QUT ePrints

Browse By Person: Gonzalez Nieto, Juan

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 72.

Journal Article

Gonzalez Nieto, Juan, Manulis, Mark, Poettering, Bertram, Rangasamy, Jothi, & Stebila, Douglas (2013) Publicly verifiable ciphertexts. Journal of Computer Security, 21(5), pp. 749-778.
Number of full-text downloads 53

Sun, Dongdong, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2013) Predicate encryption for multi-inner-products. Security and Communications Networks, 6(3), pp. 325-339.

Rangasamy, Jothi, Stebila, Douglas, Kuppusamy, Lakshmi, Boyd, Colin, & Gonzalez Nieto, Juan M. (2012) Efficient modular exponentiation-based puzzles for denial-of-service protection. Lecture Notes in Computer Science, 7259, pp. 319-331.
Number of citations in Scopus 1

Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, Gonzalez Nieto, Juan M., & Kuppusamy, Lakshmi (2012) Effort-release public-key encryption from cryptographic puzzles. Lecture Notes in Computer Science, 7372, pp. 194-207.
Number of citations in Scopus 1

Gonzalez Nieto, Juan M., Manulis, Mark, & Sun, Dongdong (2012) Fully private revocable predicate encryption. Lecture Notes in Computer Science, 7372/2012, pp. 350-363.
Number of citations in Scopus 3

Alzaid, Hani, Foo, Ernest, Gonzalez Nieto, Juan, & Ahmed, Ejaz (2012) Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks. Security and Communication Networks, 5(2), pp. 125-144.
Number of citations in Scopus 3
Number of citations in Web of Science® 3

Chuah, Chai Wen, Dawson, Edward, Gonzalez Nieto, Juan Manuel, & Simpson, Leonie (2012) A framework for security analysis of key derivation functions. Lecture Notes in Computer Science, 7232, pp. 199-216.
Number of full-text downloads 51

Lee, Kaleb, Gonzalez Nieto, Juan M., & Boyd, Colin (2012) A state-aware RFID privacy model with reader corruption. Lecture Notes in Computer Science, 7672, pp. 324-338.

Alzaid, Hani, Foo, Ernest, Gonzalez Nieto, Juan, & Park, Dong-Gook (2012) A taxonomy of secure data aggregation in wireless sensor networks. International Journal of Communication Networks and Distributed Systems, 8(1 - 2), pp. 101-148.
Number of citations in Scopus 6

Gorantla, Choudary, Boyd, Colin, Gonzalez Nieto, Juan M., & Manulis, Mark (2011) Modeling key compromise impersonation attacks on group key exchange protocols. ACM Transactions on Information and System Security, 14(4), 28:1-28:24.
Number of citations in Web of Science® 2

Lippold, Georg, Boyd, Colin, & Gonzalez Nieto, Juan M. (2009) Strongly Secure Certificateless Key Agreement. Lecture Notes in Computer Science (LNCS), 5671, pp. 206-230.
Number of full-text downloads 440
Number of citations in Scopus 16
Number of citations in Web of Science® 17

Boyd, Colin, Cliff, Yvonne, Gonzalez Nieto, Juan M., & Paterson, Kenneth (2009) Efficient one-round key exchange in the efficient one-round key exchange in the standard model. International Journal of Applied Cryptography, 1, pp. 181-199.
Number of full-text downloads 111
Number of citations in Scopus 20

Costello, Craig, Hisil, Huseyin, Boyd, Colin, Gonzalez Nieto, Juan Manuel, & Wong, Kenneth Koon-Ho (2009) Faster pairings on special Weierstrass curves. Lecture Notes in Computer Science, LNCS 5, pp. 89-101.
Number of full-text downloads 118
Number of citations in Scopus 12
Number of citations in Web of Science® 12

Smith, Jason, Tritilanunt, Suratose, Boyd, Colin A., Gonzalez Nieto, Juan M., & Foo, Ernest (2007) Denial-of-service resistance in key establishment. International Journal of Wireless and Mobile Computing, 2(1), pp. 59-71.
Number of full-text downloads 196
Number of citations in Scopus 5

Boyd, Colin, Gonzalez Nieto, Juan, Ha, Jae-Cheol, Kim, Hwan-Koo, Moon, Sang-Jae, & Park, Jea-Hoon (2007) HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed FRID System. Lecture Notes in Computer Science, 4809, pp. 557-567.

