Publications (65) ISAAC AGUDO RUIZ publications

filter_list

2024

  1. Diseño de un Grado en Ciberseguridad e Inteligencia Artificial

    IX Jornadas Nacionales de Investigación En Ciberseguridad

2023

  1. An empirical evaluation of BLE for ITS scenarios

    IEEE Vehicular Technology Conference

  2. Integration of MPC into Besu through an extended private transaction model

    Proceedings - 2023 IEEE International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023

  3. Private set intersection: A systematic literature review

    Computer Science Review, Vol. 49

2022

  1. Learning Multi-Party Adversarial Encryption and Its Application to Secret Sharing

    IEEE Access, Vol. 10, pp. 121329-121339

  2. Real-time Crowd Counting based on Wearable Ephemeral IDs

    Proceedings of the International Conference on Security and Cryptography

2021

  1. A Blockchain Approach for Decentralized V2X (D-V2X)

    IEEE Transactions on Vehicular Technology, Vol. 70, Núm. 5, pp. 4001-4010

2019

  1. Comunicaciones VoIP cifradas usando Intel SGX

    Actas de las V Jornadas Nacionales de Ciberseguridad: junio 5-7, 2019. Cáceres

  2. Escrowed decryption protocols for lawful interception of encrypted data

    IET Information Security, Vol. 13, Núm. 5, pp. 498-507

  3. Personalized computer security tasks with automatic evaluation and feedback

    Proceedings of the 2019 SIGED International Conference on Information Systems Education and Research

2017

  1. Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation

    Journal of Network and Computer Applications, Vol. 87, pp. 193-209

  2. The fallout of key compromise in a proxy-mediated key agreement protocol

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2016

  1. A technique for enhanced provision of appropriate access to evidence across service provision chains

    IFIP Advances in Information and Communication Technology

  2. LockPic: Privacy preserving photo sharing in social networks

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  3. On the application of generic CCA-secure transformations to proxy re-encryption

    Security and Communication Networks

2015

  1. A Parametric Family of Attack Models for Proxy Re-encryption

    Proceedings of the Computer Security Foundations Workshop

  2. Entornos virtuales y presenciales de enseñanza-aprendizaje: la motivación como objetivo

    Actas de las IV Jornadas Innovación Educativa y Enseñanza Virtual de la Universidad de Málaga (Universidad de Málaga (UMA)), pp. 7

  3. Is the world ready or do we need more tools for programming related teamwork?

    ACM International Conference Proceeding Series