A first approach to provide anonymity in attribute certificates V Benjumea, J Lopez, JA Montenegro, JM Troya Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004 | 56 | 2004 |
Towards a business process-driven framework for security engineering with the UML JL Vivas, JA Montenegro, J López International Conference on Information Security, 381-395, 2003 | 46 | 2003 |
A business process-driven approach to security engineering A Mana, JA Montenegro, C Rudolph, JL Vivas 14th International Workshop on Database and Expert Systems Applications …, 2003 | 40 | 2003 |
Specification and design of advanced authentication and authorization services J Lopez, JA Montenegro, JL Vivas, E Okamoto, E Dawson Computer Standards & Interfaces 27 (5), 467-478, 2005 | 36 | 2005 |
Energy-aware environments for the development of green applications for cyber–physical systems DJ Munoz, JA Montenegro, M Pinto, L Fuentes Future Generation Computer Systems 91, 536-554, 2019 | 30 | 2019 |
BAAI: biometric authentication and authorization infrastructure E Dawson, J Lopez, JA Montenegro, E Okamoto International Conference on Information Technology: Research and Education …, 2003 | 28 | 2003 |
Pervasive authentication and authorization infrastructures for mobile users J Forné, F Hinarejos, A Marín, F Almenárez, J Lopez, JA Montenegro, ... Computers & Security 29 (4), 501-514, 2010 | 27 | 2010 |
A reference model for authentication and authorisation infrastructures respecting privacy and flexibility in b2c eCommerce C Schlager, T Nowey, JA Montenegro First International Conference on Availability, Reliability and Security …, 2006 | 24 | 2006 |
A representation model of trust relationships with delegation extensions I Agudo, J Lopez, JA Montenegro Trust Management: Third International Conference, iTrust 2005, Paris, France …, 2005 | 24 | 2005 |
Secure sealed-bid online auctions using discreet cryptographic proofs JA Montenegro, MJ Fischer, J Lopez, R Peralta Mathematical and Computer Modelling 57 (11-12), 2583–2595, 2013 | 20 | 2013 |
A new design of privilege management infrastructure for organizations using outsourced PKI E Dawson, J Lopez, JA Montenegro, E Okamoto Information Security: 5th International Conference, ISC 2002 Sao Paulo …, 2002 | 17 | 2002 |
Service-oriented security architecture for CII based on sensor networks J Lopez, JA Montenegro, R Roman Second International Workshop on Security, Privacy and Trust in Pervasive …, 2006 | 15 | 2006 |
What do software developers need to know to build secure energy-efficient android applications? JA Montenegro, M Pinto, L Fuentes IEEE Access 6, 1428-1450, 2017 | 11 | 2017 |
A practical approach of X. 509 attribute certificate framework as support to obtain privilege delegation JA Montenegro, F Moya European Public Key Infrastructure Workshop, 160-172, 2004 | 11 | 2004 |
Grid security architecture: Requirements, fundamentals, standards and models JL Vivas, J Lopez, JA Montenegro Security in distributed, Grid, mobile, and pervasive computing, 255-288, 2007 | 10 | 2007 |
PKI design based on the use of on-line certification authorities J Lopez, A Mana, JA Montenegro, JJ Ortega International Journal of Information Security 2, 91-102, 2004 | 10 | 2004 |
A practical solution for sealed bid and multi-currency auctions JA Montenegro, J Lopez Computers & security 45, 186-198, 2014 | 6 | 2014 |
Enabling attribute delegation in ubiquitous environments I Agudo, J Lopez, JA Montenegro Mobile Networks and Applications 13, 398-410, 2008 | 6 | 2008 |
Consumer preferences and implicit prices of smartphone characteristics JA Montenegro, JL Torres Universidad de Málaga, Department of Economic Theory, Málaga Economic Theory …, 2016 | 5 | 2016 |
On the deployment of a real scalable delegation service J Lopez, I Agudo, JA Montenegro Information Security Technical Report 12 (3), 139-146, 2007 | 5 | 2007 |