Boyd, Colin, Gonzalez Nieto, Juan, Ha, Jae-Cheol, & Moon, Sang-Jae (2007) Low Cost and Strong-Security RFID Authentication Protocol. Lecture Notes in Computer Science, 4809, pp. 795-807.
Number of citations in Scopus 10
Number of citations in Web of Science® 13

Gorantla, M. Choudary, Boyd, Colin A., & Gonzalez Nieto, Juan Manuel (2007) On the Connection Between Signcryption and One-pass Key Establishment. Cryptography and Coding (LNCS), 4887, pp. 277-301.
Number of full-text downloads 148
Number of citations in Scopus 3
Number of citations in Web of Science® 4

Tritilanunt, Suratose, Boyd, Colin A., Foo, Ernest, & Gonzalez Nieto, Juan M. (2007) Toward Non-parallelizable Client Puzzles. Cryptology and Network Security (LNCS), 4856, pp. 247-264.
Number of full-text downloads 623
Number of citations in Scopus 6
Number of citations in Web of Science® 12

Boyd, Colin, Gonzalez Nieto, Juan, Okamoto, Eiji, Okamoto, Takeshi, & Tso, Raylin (2007) Verifier-Key-Flexible Universal Designated-Verifier Signatures. Lecture Notes in Computer Science, 4887, pp. 403-421.
Number of citations in Web of Science® 2

Betts, Martin, Black, Peter, Christensen, Sharon A., Dawson, Edward, Du, Rong, Duncan, William, et al. (2006) Towards secure and legal e-tendering. Journal of Information Technology in Construction, 11, pp. 89-102.
Number of full-text downloads 1,186
Number of citations in Scopus 7

Reid, Jason F., Gonzalez Neito, Juan M., Tang, Tee, & Senadji, Bouchra (2006) Detecting Relay Attacks with Timing Based Protocols. .
Number of full-text downloads 1,982

Chow, Sherman, Boyd, Colin A., & Gonzalez Nieto, Juan M. (2006) Security-Mediated Certificateless Cryptography. Public Key Cryptology- PKC 2006 (LNCS), 3958, pp. 508-524.
Number of full-text downloads 141
Number of citations in Scopus 18
Number of citations in Web of Science® 22

Gonzalez Nieto, Juan M., Boyd, Colin A., & Dawson, Edward P. (2005) A Public Key Cryptosystem Based On A Subgroup Membership Problem. Designs, Codes and Cryptography, 36(3), pp. 301-316.
Number of citations in Scopus 9
Number of citations in Web of Science® 3

Steketee, Chris, Brown, Jaimee, Gonzalez Nieto, Juan M., & Montague, Paul (2005) GBD threshold cryptography with an application to RSA key recovery. Lecture Notes in Computer Science, 3574, pp. 394-405.
Number of full-text downloads 219

Boyd, Colin, Clark, Andrew, Dawson, Edward, Gonzalez Nieto, Juan, & Viswanathan, Kapaleeswaran (2002) Key Recovery for the Commercial Environment. International Journal of Information Security, 1(3), pp. 161-174.

