Jose Antonio Montenegro
Jose Antonio Montenegro
Profesor Titular Universidad en ETSI Informatica (Universidad de Málaga)
Verified email at - Homepage
Cited by
Cited by
A first approach to provide anonymity in attribute certificates
V Benjumea, J Lopez, JA Montenegro, JM Troya
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004
Towards a business process-driven framework for security engineering with the UML
JL Vivas, JA Montenegro, J López
International Conference on Information Security, 381-395, 2003
A business process-driven approach to security engineering
A Mana, JA Montenegro, C Rudolph, JL Vivas
14th International Workshop on Database and Expert Systems Applications …, 2003
Specification and design of advanced authentication and authorization services
J Lopez, JA Montenegro, JL Vivas, E Okamoto, E Dawson
Computer Standards & Interfaces 27 (5), 467-478, 2005
Pervasive authentication and authorization infrastructures for mobile users
J Forné, F Hinarejos, A Marín, F Almenárez, J Lopez, JA Montenegro, ...
Computers & Security 29 (4), 501-514, 2010
Energy-aware environments for the development of green applications for cyber–physical systems
DJ Munoz, JA Montenegro, M Pinto, L Fuentes
Future Generation Computer Systems 91, 536-554, 2019
BAAI: biometric authentication and authorization infrastructure
E Dawson, J Lopez, JA Montenegro, E Okamoto
International Conference on Information Technology: Research and Education …, 2003
A reference model for authentication and authorisation infrastructures respecting privacy and flexibility in b2c eCommerce
C Schlager, T Nowey, JA Montenegro
First International Conference on Availability, Reliability and Security …, 2006
A representation model of trust relationships with delegation extensions
I Agudo, J Lopez, JA Montenegro
Trust Management: Third International Conference, iTrust 2005, Paris, France …, 2005
Secure sealed-bid online auctions using discreet cryptographic proofs
JA Montenegro, MJ Fischer, J Lopez, R Peralta
Mathematical and Computer Modelling 57 (11-12), 2583–2595, 2013
A new design of privilege management infrastructure for organizations using outsourced PKI
E Dawson, J Lopez, JA Montenegro, E Okamoto
Information Security: 5th International Conference, ISC 2002 Sao Paulo …, 2002
Service-oriented security architecture for CII based on sensor networks
J Lopez, JA Montenegro, R Roman
Second International Workshop on Security, Privacy and Trust in Pervasive …, 2006
What do software developers need to know to build secure energy-efficient Android applications?
JA Montenegro, M Pinto, L Fuentes
IEEE Access 6, 1428-1450, 2017
Grid security architecture: Requirements, fundamentals, standards and models
JL Vivas, J Lopez, JA Montenegro
Security in distributed, Grid, mobile, and pervasive computing, 255-288, 2007
A practical approach of X. 509 attribute certificate framework as support to obtain privilege delegation
JA Montenegro, F Moya
European Public Key Infrastructure Workshop, 160-172, 2004
PKI design based on the use of on-line certification authorities
J Lopez, A Mana, JA Montenegro, JJ Ortega
International Journal of Information Security 2, 91-102, 2004
A practical solution for sealed bid and multi-currency auctions
JA Montenegro, J Lopez
Computers & security 45, 186-198, 2014
Enabling attribute delegation in ubiquitous environments
I Agudo, J Lopez, JA Montenegro
Mobile Networks and Applications 13, 398-410, 2008
On the deployment of a real scalable delegation service
J Lopez, I Agudo, JA Montenegro
Information Security Technical Report 12 (3), 139-146, 2007
Consumer preferences and implicit prices of smartphone characteristics
JA Montenegro, JL Torres
Universidad de Málaga, Department of Economic Theory, Málaga Economic Theory …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20