of full-text downloads 215
Number of citations in Scopus 7
Number of citations in Web of Science® 1

Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) An integrated approach to cryptographic mitigation of denial-of-service attacks. In Sandhu, Ravi & Wong, Duncan S. (Eds.) Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011, ACM, HKU SPACE Admiralty Learning Center, Hong Kong, pp. 114-123.
Number of full-text downloads 194
Number of citations in Scopus 5

Radke, Kenneth, Boyd, Colin, Margot, Brereton, & Gonzalez Nieto, Juan M. (2010) How HCI design influences web security decisions. In Proceedings of OZCHI 2010 : Design – Interaction – Participation, CHISIG, Queensland University of Technology, Brisbane, Queensland.
Number of full-text downloads 35
Number of citations in Scopus 1

Sun, Dongdong, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2010) Delegation in predicate encryption supporting disjunctive queries. In Rannenberg, Kai & Varadharajan, Vijay (Eds.) IFIP Advances in Information and Communication Technology : Proceedings of 25th IFIP TC-11 International Information Security Conference, SEC 2010, Springer, Brisbane, pp. 229-240.
Number of full-text downloads 209
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Gorantla, M. Choudary, Boyd, Colin, & Gonzalez Nieto, Juan M. (2010) Attribute-based authenticated key exchange. In Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney.
Number of full-text downloads 321
Number of citations in Scopus 7
Number of citations in Web of Science® 4

Costello, Craig, Boyd, Colin, Gonzalez Nieto, Juan M., & Wong, Kenneth Koon-Ho (2010) Delaying mismatched field multiplications in pairing computations. In Arithmetic of Finite Fields : Third International Workshop, WAIFI 2010, Proceedings, Springer Verlag, Istanbul, Turkey, pp. 196-214.
Number of full-text downloads 69

Alzaid, Hani, Park, Dong-Gook, Gonzalez Nieto, Juan M., & Foo, Ernest (2010) Mitigating sandwich attacks against a secure key management scheme in wireless sensor networks for PCS/SCADA. In Proceedings of The 24th International Conference on Advanced Information Networking and Applications, IEEE, Perth, Western Australia. (In Press)
Number of full-text downloads 147
Number of citations in Scopus 2

Costello, Craig, Boyd, Colin, Gonzalez Nieto, Juan M., & Wong, Kenneth Koon-Ho (2010) Avoiding full extension field arithmetic in pairing computations. In Progress in Cryptology - AFRICACRYPT 2010, Springer Verlag, Stellenbosch, South Africa, pp. 203-224.
Number of full-text downloads 62
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Lippold, Georg & Gonzalez Nieto, Juan Manuel (2010) Certificateless key agreement in the standard model. In Boyd, Colin & Susilo, Willy (Eds.) Proceedings of the 8th Australasian Information Security Conference (AISC 2010), ACS, Queensland University of Technology, Brisbane, Queensland, pp. 75-85.
Number of full-text downloads 248

Lippold, Georg, Boyd, Colin, & Gonzalez Nieto, Juan M. (2010) Efficient certificateless KEM in the standard model. In Hong, Seokhie & Lee, Donghoon (Eds.) Lecture Notes in Computer Science : Information, Security and Cryptology (ICISC 2009), Springer Berlin / Heidelberg, Korea University, Seoul, pp. 34-46.
Number of full-text downloads 156
Number of citations in Scopus 1

Gorantla, Choudary, Boyd, Colin, Gonzalez Nieto, Juan M., & Manulis, Mark (2010) Generic one round group key exchange in the standard model. In Lee, Donghoon & Hong, Seokhie (Eds.) Lecture Notes in Computer Science : Information Security and Cryptology (ICISC 2009), Springer Berlin / Heidelberg, Korean Institute of Information Security and Cryptology, Korea, pp. 1-15.
Number of full-text downloads 615
Number of citations in Scopus 5