Conference Paper

Gonzalez Nieto, Juan M., Manulis, Mark, Poettering, Bertram, Rangasamy, Jothi, & Stebila, Douglas (2012) Publicly verifiable ciphertexts. In Visconti, Ivan (Ed.) Proceedings of the 8th Conference on Security and Cryptography for Networks, Springer, Italy, pp. 393-410. (In Press)
Number of full-text downloads 146
Number of citations in Scopus 3

Gonzalez Nieto, Juan M., Manulis, Mark, & Sun, Dongdong (2012) Forward-secure hierarchical predicate encryption. In Abdalla, Michel & Lange, Tanja (Eds.) Proceedings of the 5th International Conference on Pairing-Based Cryptography, Springer, Cologne, Germany.
Number of full-text downloads 73

Albeshri, Aiiad Ahmad, Boyd, Colin, & Gonzalez Nieto, Juan M. (2012) Geoproof : proofs of geographic location for cloud computing environment. In Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops 2012, IEEE, Macau, China, pp. 506-514.
Number of full-text downloads 342
Number of citations in Scopus 4

Lee, Kaleb, Gonzalez Nieto, Juan M., & Boyd, Colin (2012) Improving the efficiency of RFID authentication with pre-computation. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012),, Australian Computer Society Inc, Melbourne, Vic., pp. 91-100.

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Brereton, Margot (2012) Towards a secure human-and-computer mutual authentication protocol. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Australian Computer Society Inc, Melbourne, Vic., pp. 39-46.
Number of full-text downloads 92

Alseadoon, Ibrahim, Chan, Taizan, Foo, Ernest, & Gonzalez Nieto, Juan M. (2012) Who is more susceptible to phishing emails? : a Saudi Arabian study. In Lamp, John (Ed.) Proceedings of the 23rd Australasian Conference on Information Systems 2012, Deakin University, Deakin University, Geelong, Victoria.

Albeshri, Aiiad Ahmad, Boyd, Colin, & Gonzalez Nieto, Juan M. (2012) A security architecture for cloud storage combining proofs of retrievability and fairness. In Zimmermann, Wolf, Lee, Yong Woo, & Demchenko, Yuri (Eds.) Proceedings of Cloud Computing 2012 : The Third International Conference on Cloud Computing, GRIDS and Virtualization, IARIA, Hotel Novotel Cap, Nice, pp. 30-35.

Boyd, Colin & Gonzalez Nieto, Juan M. (2011) On forward secrecy in one-round key exchange. In Lecture Notes in Computer Science: Cryptography and Coding, Springer Berlin / Heidelberg, Oxford, UK, pp. 451-468.
Number of full-text downloads 181
Number of citations in Scopus 4

Radke, Kenneth, Brereton, Margot, Mirisaee, Seyed Hadi , Ghelawat, Sunil, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Tensions in developing a secure collective information practice : the case of Agile Ridesharing. In 13th IFIP TC13 Conference on Human-Computer Interaction (INTERACT 2011), 5-9 September 2011, Lisbon.
Number of full-text downloads 317

Ngo, Long, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Automated proofs for Diffie–Hellman–based key exchanges. In Backes, Michael & Zdancewic, Steve (Eds.) 2011 IEEE 24th Computer Security Foundations Symposium (CSF 2011), IEEE, Abbaye des Vaux-de-Cernay, Cernay-la-Ville, pp. 51-65.
Number of full-text downloads 156
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Brereton, Margot (2011) Ceremony analysis : strengths and weaknesses. In Future Challenges in Security and Privacy for Academia and Industry : 26th IFIP TC 11 International Information Security Conference (SEC 2011) Proceedings, Springer, Lucerne University of Applied Sciences and Arts, Luzern, pp. 104-115.
Number of full-text downloads 118

Stebila, Douglas, Kuppusamy, Lakshmi, Rangasamy, Jothi, Boyd, Colin, & Gonzalez Nieto, Juan (2011) Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. In Kiayias, Aggelos (Ed.) Topics in Cryptology – CT-RSA 2011, Springer, San Francisco, California, pp. 284-301.
Number of full-text downloads 244
Number of citations in Scopus 7
Number of citations in Web of Science® 2

Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) An integrated approach to cryptographic mitigation of denial-of-service attacks. In Sandhu, Ravi & Wong, Duncan S. (Eds.) Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011, ACM, HKU SPACE Admiralty Learning Center, Hong Kong, pp. 114-123.
Number of full-text downloads 222
Number of citations in Scopus 5

