Follow
David Nuñez
David Nuñez
Cryptography R&D at NuCypher Inc.
Verified email at nucypher.com - Homepage
Title
Cited by
Cited by
Year
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation
D Nuñez, I Agudo, J Lopez
Journal of Network and Computer Applications 87, 193-209, 2017
772017
BlindIdM: A privacy-preserving approach for identity management as a service
D Nuñez, I Agudo
International Journal of Information Security 13 (2), 199-215, 2014
682014
NTRUReEncrypt: An efficient proxy re-encryption scheme based on NTRU
D Nuñez, I Agudo, J Lopez
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
672015
Match me if you can: Matchmaking encryption and its applications
G Ateniese, D Francati, D Nuñez, D Venturi
Annual International Cryptology Conference, 701-731, 2019
662019
Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services
D Nuñez, I Agudo, J Lopez
IEEE CloudCom 2012, 2012
532012
Cryptography goes to the cloud
I Agudo, D Nuñez, G Giammatteo, P Rizomiliotis, C Lambrinoudakis
FTRA International Conference on Secure and Trust Computing, Data Management …, 2011
532011
Nucypher KMS: decentralized key management system
M Egorov, ML Wilkison, D Nuñez
arXiv preprint arXiv:1707.06140, 2017
522017
Managing Incidents in Smart Grids à la Cloud
C Alcaraz, I Agudo, D Nunez, J Lopez
IEEE CloudCom 2011, 2011
392011
Towards a model of accountability for cloud computing services
D Catteddu, M Felici, G Hogben, A Holcroft, E Kosta, R Leenes, C Millard, ...
Pre-Proceedings of International Workshop on Trustworthiness, Accountability …, 2013
352013
A Metamodel for Measuring Accountability Attributes in the Cloud
D Nunez, C Fernandez-Gago, S Pearson, M Felici
2013 IEEE International Conference on Cloud Computing Technology and Science …, 2013
352013
Identity management challenges for intercloud applications
D Núñez, I Agudo, P Drogkaris, S Gritzalis
FTRA International Conference on Secure and Trust Computing, Data Management …, 2011
232011
UMBRAL: A THRESHOLD PROXY RE-ENCRYPTION SCHEME
D NUNEZ
23*
A parametric family of attack models for proxy re-encryption
D Nunez, I Agudo, J Lopez
2015 IEEE 28th Computer Security Foundations Symposium, 290-301, 2015
222015
Eliciting metrics for accountability of cloud systems
D Nuñez, C Fernández-Gago, J Luna
Computers & Security 62, 149-164, 2016
152016
NuCypher: A proxy re-encryption network to empower privacy in decentralized systems
M Egorov, D Nuñez, ML Wilkison
NuCypher whitepaper, 2018
142018
Delegated Access for Hadoop Clusters in the Cloud
D Nuñez, I Agudo, J Lopez
IEEE 6th International Conference on Cloud Computing Technology and Science …, 2014
112014
Privacy-Preserving Identity Management as a Service
D Nuñez, I Agudo, J Lopez
Summer School on Accountability and Security in the Cloud, 114-125, 2014
82014
On the application of generic CCA‐secure transformations to proxy re‐encryption
D Nuñez, I Agudo, J Lopez
Security and Communication Networks 9 (12), 1769-1785, 2016
72016
Metrics for Accountability in the Cloud
C Fernández-Gago, D Nuñez
Summer School on Accountability and Security in the Cloud, 129-153, 2014
62014
Attacks to a proxy-mediated key agreement protocol based on symmetric encryption.
D Nuñez, I Agudo, J Lopez
IACR Cryptology ePrint Archive 2016, 1081, 2016
52016
The system can't perform the operation now. Try again later.
Articles 1–20