Follow
Jose Antonio Montenegro
Jose Antonio Montenegro
Profesor Titular Universidad en ETSI Informatica (Universidad de Málaga)
Verified email at lcc.uma.es - Homepage
Title
Cited by
Cited by
Year
A first approach to provide anonymity in attribute certificates
V Benjumea, J Lopez, JA Montenegro, JM Troya
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004
572004
Towards a business process-driven framework for security engineering with the UML
JL Vivas, JA Montenegro, J López
International Conference on Information Security, 381-395, 2003
452003
A business process-driven approach to security engineering
A Mana, JA Montenegro, C Rudolph, JL Vivas
14th International Workshop on Database and Expert Systems Applications …, 2003
382003
Specification and design of advanced authentication and authorization services
J Lopez, JA Montenegro, JL Vivas, E Okamoto, E Dawson
Computer Standards & Interfaces 27 (5), 467-478, 2005
352005
Pervasive authentication and authorization infrastructures for mobile users
J Forné, F Hinarejos, A Marín, F Almenárez, J Lopez, JA Montenegro, ...
Computers & Security 29 (4), 501-514, 2010
282010
Energy-aware environments for the development of green applications for cyber–physical systems
DJ Munoz, JA Montenegro, M Pinto, L Fuentes
Future Generation Computer Systems 91, 536-554, 2019
272019
BAAI: biometric authentication and authorization infrastructure
E Dawson, J Lopez, JA Montenegro, E Okamoto
International Conference on Information Technology: Research and Education …, 2003
272003
A reference model for authentication and authorisation infrastructures respecting privacy and flexibility in b2c eCommerce
C Schlager, T Nowey, JA Montenegro
First International Conference on Availability, Reliability and Security …, 2006
262006
A representation model of trust relationships with delegation extensions
I Agudo, J Lopez, JA Montenegro
Trust Management: Third International Conference, iTrust 2005, Paris, France …, 2005
242005
Secure sealed-bid online auctions using discreet cryptographic proofs
JA Montenegro, MJ Fischer, J Lopez, R Peralta
Mathematical and Computer Modelling 57 (11-12), 2583–2595, 2013
182013
A new design of privilege management infrastructure for organizations using outsourced PKI
E Dawson, J Lopez, JA Montenegro, E Okamoto
Information Security: 5th International Conference, ISC 2002 Sao Paulo …, 2002
172002
Service-oriented security architecture for CII based on sensor networks
J Lopez, JA Montenegro, R Roman
Second International Workshop on Security, Privacy and Trust in Pervasive …, 2006
152006
What do software developers need to know to build secure energy-efficient Android applications?
JA Montenegro, M Pinto, L Fuentes
IEEE Access 6, 1428-1450, 2017
112017
Grid security architecture: Requirements, fundamentals, standards and models
JL Vivas, J Lopez, JA Montenegro
Security in distributed, Grid, mobile, and pervasive computing, 255-288, 2007
112007
A practical approach of X. 509 attribute certificate framework as support to obtain privilege delegation
JA Montenegro, F Moya
European Public Key Infrastructure Workshop, 160-172, 2004
102004
PKI design based on the use of on-line certification authorities
J Lopez, A Mana, JA Montenegro, JJ Ortega
International Journal of Information Security 2, 91-102, 2004
102004
A practical solution for sealed bid and multi-currency auctions
JA Montenegro, J Lopez
Computers & security 45, 186-198, 2014
62014
Enabling attribute delegation in ubiquitous environments
I Agudo, J Lopez, JA Montenegro
Mobile Networks and Applications 13, 398-410, 2008
62008
On the deployment of a real scalable delegation service
J Lopez, I Agudo, JA Montenegro
Information Security Technical Report 12 (3), 139-146, 2007
52007
Consumer preferences and implicit prices of smartphone characteristics
JA Montenegro, JL Torres
Universidad de Málaga, Department of Economic Theory, Málaga Economic Theory …, 2016
42016
The system can't perform the operation now. Try again later.
Articles 1–20