Radke, Kenneth, Boyd, Colin, Margot, Brereton, & Gonzalez Nieto, Juan M. (2010) How HCI design influences web security decisions. In Proceedings of OZCHI 2010 : Design – Interaction – Participation, CHISIG, Queensland University of Technology, Brisbane, Queensland.
Number of full-text downloads 50
Number of citations in Scopus 1

Sun, Dongdong, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2010) Delegation in predicate encryption supporting disjunctive queries. In Rannenberg, Kai & Varadharajan, Vijay (Eds.) IFIP Advances in Information and Communication Technology : Proceedings of 25th IFIP TC-11 International Information Security Conference, SEC 2010, Springer, Brisbane, pp. 229-240.
Number of full-text downloads 215
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Gorantla, M. Choudary, Boyd, Colin, & Gonzalez Nieto, Juan M. (2010) Attribute-based authenticated key exchange. In Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney.
Number of full-text downloads 346
Number of citations in Scopus 8
Number of citations in Web of Science® 4

Costello, Craig, Boyd, Colin, Gonzalez Nieto, Juan M., & Wong, Kenneth Koon-Ho (2010) Delaying mismatched field multiplications in pairing computations. In Arithmetic of Finite Fields : Third International Workshop, WAIFI 2010, Proceedings, Springer Verlag, Istanbul, Turkey, pp. 196-214.
Number of full-text downloads 78

Alzaid, Hani, Park, Dong-Gook, Gonzalez Nieto, Juan M., & Foo, Ernest (2010) Mitigating sandwich attacks against a secure key management scheme in wireless sensor networks for PCS/SCADA. In Proceedings of The 24th International Conference on Advanced Information Networking and Applications, IEEE, Perth, Western Australia. (In Press)
Number of full-text downloads 161
Number of citations in Scopus 3

Costello, Craig, Boyd, Colin, Gonzalez Nieto, Juan M., & Wong, Kenneth Koon-Ho (2010) Avoiding full extension field arithmetic in pairing computations. In Progress in Cryptology - AFRICACRYPT 2010, Springer Verlag, Stellenbosch, South Africa, pp. 203-224.
Number of full-text downloads 64
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Lippold, Georg & Gonzalez Nieto, Juan Manuel (2010) Certificateless key agreement in the standard model. In Boyd, Colin & Susilo, Willy (Eds.) Proceedings of the 8th Australasian Information Security Conference (AISC 2010), ACS, Queensland University of Technology, Brisbane, Queensland, pp. 75-85.
Number of full-text downloads 269

Lippold, Georg, Boyd, Colin, & Gonzalez Nieto, Juan M. (2010) Efficient certificateless KEM in the standard model. In Hong, Seokhie & Lee, Donghoon (Eds.) Lecture Notes in Computer Science : Information, Security and Cryptology (ICISC 2009), Springer Berlin / Heidelberg, Korea University, Seoul, pp. 34-46.
Number of full-text downloads 162
Number of citations in Scopus 1

Gorantla, Choudary, Boyd, Colin, Gonzalez Nieto, Juan M., & Manulis, Mark (2010) Generic one round group key exchange in the standard model. In Lee, Donghoon & Hong, Seokhie (Eds.) Lecture Notes in Computer Science : Information Security and Cryptology (ICISC 2009), Springer Berlin / Heidelberg, Korean Institute of Information Security and Cryptology, Korea, pp. 1-15.
Number of full-text downloads 623
Number of citations in Scopus 5

Alzaid, Hani, Park, Dong-Gook, Gonzalez Nieto, Juan M., Boyd, Colin, & Foo, Ernest (2009) A forward and backward secure key management in wireless sensor networks for PCS/SCADA. In Proceedings of the 1st International ICST Conference on Sensor Systems and Software, 7-9 September 2009, Grand Hotel Duomo of Pisa, Pisa. (In Press)
Number of full-text downloads 517
Number of citations in Scopus 1

Cliff, Yvonne, Boyd, Colin, & Gonzalez Nieto, Juan M. (2009) How to extract and expand randomness : a summary and explanation of existing results. In Applied Cryptography and Network Security, 2-5 June 2009, Place de l'Etoile , Paris.
Number of full-text downloads 188
Number of citations in Web of Science® 1

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Modeling key compromise impersonation attacks on group key exchange protocols. In Public Key Cryptography 2009, March 18-20, 2009, Irvine, CA, USA.
Number of citations in Scopus 11

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Universally composable contributory group key exchange. In Asian ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), 10 - 12 March 2009, Sydney.
Number of citations in Scopus 6

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Strong designated verifier signature in a multi-user setting. In Seventh Australasian Information Security Conference (AISC 2009), Jan 20-23, 2009, Wellington, New Zealand.
Number of full-text downloads 96

Boyd, Colin, Cliff, Yvonne, Gonzalez Nieto, Juan M., & Paterson, Kenneth (2008) Efficient one-round key exchange in the standard model. In Information Security and Privacy : 13th Australasian Conference (ACISP 2008), 7-9 July 2008, Wollongong, NSW.
Number of full-text downloads 45
Number of citations in Scopus 33
Number of citations in Web of Science® 24

Alzaid, Hani, Foo, Ernest, & Gonzalez Nieto, Juan (2008) RSDA: Reputation-based Secure Data Aggregation in Wireless Sensor Networks. In 1st International Workshop on Sensor Networks and Ambient Intelligence (SeNAmI 2008), December 1-4, 2008, Dunedin, New Zealand. (In Press)
Number of full-text downloads 361
Number of citations in Scopus 10
Number of citations in Web of Science® 8

Alzaid, Hani, Foo, Ernest, & Gonzalez Nieto, Juan M. (2008) Secure Data Aggregation in Wireless Sensor Networks: A survey. In Proceedings of the Sixth Australasian Information Security Conference (AISC 2008), Australian Computer Society, Wollongong, Australia, pp. 93-105.
Number of full-text downloads 3,842
Number of citations in Scopus 1

Burdon, Mark, Gonzalez Nieto, Juan M., Christensen, Sharon A., Dawson, Edward P., Duncan, William D., & Lane, Bill B. (2007) Access Control in Federated Databases: How Legal Issues Shape Security. In Wimmer, Maria A., Scholl, Jochen, & Gronlund, Ake (Eds.) Electronic Government, 6th International Conference, EGOV 2007, 3-7 September, Regensburg, Germany.
Number of full-text downloads 58

Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan M. (2007) Cost-based and time-based analysis of DoS-resistance in HIP. In Dobbie, Gillian (Ed.) Thirtieth Australasian Computer Science Conference (ACSC2007), January 30 to February 2, 2007, Ballarat, Victoria.
Number of full-text downloads 130

Reid, Jason F., Gonzalez Nieto, Juan M., Tang, Tee, & Senadji, Bouchra (2007) Detecting relay attacks with timing-based protocols. In Bao, Feng & Miller , Steven (Eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, Association for Computing Machinery (ACM), Singapore, pp. 204-213.
Number of full-text downloads 181
Number of citations in Scopus 56

Brown, Jaimee, Gonzalez Nieto, Juan M., & Boyd, Colin (2007) Efficient and secure self-escrowed public-key infrastructures. In Deng, Robert & Samarati, Pierangela (Eds.) ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security, ACM (The Association for Computing Machinery), pp. 284-294.
Number of citations in Scopus 3

Gorantla, M. Choudary, Boyd, Colin A., & Gonzalez Nieto, Juan M. (2007) ID-based One-pass Authenticated Key Establishment. In Proceedings of the Sixth Australasian Information Security Conference (AISC 2008), Australian Computer Society, Wollongong, Australia.
Number of full-text downloads 306

Boyd, Colin, Brown, Jaimee, & Gonzalez Nieto, Juan (2006) Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. In Pointcheval, D, Mu, Y, & Chen, K (Eds.) Cryptology and Network Security (LNCS 4301), 8-10 December 2006, China, Jiangsu, Suzhou.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Boyd, Colin, Brown, Jaimee, & Gonzalez Nieto, Juan (2006) Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. In Barua, R & Lange, T (Eds.) Progress in Cryptology - INDOCRYPT 2006, 11 - 13 December 2006, India, Kolkata.

