Match me if you can: Matchmaking encryption and its applications G Ateniese, D Francati, D Nuñez, D Venturi Annual International Cryptology Conference, 701-731, 2019 | 89 | 2019 |
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation D Nuñez, I Agudo, J Lopez Journal of Network and Computer Applications 87, 193-209, 2017 | 88 | 2017 |
BlindIdM: A privacy-preserving approach for identity management as a service D Nuñez, I Agudo International Journal of Information Security 13 (2), 199-215, 2014 | 70 | 2014 |
NTRUReEncrypt: An efficient proxy re-encryption scheme based on NTRU D Nuñez, I Agudo, J Lopez Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 69 | 2015 |
Nucypher KMS: decentralized key management system M Egorov, ML Wilkison, D Nuñez arXiv preprint arXiv:1707.06140, 2017 | 54 | 2017 |
Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services D Nuñez, I Agudo, J Lopez IEEE CloudCom 2012, 2012 | 54 | 2012 |
Cryptography goes to the cloud I Agudo, D Nuñez, G Giammatteo, P Rizomiliotis, C Lambrinoudakis FTRA International Conference on Secure and Trust Computing, Data Management …, 2011 | 54 | 2011 |
Managing Incidents in Smart Grids à la Cloud C Alcaraz, I Agudo, D Nunez, J Lopez IEEE CloudCom 2011, 2011 | 40 | 2011 |
Towards a model of accountability for cloud computing services D Catteddu, M Felici, G Hogben, A Holcroft, E Kosta, R Leenes, C Millard, ... Pre-Proceedings of International Workshop on Trustworthiness, Accountability …, 2013 | 36 | 2013 |
A Metamodel for Measuring Accountability Attributes in the Cloud D Nunez, C Fernandez-Gago, S Pearson, M Felici 2013 IEEE International Conference on Cloud Computing Technology and Science …, 2013 | 35 | 2013 |
UMBRAL: A THRESHOLD PROXY RE-ENCRYPTION SCHEME D NUNEZ | 26* | |
Identity management challenges for intercloud applications D Núñez, I Agudo, P Drogkaris, S Gritzalis FTRA International Conference on Secure and Trust Computing, Data Management …, 2011 | 23 | 2011 |
A parametric family of attack models for proxy re-encryption D Nunez, I Agudo, J Lopez 2015 IEEE 28th Computer Security Foundations Symposium, 290-301, 2015 | 22 | 2015 |
Eliciting metrics for accountability of cloud systems D Nuñez, C Fernández-Gago, J Luna Computers & Security 62, 149-164, 2016 | 16 | 2016 |
NuCypher: A proxy re-encryption network to empower privacy in decentralized systems M Egorov, D Nuñez, ML Wilkison NuCypher whitepaper, 2018 | 15 | 2018 |
Delegated Access for Hadoop Clusters in the Cloud D Nuñez, I Agudo, J Lopez IEEE 6th International Conference on Cloud Computing Technology and Science …, 2014 | 12 | 2014 |
Privacy-Preserving Identity Management as a Service D Nuñez, I Agudo, J Lopez Summer School on Accountability and Security in the Cloud, 114-125, 2014 | 8 | 2014 |
On the application of generic CCA‐secure transformations to proxy re‐encryption D Nuñez, I Agudo, J Lopez Security and Communication Networks 9 (12), 1769-1785, 2016 | 7 | 2016 |
Tools for Cloud Accountability: A4Cloud Tutorial C Fernandez-Gago, V Tountopoulos, S Fischer-Hübner, R Alnemr, ... IFIP International Summer School on Privacy and Identity Management, 219-236, 2014 | 6 | 2014 |
Metrics for Accountability in the Cloud C Fernández-Gago, D Nuñez Summer School on Accountability and Security in the Cloud, 129-153, 2014 | 6 | 2014 |