Isaac Agudo
Isaac Agudo
Associate Professor (UMA)
Verified email at lcc.uma.es - Homepage
Title
Cited by
Cited by
Year
Trust management systems for wireless sensor networks: Best practices
J Lopez, R Roman, I Agudo, C Fernandez-Gago
Computer Communications 33 (9), 1086-1093, 2010
4202010
BlindIdM: A privacy-preserving approach for identity management as a service
D Nuñez, I Agudo
International Journal of Information Security 13 (2), 199-215, 2014
562014
Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services
D Nunez, I Agudo, J Lopez
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
522012
Cryptography goes to the cloud
I Agudo, D Nuñez, G Giammatteo, P Rizomiliotis, C Lambrinoudakis
FTRA International Conference on Secure and Trust Computing, Data Management …, 2011
482011
NTRUReEncrypt: An efficient proxy re-encryption scheme based on NTRU
D Nuñez, I Agudo, J Lopez
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
472015
Proxy re-encryption: Analysis of constructions and its application to secure access delegation
D Nuñez, I Agudo, J Lopez
Journal of Network and Computer Applications 87, 193-209, 2017
422017
A model for trust metrics analysis
I Agudo, C Fernandez-Gago, J Lopez
International Conference on Trust, Privacy and Security in Digital Business …, 2008
342008
Managing Incidents in Smart Grids à la Cloud
C Alcaraz, I Agudo, D Nunez, J Lopez
IEEE Third International Conference on Cloud Computing Technology and …, 2011
312011
A methodology for security assurance-driven system development
JL Vivas, I Agudo, J López
Requirements Engineering, 1-19, 2011
302011
A representation model of trust relationships with delegation extensions
I Agudo, J Lopez, J Montenegro
3th International Conference on Trust Management (iTRUST'05), 9-22, 2005
262005
Identity management challenges for intercloud applications
D Núñez, I Agudo, P Drogkaris, S Gritzalis
FTRA International Conference on Secure and Trust Computing, Data Management …, 2011
222011
A scale based trust model for multi-context environments
I Agudo, C Fernandez-Gago, J Lopez
Computers & Mathematics with Applications 60 (2), 209-216, 2010
202010
Building trust from context similarity measures
C Fernandez-Gago, I Agudo, J Lopez
Computer Standards & Interfaces 36 (4), 792-800, 2014
192014
A parametric family of attack models for proxy re-encryption
D Nunez, I Agudo, J Lopez
2015 IEEE 28th Computer Security Foundations Symposium, 290-301, 2015
182015
A privacy-aware continuous authentication scheme for proximity-based access control
I Agudo, R Rios, J Lopez
Computers & security 39, 117-126, 2013
182013
Delegated access for hadoop clusters in the cloud
D Nunez, I Agudo, J Lopez
2014 IEEE 6th International Conference on Cloud Computing Technology and …, 2014
102014
An evolutionary trust and distrust model
I Agudo, C Fernández-Gago, J Lopez
Electronic Notes in Theoretical Computer Science 244, 3-12, 2009
92009
Security assurance during the software development cycle
I Agudo, JL Vivas, J López
Proceedings of the International Conference on Computer Systems and …, 2009
92009
On the application of generic CCA‐secure transformations to proxy re‐encryption
D Nunez, I Agudo, J Lopez
Security and Communication Networks 9 (12), 1769-1785, 2016
72016
OSAMI Commons—An open dynamic services platform for ambient intelligence
N Dai, AR Lopez, E Zeeb, J Krueger, O Dohndorf, J Bermejo, W Thronicke, ...
ETFA2011, 1-10, 2011
72011
The system can't perform the operation now. Try again later.
Articles 1–20