关注
Jose Antonio Montenegro
Jose Antonio Montenegro
Profesor Titular Universidad en ETSI Informatica (Universidad de Málaga)
在 lcc.uma.es 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A first approach to provide anonymity in attribute certificates
V Benjumea, J Lopez, JA Montenegro, JM Troya
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004
562004
Towards a business process-driven framework for security engineering with the UML
JL Vivas, JA Montenegro, J López
International Conference on Information Security, 381-395, 2003
462003
A business process-driven approach to security engineering
A Mana, JA Montenegro, C Rudolph, JL Vivas
14th International Workshop on Database and Expert Systems Applications …, 2003
402003
Specification and design of advanced authentication and authorization services
J Lopez, JA Montenegro, JL Vivas, E Okamoto, E Dawson
Computer Standards & Interfaces 27 (5), 467-478, 2005
372005
Energy-aware environments for the development of green applications for cyber–physical systems
DJ Munoz, JA Montenegro, M Pinto, L Fuentes
Future Generation Computer Systems 91, 536-554, 2019
272019
Pervasive authentication and authorization infrastructures for mobile users
J Forné, F Hinarejos, A Marín, F Almenárez, J Lopez, JA Montenegro, ...
Computers & Security 29 (4), 501-514, 2010
272010
BAAI: biometric authentication and authorization infrastructure
E Dawson, J Lopez, JA Montenegro, E Okamoto
International Conference on Information Technology: Research and Education …, 2003
272003
A reference model for authentication and authorisation infrastructures respecting privacy and flexibility in b2c eCommerce
C Schlager, T Nowey, JA Montenegro
First International Conference on Availability, Reliability and Security …, 2006
252006
A representation model of trust relationships with delegation extensions
I Agudo, J Lopez, JA Montenegro
Trust Management: Third International Conference, iTrust 2005, Paris, France …, 2005
242005
Secure sealed-bid online auctions using discreet cryptographic proofs
JA Montenegro, MJ Fischer, J Lopez, R Peralta
Mathematical and Computer Modelling 57 (11-12), 2583–2595, 2013
192013
A new design of privilege management infrastructure for organizations using outsourced PKI
E Dawson, J Lopez, JA Montenegro, E Okamoto
Information Security: 5th International Conference, ISC 2002 Sao Paulo …, 2002
172002
Service-oriented security architecture for CII based on sensor networks
J Lopez, JA Montenegro, R Roman
Second International Workshop on Security, Privacy and Trust in Pervasive …, 2006
152006
What do software developers need to know to build secure energy-efficient android applications?
JA Montenegro, M Pinto, L Fuentes
IEEE Access 6, 1428-1450, 2017
112017
Grid security architecture: Requirements, fundamentals, standards and models
JL Vivas, J Lopez, JA Montenegro
Security in distributed, Grid, mobile, and pervasive computing, 255-288, 2007
112007
A practical approach of X. 509 attribute certificate framework as support to obtain privilege delegation
JA Montenegro, F Moya
European Public Key Infrastructure Workshop, 160-172, 2004
112004
PKI design based on the use of on-line certification authorities
J Lopez, A Mana, JA Montenegro, JJ Ortega
International Journal of Information Security 2, 91-102, 2004
102004
A practical solution for sealed bid and multi-currency auctions
JA Montenegro, J Lopez
Computers & security 45, 186-198, 2014
62014
Enabling attribute delegation in ubiquitous environments
I Agudo, J Lopez, JA Montenegro
Mobile Networks and Applications 13, 398-410, 2008
62008
On the deployment of a real scalable delegation service
J Lopez, I Agudo, JA Montenegro
Information Security Technical Report 12 (3), 139-146, 2007
52007
Consumer preferences and implicit prices of smartphone characteristics
JA Montenegro, JL Torres
Universidad de Málaga, Department of Economic Theory, Málaga Economic Theory …, 2016
42016
系统目前无法执行此操作,请稍后再试。
文章 1–20