Dawson, Edward, Desmedt, Yvo, Gonzalez Nieto, Juan, & Peng, Kun (2006) Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. In Rhee, M & Lee, B (Eds.) Information Security and Cryptology - ICISC 2006 (LNCS 4296), 30 November - 1 December 2006, Korea, Busan.
Number of full-text downloads 134
Number of citations in Scopus 1

Boyd, Colin, Dawson, Edward, Dawson, Robert, & Gonzalez Nieto, Juan (2006) SKMA - A Key Management Architecture for SCADA Systems. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) ACSW Frontiers 2006, Australian Computer Society Inc, Australia, Tasmania, Hobart, pp. 183-192.
Number of full-text downloads 257
Number of citations in Scopus 1

Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan (2006) Using coloured petri nets to simulate DoS-resistant protocols. In Jensen, K (Ed.) CPN'06 7th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools, 24 - 26 October 2006, Denmark, Aarhus.
Number of full-text downloads 71

Reid, Jason F., Clark, Andrew J., Gonzalez Nieto, Juan, Smith, Jason, & Viswanathan, Kapali (2004) Denial of Service Issues in Voice Over IP Networks. In First International Conference on E-Business and Telecommunication Networks (ICETE 2004), 25-28 August, 25-28 August 2004, Setúbal, Portugal.
Number of full-text downloads 467

Brown, Jaimee, Dawson, Edward P., & Gonzalez Nieto, Juan M. (2004) Implementation of the GBD cryptosystem. In Cryptographic Algorithms and their Uses, 5-6 July 2004, Gold Coast, 5-6 July 2004.
Number of full-text downloads 257

Hitchcock, Yvonne, Tin, Yiu S., Gonzalez Nieto, Juan M., Boyd, Colin A., & Montague, Paul S. (2003) A Password-Based AUthenticator: Security Proof Applications. In Johansson, T. & Maitra, S. (Eds.) Progress in Cryptology - INDOCRYPT 2003, 8-10 December, New Delhi, India.
Number of full-text downloads 130

Reid, Jason F., Gonzalez Nieto, Juan M., Dawson, Edward P., & Okamoto, Eiji (2003) Privacy and Trusted Computing. In Fourteenth International Workshop on Database and Expert Systems Applications (DEXA 2003), September 1-5, 2003, Prague, Czech Republic.
Number of full-text downloads 481
Number of citations in Web of Science® 2

Boyd, Colin A. & Gonzalez Nieto, Juan M. (2003) Round-Optimal Contributory Conference Key Agreement. In Desmedt, Y. (Ed.) Public Key Cryptography - PKC 2003, January, Miami, FL, USA.
Number of full-text downloads 329
Number of citations in Scopus 55
Number of citations in Web of Science® 76

Boyd, Colin, Dawson, Edward, Gonzalez Nieto, Juan, & Viswanathan, Kapaleeswaran (2002) A Self-Escrowed Integer Factorisation Based Public Key Infrastructure. In Gonzalez, & Martinez, (Eds.) VII Spanish Meeting on Cryptology and Information Security (RECSI VII), 5-7 September, 2002, Asturias, Spain.

Conference Item

Ngo, Long, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Automated proof for formal indistinguishability and its applications. In The 7th Workshop on Formal and Computational Cryptography (FCC 2011), 30 June 2011, Institut Henri Poincaré, Paris. (Unpublished)
Number of full-text downloads 81

This list was generated on Sat Dec 27 05:34:14 2014 AEST.