Suivre
Jesus Diaz
Jesus Diaz
Input Output
Adresse e-mail validée de iohk.io - Page d'accueil
Titre
Citée par
Citée par
Année
Cryptanalysis of a one round chaos-based Substitution Permutation Network
D Arroyo, J Diaz, FB Rodriguez
Signal Processing 93 (5), 1358-1364, 2013
1192013
A formal methodology for integral security design and verification of network protocols
J Diaz, D Arroyo, FB Rodriguez
Arxiv preprint arXiv:1201.5666, 2012
212012
Group Signatures with User-Controlled and Sequential Linkability
J Diaz, A Lehmann
182021
Non-conventional digital signatures and their implementations—a review
D Arroyo, J Diaz, FB Rodriguez
International Joint Conference: CISIS’15 and ICEUTE’15 8, 425-435, 2015
112015
New X. 509-based mechanisms for fair anonymity management
J Diaz, D Arroyo, FB Rodriguez
Computers & Security 46, 111-125, 2014
112014
Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers
A Sanchez-Gomez, J Diaz, L Hernandez-Encinas, D Arroyo
Computer and Network Security Essentials, 263-281, 2018
102018
An approach for adapting moodle into a secure infrastructure
J Diaz, D Arroyo, F Rodriguez
Computational Intelligence in Security for Information Systems, 214-221, 2011
102011
On the difficult tradeoff between security and privacy: Challenges for the management of digital identities
D Arroyo, J Diaz, V Gayoso
Computational Intelligence in Security for Information Systems Conference …, 2015
92015
On securing online registration protocols: formal verification of a new proposal
J Diaz, D Arroyo, FB Rodriguez
Knowledge-Based Systems, 2014
92014
libgroupsig: An extensible C library for group signatures.
J Diaz, D Arroyo, FB Rodriguez
IACR Cryptology ePrint Archive 2015, 1146, 2015
82015
Anonymity Revocation through Standard Infrastructures
J Diaz, D Arroyo, FB Rodriguez
Public Key Infrastructures, Services and Applications, 112-127, 2013
82013
Esteganografía y estegoanálisis: Ocultación de datos en streams de audio Vorbis
J Díaz Vico
Facultad de Informática (UPM), 2010
82010
Privacy threats in e-shopping (position paper)
J Diaz, SG Choi, D Arroyo, AD Keromytis, FB Rodriguez, M Yung
Data Privacy Management, and Security Assurance: 10th International Workshop …, 2016
72016
Combining Usability and Privacy Protection in Free-Access Public Cloud Storage Servers: Review of the Main Threats and Challenges
A Sanchez-Gomez, J Diaz, D Arroyo
arXiv preprint arXiv:1610.08727, 2016
62016
Privacy in e-shopping transactions: Exploring and addressing the trade-offs
J Diaz, SG Choi, D Arroyo, AD Keromytis, FB Rodriguez, M Yung
Cyber Security Cryptography and Machine Learning: Second International …, 2018
52018
A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions
J Diaz, SG Choi, D Arroyo, AD Keromytis, FB Rodriguez, M Yung
Advances in Cyber Security: Principles, Techniques, and Applications, 143-183, 2019
32019
Fair and Accountable Anonymity for the Tor Network.
J Diaz, D Arroyo, FB Rodriguez
SECRYPT, 560-565, 2017
32017
Fair anonymity for the Tor network
J Diaz, D Arroyo, FB Rodriguez
arXiv preprint arXiv:1412.4707, 2014
32014
Blockchain
J Díaz, L Hernández, D Arroyo
Los Libros de La Catarata, 2019
22019
Formal security analysis of registration protocols for interactive systems: a methodology and a case of study
J Diaz, D Arroyo, FB Rodriguez
Arxiv preprint arXiv:1201.1134, 2012
22012
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20