Jose Antonio Montenegro
Jose Antonio Montenegro
Profesor Titular Universidad en ETSI Informatica (Universidad de Málaga)
Verified email at - Homepage
Cited by
Cited by
A first approach to provide anonymity in attribute certificates
V Benjumea, J Lopez, JA Montenegro, JM Troya
International Workshop on Public Key Cryptography, 402-415, 2004
Towards a business process-driven framework for security engineering with the UML
JL Vivas, JA Montenegro, J López
International Conference on Information Security, 381-395, 2003
Specification and design of advanced authentication and authorization services
J Lopez, JA Montenegro, JL Vivas, E Okamoto, E Dawson
Computer Standards & Interfaces 27 (5), 467-478, 2005
A business process-driven approach to security engineering
A Mana, JA Montenegro, C Rudolph, JL Vivas
14th International Workshop on Database and Expert Systems Applications …, 2003
Pervasive authentication and authorization infrastructures for mobile users
J Forné, F Hinarejos, A Marín, F Almenárez, J Lopez, JA Montenegro, ...
Computers & Security 29 (4), 501-514, 2010
BAAI: biometric authentication and authorization infrastructure
E Dawson, J Lopez, JA Montenegro, E Okamoto
International Conference on Information Technology: Research and Education …, 2003
A reference model for authentication and authorisation infrastructures respecting privacy and flexibility in b2c eCommerce
C Schlager, T Nowey, JA Montenegro
First International Conference on Availability, Reliability and Security …, 2006
A representation model of trust relationships with delegation extensions
I Agudo, J Lopez, JA Montenegro
International Conference on Trust Management, 116-130, 2005
Energy-aware environments for the development of green applications for cyber–physical systems
DJ Munoz, JA Montenegro, M Pinto, L Fuentes
Future Generation Computer Systems 91, 536-554, 2019
A new design of privilege management infrastructure for organizations using outsourced PKI
E Dawson, J Lopez, JA Montenegro, E Okamoto
International Conference on Information Security, 136-149, 2002
Secure sealed-bid online auctions using discreet cryptographic proofs
JA Montenegro, MJ Fischer, J Lopez, R Peralta
Mathematical and Computer Modelling 57 (11-12), 2583–2595, 2013
Service-oriented security architecture for CII based on sensor networks
J Lopez, JA Montenegro, R Roman
Second International Workshop on Security, Privacy and Trust in Pervasive …, 2006
Grid Security Architecture: Requirements, Fundamentals, Standards and Models
JL Vivas, J Lopez, JA Montenegro
Security in distributed, Grid, mobile, and pervasive computing, 255-288, 2007
A practical approach of X. 509 attribute certificate framework as support to obtain privilege delegation
JA Montenegro, F Moya
European Public Key Infrastructure Workshop, 160-172, 2004
What do software developers need to know to build secure energy-efficient Android applications?
JA Montenegro, M Pinto, L Fuentes
IEEE Access 6, 1428-1450, 2017
PKI design based on the use of on-line certification authorities
J Lopez, A Mana, JA Montenegro, JJ Ortega
International Journal of Information Security 2 (2), 91-102, 2004
A practical solution for sealed bid and multi-currency auctions
JA Montenegro, J Lopez
Computers & security 45, 186-198, 2014
Enabling attribute delegation in ubiquitous environments
I Agudo, J Lopez, JA Montenegro
Mobile Networks and Applications 13 (3), 398-410, 2008
On the deployment of a real scalable delegation service
J Lopez, I Agudo, JA Montenegro
Information Security Technical Report 12 (3), 139-146, 2007
Automatización de un Sistema Predictivo de Deserción Estudiantil en la UNI Norte, integrado al SIRA
J Montenegro, A López, E Fonseca
Estelí: UNI Norte. Recuperado de http://ribuni. uni. edu. ni/937/1/26048. pdf, 2011
The system can't perform the operation now. Try again later.
Articles 1–20