Alzaid, Hani, Park, Dong-Gook, Gonzalez Nieto, Juan M., Boyd, Colin, & Foo, Ernest (2009) A forward and backward secure key management in wireless sensor networks for PCS/SCADA. In Proceedings of the 1st International ICST Conference on Sensor Systems and Software, 7-9 September 2009, Grand Hotel Duomo of Pisa, Pisa. (In Press)
Number of full-text downloads 481
Number of citations in Scopus 1

Cliff, Yvonne, Boyd, Colin, & Gonzalez Nieto, Juan M. (2009) How to extract and expand randomness : a summary and explanation of existing results. In Applied Cryptography and Network Security, 2-5 June 2009, Place de l'Etoile , Paris.
Number of full-text downloads 161

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Modeling key compromise impersonation attacks on group key exchange protocols. In Public Key Cryptography 2009, March 18-20, 2009, Irvine, CA, USA.
Number of citations in Scopus 10

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Universally composable contributory group key exchange. In Asian ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), 10 - 12 March 2009, Sydney.
Number of citations in Scopus 6

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Strong designated verifier signature in a multi-user setting. In Seventh Australasian Information Security Conference (AISC 2009), Jan 20-23, 2009, Wellington, New Zealand.
Number of full-text downloads 88

Boyd, Colin, Cliff, Yvonne, Gonzalez Nieto, Juan M., & Paterson, Kenneth (2008) Efficient one-round key exchange in the standard model. In Information Security and Privacy : 13th Australasian Conference (ACISP 2008), 7-9 July 2008, Wollongong, NSW.
Number of full-text downloads 42
Number of citations in Scopus 33
Number of citations in Web of Science® 22

Alzaid, Hani, Foo, Ernest, & Gonzalez Nieto, Juan (2008) RSDA: Reputation-based Secure Data Aggregation in Wireless Sensor Networks. In 1st International Workshop on Sensor Networks and Ambient Intelligence (SeNAmI 2008), December 1-4, 2008, Dunedin, New Zealand. (In Press)
Number of full-text downloads 341
Number of citations in Scopus 9
Number of citations in Web of Science® 7

Alzaid, Hani, Foo, Ernest, & Gonzalez Nieto, Juan M. (2008) Secure Data Aggregation in Wireless Sensor Networks: A survey. In Proceedings of the Sixth Australasian Information Security Conference (AISC 2008), Australian Computer Society, Wollongong, Australia, pp. 93-105.
Number of full-text downloads 3,406
Number of citations in Scopus 1

Burdon, Mark, Gonzalez Nieto, Juan M., Christensen, Sharon A., Dawson, Edward P., Duncan, William D., & Lane, Bill B. (2007) Access Control in Federated Databases: How Legal Issues Shape Security. In Wimmer, Maria A., Scholl, Jochen, & Gronlund, Ake (Eds.) Electronic Government, 6th International Conference, EGOV 2007, 3-7 September, Regensburg, Germany.
Number of full-text downloads 53

Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan M. (2007) Cost-based and time-based analysis of DoS-resistance in HIP. In Dobbie, Gillian (Ed.) Thirtieth Australasian Computer Science Conference (ACSC2007), January 30 to February 2, 2007, Ballarat, Victoria.
Number of full-text downloads 127

Reid, Jason F., Gonzalez Nieto, Juan M., Tang, Tee, & Senadji, Bouchra (2007) Detecting relay attacks with timing-based protocols. In Bao, Feng & Miller , Steven (Eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, Association for Computing Machinery (ACM), Singapore, pp. 204-213.
Number of full-text downloads 166
Number of citations in Scopus 53

Brown, Jaimee, Gonzalez Nieto, Juan M., & Boyd, Colin (2007) Efficient and secure self-escrowed public-key infrastructures. In Deng, Robert & Samarati, Pierangela (Eds.) ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security, ACM (The Association for Computing Machinery), pp. 284-294.
Number of citations in Scopus 3

Gorantla, M. Choudary, Boyd, Colin A., & Gonzalez Nieto, Juan M. (2007) ID-based One-pass Authenticated Key Establishment. In Proceedings of the Sixth Australasian Information Security Conference (AISC 2008), Australian Computer Society, Wollongong, Australia.
Number of full-text downloads 291

Boyd, Colin, Brown, Jaimee, & Gonzalez Nieto, Juan (2006) Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. In Pointcheval, D, Mu, Y, & Chen, K (Eds.) Cryptology and Network Security (LNCS 4301), 8-10 December 2006, China, Jiangsu, Suzhou.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Boyd, Colin, Brown, Jaimee, & Gonzalez Nieto, Juan (2006) Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. In Barua, R & Lange, T (Eds.) Progress in Cryptology - INDOCRYPT 2006, 11 - 13 December 2006, India, Kolkata.

