default search action
Isaac Agudo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Daniel Morales Escalera, Isaac Agudo, Javier López:
Private set intersection: A systematic literature review. Comput. Sci. Rev. 49: 100567 (2023) - [c30]Daniel Morales Escalera, Isaac Agudo, Javier López:
Integration of MPC into Besu through an extended private transaction model. MetaCom 2023: 266-273 - [c29]Elena Molina, Ruben Rios, Isaac Agudo:
An empirical evaluation of BLE for ITS scenarios. VTC Fall 2023: 1-5 - 2022
- [j14]Ishak Meraouche, Sabyasachi Dutta, Sraban Kumar Mohanty, Isaac Agudo, Kouichi Sakurai:
Learning Multi-Party Adversarial Encryption and Its Application to Secret Sharing. IEEE Access 10: 121329-121339 (2022) - [c28]Daniel Morales Escalera, Isaac Agudo, Javier López:
Real-time Crowd Counting based on Wearable Ephemeral IDs. SECRYPT 2022: 249-260 - 2021
- [j13]Isaac Agudo, Manuel Montenegro, Javier López:
A Blockchain Approach for Decentralized V2X (D-V2X). IEEE Trans. Veh. Technol. 70(5): 4001-4010 (2021)
2010 – 2019
- 2019
- [j12]David Nuñez, Isaac Agudo, Javier López:
Escrowed decryption protocols for lawful interception of encrypted data. IET Inf. Secur. 13(5): 498-507 (2019) - 2017
- [j11]David Nuñez, Isaac Agudo, Javier López:
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation. J. Netw. Comput. Appl. 87: 193-209 (2017) - [c27]David Nuñez, Isaac Agudo, Javier López:
The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol. DBSec 2017: 453-472 - 2016
- [j10]David Nuñez, Isaac Agudo, Javier López:
On the application of generic CCA-secure transformations to proxy re-encryption. Secur. Commun. Networks 9(12): 1769-1785 (2016) - [i2]David Nuñez, Isaac Agudo, Javier López:
A Parametric Family of Attack Models for Proxy Re-Encryption. IACR Cryptol. ePrint Arch. 2016: 293 (2016) - [i1]David Nuñez, Isaac Agudo, Javier López:
Attacks to a proxy-mediated key agreement protocol based on symmetric encryption. IACR Cryptol. ePrint Arch. 2016: 1081 (2016) - 2015
- [c26]David Nuñez, Isaac Agudo, Javier López:
NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU. AsiaCCS 2015: 179-189 - [c25]David Nuñez, Isaac Agudo, Javier López:
A Parametric Family of Attack Models for Proxy Re-encryption. CSF 2015: 290-301 - [c24]Carlos Parés-Pulido, Isaac Agudo:
LockPic: Privacy Preserving Photo Sharing in Social Networks. DPM/QASA@ESORICS 2015: 281-290 - [c23]Jouni Ikonen, Antti Knutas, YongYi Wu, Isaac Agudo:
Is the world ready or do we need more tools for programming related teamwork? Koli Calling 2015: 33-39 - [c22]Isaac Agudo, Ali El Kaafarani, David Nuñez, Siani Pearson:
A Technique for Enhanced Provision of Appropriate Access to Evidence Across Service Provision Chains. Privacy and Identity Management 2015: 187-204 - 2014
- [j9]M. Carmen Fernández Gago, Isaac Agudo, Javier López:
Building trust from context similarity measures. Comput. Stand. Interfaces 36(4): 792-800 (2014) - [j8]David Nuñez, Isaac Agudo:
BlindIdM: A privacy-preserving approach for identity management as a service. Int. J. Inf. Sec. 13(2): 199-215 (2014) - [c21]David Nuñez, Isaac Agudo, Javier López:
Privacy-Preserving Identity Management as a Service. A4Cloud 2014: 114-125 - [c20]David Nuñez, Isaac Agudo, Javier López:
Delegated Access for Hadoop Clusters in the Cloud. CloudCom 2014: 374-379 - [e2]Sokratis K. Katsikas, Isaac Agudo:
Public Key Infrastructures, Services and Applications - 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8341, Springer 2014, ISBN 978-3-642-53996-1 [contents] - 2013
- [j7]Isaac Agudo, Ruben Rios, Javier López:
A privacy-aware continuous authentication scheme for proximity-based access control. Comput. Secur. 39: 117-126 (2013) - [e1]M. Carmen Fernández Gago, Fabio Martinelli, Siani Pearson, Isaac Agudo:
Trust Management VII - 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings. IFIP Advances in Information and Communication Technology 401, Springer 2013, ISBN 978-3-642-38322-9 [contents] - 2012
- [c19]David Nuñez, Isaac Agudo, Javier López:
Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services. CloudCom 2012: 241-248 - [c18]Francisco Moyano, M. Carmen Fernández Gago, Isaac Agudo, Javier López:
A Task Ordering Approach for Automatic Trust Establishment. ESSoS 2012: 75-88 - [c17]Libor Neumann, Tomás Halman, Pavel Rotek, Alexander Boettcher, Julian Stecklina, Michal Sojka, David Nuñez, Isaac Agudo:
Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber Identity. ISSE 2012: 195-206 - 2011
- [j6]José Luis Vivas, Isaac Agudo, Javier López:
A methodology for security assurance-driven system development. Requir. Eng. 16(1): 55-73 (2011) - [c16]Cristina Alcaraz, Isaac Agudo, David Nuñez, Javier López:
Managing Incidents in Smart Grids à la Cloud. CloudCom 2011: 527-531 - [c15]Naci Dai, Wolfgang Thronicke, Alejandra Ruiz López, Félix Cuadrado Latasa, Elmar Zeeb, Christoph Fiehe, Anna Litvina, Jan Krüger, Oliver Dohndorf, Isaac Agudo, Jesús Bermejo Muñoz:
OSAMI Commons - An open dynamic services platform for ambient intelligence. ETFA 2011: 1-10 - [c14]Isaac Agudo, David Nuñez, Gabriele Giammatteo, Panagiotis Rizomiliotis, Costas Lambrinoudakis:
Cryptography Goes to the Cloud. STA Workshops 2011: 190-197 - 2010
- [j5]Isaac Agudo, M. Carmen Fernández Gago, Javier López:
A scale based trust model for multi-context environments. Comput. Math. Appl. 60(2): 209-216 (2010) - [j4]Javier López, Rodrigo Roman, Isaac Agudo, M. Carmen Fernández Gago:
Trust management systems for wireless sensor networks: Best practices. Comput. Commun. 33(9): 1086-1093 (2010)
2000 – 2009
- 2009
- [j3]Isaac Agudo, M. Carmen Fernández Gago, Javier López:
Concurrent access control for multi-user and multi-processor systems based on trust relationships. Concurr. Comput. Pract. Exp. 21(10): 1389-1403 (2009) - [c13]Isaac Agudo, José Luis Vivas, Javier López:
Security assurance during the software development cycle. CompSysTech 2009: 20 - [c12]Isaac Agudo, M. Carmen Fernández Gago, Javier López:
A Multidimensional Reputation Scheme for Identity Federations. EuroPKI 2009: 225-238 - [c11]Cristina Alcaraz, Isaac Agudo, M. Carmen Fernández Gago, Rodrigo Roman, Gerardo Fernandez, Javier López:
Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems. TrustBus 2009: 86-94 - 2008
- [j2]Isaac Agudo, Javier López, José A. Montenegro:
Enabling Attribute Delegation in Ubiquitous Environments. Mob. Networks Appl. 13(3-4): 398-410 (2008) - [c10]Isaac Agudo, M. Carmen Fernández Gago, Javier López:
Delegating Privileges over Finite Resources: A Quota Based Delegation Approach. Formal Aspects in Security and Trust 2008: 302-315 - [c9]Jose Manuel Marquez, Javier Jimenez, Isaac Agudo:
Secure Real-Time Integration of Services in a OSGi Distributed Environment. NCM (1) 2008: 631-635 - [c8]Isaac Agudo, M. Carmen Fernández Gago, Javier López:
A Model for Trust Metrics Analysis. TrustBus 2008: 28-37 - [c7]Isaac Agudo, M. Carmen Fernández Gago, Javier López:
An Evolutionary Trust and Distrust Model. STM@IFIPTM 2008: 3-12 - 2007
- [j1]Javier López, Isaac Agudo, José A. Montenegro:
On the deployment of a real scalable delegation service. Inf. Secur. Tech. Rep. 12(3): 139-146 (2007) - [c6]Isaac Agudo, Javier López, José A. Montenegro:
Attribute delegation in ubiquitous environments. MobiMedia 2007: 43 - [c5]Isaac Agudo, Javier López, José A. Montenegro:
Implementation aspects of a delegation system. MobiMedia 2007: 50 - 2006
- [c4]Isaac Agudo, Javier López, José A. Montenegro:
Graphical Representation of Authorization Policies for Weighted Credentials. ACISP 2006: 383-394 - [c3]Isaac Agudo, Javier López, José A. Montenegro:
Attribute Delegation Based on Ontologies and Context Information. Communications and Multimedia Security 2006: 54-66 - 2005
- [c2]Isaac Agudo, Javier López, José A. Montenegro:
A Representation Model of Trust Relationships with Delegation Extensions. iTrust 2005: 116-130 - 2004
- [c1]Isaac Agudo, Javier López:
Specification and formal verification of security requirements. CompSysTech 2004: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint