Follow
Isaac Agudo
Isaac Agudo
Associate Professor (UMA)
Verified email at lcc.uma.es - Homepage
Title
Cited by
Cited by
Year
Trust management systems for wireless sensor networks: Best practices
J Lopez, R Roman, I Agudo, C Fernandez-Gago
Computer Communications 33 (9), 1086-1093, 2010
4372010
Proxy re-encryption: Analysis of constructions and its application to secure access delegation
D Nuñez, I Agudo, J Lopez
Journal of Network and Computer Applications 87, 193-209, 2017
772017
BlindIdM: A privacy-preserving approach for identity management as a service
D Nuñez, I Agudo
International Journal of Information Security 13, 199-215, 2014
682014
NTRUReEncrypt: An efficient proxy re-encryption scheme based on NTRU
D Nunez, I Agudo, J Lopez
Proceedings of the 10th ACM symposium on information, computer and …, 2015
672015
Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services
D Nunez, I Agudo, J Lopez
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
532012
Cryptography goes to the cloud
I Agudo, D Nuñez, G Giammatteo, P Rizomiliotis, C Lambrinoudakis
Secure and Trust Computing, Data Management, and Applications: STA 2011 …, 2011
532011
Managing Incidents in Smart Grids à la Cloud
C Alcaraz, I Agudo, D Nunez, J Lopez
IEEE Third International Conference on Cloud Computing Technology and …, 2011
392011
A model for trust metrics analysis
I Agudo, C Fernandez-Gago, J Lopez
International Conference on Trust, Privacy and Security in Digital Business …, 2008
372008
A methodology for security assurance-driven system development
JL Vivas, I Agudo, J López
Requirements Engineering, 1-19, 2011
332011
A representation model of trust relationships with delegation extensions
I Agudo, J Lopez, J Montenegro
3th International Conference on Trust Management (iTRUST'05), 9-22, 2005
262005
A blockchain approach for decentralized V2X (D-V2X)
I Agudo, M Montenegro-Gómez, J Lopez
IEEE Transactions on Vehicular Technology 70 (5), 4001-4010, 2020
252020
Identity management challenges for intercloud applications
D Núñez, I Agudo, P Drogkaris, S Gritzalis
Secure and Trust Computing, Data Management, and Applications: STA 2011 …, 2011
232011
A parametric family of attack models for proxy re-encryption
D Nunez, I Agudo, J Lopez
2015 IEEE 28th Computer Security Foundations Symposium, 290-301, 2015
222015
Building trust from context similarity measures
C Fernandez-Gago, I Agudo, J Lopez
Computer Standards & Interfaces 36 (4), 792-800, 2014
222014
High-performance access management and data protection for distributed messaging applications
M Egorov, MLS Wilkison, D Nu, I Agudo
US Patent 10,574,440, 2020
212020
A privacy-aware continuous authentication scheme for proximity-based access control
I Agudo, R Rios, J Lopez
Computers & security 39, 117-126, 2013
212013
A scale based trust model for multi-context environments
I Agudo, C Fernandez-Gago, J Lopez
Computers & Mathematics with Applications 60 (2), 209-216, 2010
202010
Method and system for secure delegated access to encrypted data in big data computing clusters
M Egorov, MLS Wilkison, D Nu, I Agudo
US Patent 10,581,603, 2020
142020
Delegated access for hadoop clusters in the cloud
D Nunez, I Agudo, J Lopez
2014 IEEE 6th International Conference on Cloud Computing Technology and …, 2014
112014
An evolutionary trust and distrust model
I Agudo, C Fernández-Gago, J Lopez
Electronic Notes in Theoretical Computer Science 244, 3-12, 2009
102009
The system can't perform the operation now. Try again later.
Articles 1–20