Dawson, Edward, Desmedt, Yvo, Gonzalez Nieto, Juan, & Peng, Kun (2006) Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. In Rhee, M & Lee, B (Eds.) Information Security and Cryptology - ICISC 2006 (LNCS 4296), 30 November - 1 December 2006, Korea, Busan.
Number of full-text downloads 116
Number of citations in Scopus 1

Boyd, Colin, Dawson, Edward, Dawson, Robert, & Gonzalez Nieto, Juan (2006) SKMA - A Key Management Architecture for SCADA Systems. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) ACSW Frontiers 2006, Australian Computer Society Inc, Australia, Tasmania, Hobart, pp. 183-192.
Number of full-text downloads 205
Number of citations in Scopus 1

Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan (2006) Using coloured petri nets to simulate DoS-resistant protocols. In Jensen, K (Ed.) CPN'06 7th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools, 24 - 26 October 2006, Denmark, Aarhus.
Number of full-text downloads 69

Reid, Jason F., Clark, Andrew J., Gonzalez Nieto, Juan, Smith, Jason, & Viswanathan, Kapali (2004) Denial of Service Issues in Voice Over IP Networks. In First International Conference on E-Business and Telecommunication Networks (ICETE 2004), 25-28 August, 25-28 August 2004, Setúbal, Portugal.
Number of full-text downloads 436

Brown, Jaimee, Dawson, Edward P., & Gonzalez Nieto, Juan M. (2004) Implementation of the GBD cryptosystem. In Cryptographic Algorithms and their Uses, 5-6 July 2004, Gold Coast, 5-6 July 2004.
Number of full-text downloads 249

Hitchcock, Yvonne, Tin, Yiu S., Gonzalez Nieto, Juan M., Boyd, Colin A., & Montague, Paul S. (2003) A Password-Based AUthenticator: Security Proof Applications. In Johansson, T. & Maitra, S. (Eds.) Progress in Cryptology - INDOCRYPT 2003, 8-10 December, New Delhi, India.
Number of full-text downloads 107

Reid, Jason F., Gonzalez Nieto, Juan M., Dawson, Edward P., & Okamoto, Eiji (2003) Privacy and Trusted Computing. In Fourteenth International Workshop on Database and Expert Systems Applications (DEXA 2003), September 1-5, 2003, Prague, Czech Republic.
Number of full-text downloads 468
Number of citations in Web of Science® 2

Boyd, Colin A. & Gonzalez Nieto, Juan M. (2003) Round-Optimal Contributory Conference Key Agreement. In Desmedt, Y. (Ed.) Public Key Cryptography - PKC 2003, January, Miami, FL, USA.
Number of full-text downloads 188
Number of citations in Scopus 54
Number of citations in Web of Science® 73

Boyd, Colin, Dawson, Edward, Gonzalez Nieto, Juan, & Viswanathan, Kapaleeswaran (2002) A Self-Escrowed Integer Factorisation Based Public Key Infrastructure. In Gonzalez, & Martinez, (Eds.) VII Spanish Meeting on Cryptology and Information Security (RECSI VII), 5-7 September, 2002, Asturias, Spain.

Conference Item

Ngo, Long, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Automated proof for formal indistinguishability and its applications. In The 7th Workshop on Formal and Computational Cryptography (FCC 2011), 30 June 2011, Institut Henri Poincaré, Paris. (Unpublished)
Number of full-text downloads 79

This list was generated on Sat Jul 19 06:40:32 2014 EST.