default search action
José María Sierra
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j29]Oscar Delgado-Mohatar, José María Sierra Camara, Eloy Anguiano:
Blockchain-based semi-autonomous ransomware. Future Gener. Comput. Syst. 112: 589-603 (2020) - [c28]Diego Romero, Mario Sánchez, José M. Sierra, Maximiliano Miranda, Federico Peinado:
Developing an automated planning tool for non-player character behavior. CoSECivi 2020: 69-77
2010 – 2019
- 2019
- [j28]Fidel Paniagua Diez, Diego Suarez Touceda, José María Sierra Camara, Sherali Zeadally:
Lightweight Access Control System for Wearable Devices. IT Prof. 21(1): 50-58 (2019) - 2018
- [j27]José María Sierra, Aurora Vizcaíno, Marcela Genero, Mario Piattini:
A systematic mapping study about socio-technical congruence. Inf. Softw. Technol. 94: 111-129 (2018) - 2017
- [j26]Fidel Paniagua Diez, Amrutha Chikkanayakanahalli Vasu, Diego Suarez Touceda, José María Sierra Camara:
Modeling XACML Security Policies Using Graph Databases. IT Prof. 19(6): 52-57 (2017) - 2016
- [j25]Nele Mentens, Damien Sauveron, José M. Sierra, Shiuh-Jeng Wang, Isaac Woungang:
Guest Editorial. IET Inf. Secur. 10(5): 223-224 (2016) - 2015
- [j24]Diego Suarez Touceda, José María Sierra Camara, Sherali Zeadally, Miguel Soriano:
Attribute-based authorization for structured Peer-to-Peer (P2P) networks. Comput. Stand. Interfaces 42: 71-83 (2015) - [j23]Fidel Paniagua Diez, Diego Suarez Touceda, José Sierra Camara, Sherali Zeadally:
Toward self-authenticable wearable devices. IEEE Wirel. Commun. 22(1): 36-43 (2015) - 2012
- [j22]Diego Suarez Touceda, José María Sierra, Antonio Izquierdo, Henning Schulzrinne:
Survey of Attacks and Defenses on P2PSIP Communications. IEEE Commun. Surv. Tutorials 14(3): 750-783 (2012) - [j21]Jesús Téllez Isaac, Sherali Zeadally, José Sierra Camara:
A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs). Electron. Commer. Res. 12(1): 97-123 (2012) - [j20]Diego Suarez Touceda, José Sierra Camara, Miguel Soriano:
Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems. Peer-to-Peer Netw. Appl. 5(2): 105-124 (2012) - 2011
- [j19]Oscar Delgado-Mohatar, Amparo Fúster-Sabater, José M. Sierra:
A light-weight authentication scheme for wireless sensor networks. Ad Hoc Networks 9(5): 727-735 (2011) - [j18]Oscar Delgado-Mohatar, Amparo Fúster-Sabater, José M. Sierra:
Performance evaluation of highly efficient techniques for software implementation of LFSR. Comput. Electr. Eng. 37(6): 1222-1231 (2011) - [j17]Diego Suarez Touceda, José Sierra Camara, L. Javier García-Villalba, Joaquín Torres Márquez:
Advantages of identity certificate segregation in P2PSIP systems. IET Commun. 5(6): 879-889 (2011) - 2010
- [j16]Jesús Téllez Isaac, Sherali Zeadally, José Sierra Camara:
Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks. Electron. Commer. Res. 10(2): 209-233 (2010) - [j15]Jesús Téllez Isaac, Sherali Zeadally, José Sierra Camara:
Security attacks and solutions for vehicular ad hoc networks. IET Commun. 4(7): 894-903 (2010) - [c27]Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, Amparo Fúster-Sabater:
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks. WISTP 2010: 332-339
2000 – 2009
- 2009
- [j14]Mildrey Carbonell, José María Sierra, Javier López:
Secure multiparty payment with an intermediary entity. Comput. Secur. 28(5): 289-300 (2009) - [j13]Antonio Izquierdo, José María Sierra, Joaquín Torres Márquez:
An analysis of conformance issues in implementations of standardized security protocols. Comput. Stand. Interfaces 31(1): 246-251 (2009) - [c26]Fernando Sánchez-Chaparro, José M. Sierra, Oscar Delgado-Mohatar, Amparo Fúster-Sabater:
Testing Topologies for the Evaluation of IPSEC Implementations. ICCSA (2) 2009: 145-154 - 2008
- [j12]Jesús Téllez Isaac, José Sierra Camara, Sherali Zeadally, Joaquín Torres Márquez:
A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks. Comput. Commun. 31(10): 2478-2484 (2008) - [c25]Joaquín Torres Márquez, Mildrey Carbonell, Jesús Téllez Isaac, José María Sierra:
Application of Network Smart Cards to Citizens Identification Systems. CARDIS 2008: 241-254 - [c24]Mildrey Carbonell, Joaquín Torres Márquez, Diego Suarez Touceda, José María Sierra, Jesús Téllez Isaac:
Secure e-payment protocol with new involved entities. CTS 2008: 103-111 - [c23]Joaquín Torres Márquez, Antonio Izquierdo, Mildrey Carbonell, José María Sierra:
Network Smart Card Performing U(SIM) Functionalities in AAA Protocol Architectures. WISTP 2008: 92-105 - 2007
- [j11]Joaquín Torres Márquez, Antonio Izquierdo, José María Sierra:
Advances in network smart cards authentication. Comput. Networks 51(9): 2249-2261 (2007) - [c22]Jesús Téllez Isaac, José Sierra Camara:
An Anonymous Account-Based Mobile Payment Protocol for a Restricted Connectivity Scenario. DEXA Workshops 2007: 688-692 - [c21]Mildrey Carbonell, José María Sierra, Joaquín Torres Márquez, Antonio Izquierdo:
Security analysis of a new multi-party payment protocol with intermediary service. DEXA Workshops 2007: 698-702 - [c20]Jesús Téllez Isaac, José Sierra Camara:
A Secure Payment Protocol for Restricted Connectivity Scenarios in M-Commerce. EC-Web 2007: 1-10 - [c19]Antonio Izquierdo, Joaquín Torres Márquez, José María Sierra, Mildrey Carbonell:
Using Adaptative Encryption for Ubiquitous Environments. ICCSA (2) 2007: 540-548 - [c18]Mildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier López, Jianying Zhou:
Estimation of TTP Features in Non-repudiation Service. ICCSA (2) 2007: 549-558 - 2006
- [j10]José María Sierra:
Editorial for the special issue on Internet Communications Security. Comput. Commun. 29(15): 2737-2738 (2006) - [j9]Antonio Izquierdo Manzanares, José María Sierra, Joaquín Torres Márquez:
On the implementation of security policies with adaptative encryption. Comput. Commun. 29(15): 2750-2758 (2006) - [j8]Joaquín Torres Márquez, Antonio Izquierdo, José María Sierra, Arturo Ribagorda:
Towards self-authenticable smart cards. Comput. Commun. 29(15): 2781-2787 (2006) - [j7]Jesús Téllez Isaac, José Sierra Camara, Antonio Izquierdo Manzanares, Joaquín Torres Márquez:
Anonymous Payment in a Kiosk Centric Model using Digital signature scheme with message recovery and Low Computational Power Devices. J. Theor. Appl. Electron. Commer. Res. 1(2): 1-11 (2006) - [c17]Jesús Téllez Isaac, José Sierra Camara, Antonio Izquierdo Manzanares, Mildrey Carbonell Castro:
Payment in a Kiosk Centric Model with Mobile and Low Computational Power Devices. ICCSA (5) 2006: 798-807 - 2005
- [j6]Julio César Hernández Castro, José María Sierra, André Seznec, Antonio Izquierdo, Arturo Ribagorda:
The strict avalanche criterion randomness test. Math. Comput. Simul. 68(1): 1-7 (2005) - [c16]José María Sierra, Julio César Hernández Castro, Eva Ponce, Jaime Manera:
Marketing on Internet Communications Security for Online Bank Transactions. ICCSA (4) 2005: 1301-1308 - [c15]Almudena Alcaide, Juan M. Estévez-Tapiador, Antonio Izquierdo, José María Sierra:
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol. ICCSA (4) 2005: 1309-1318 - 2004
- [j5]José María Sierra, Julio César Hernández Castro, Narayana Jayaram, Arturo Ribagorda:
Low computational cost integrity for block ciphers. Future Gener. Comput. Syst. 20(5): 857-863 (2004) - [j4]Julio César Hernández Castro, José María Sierra, Arturo Ribagorda:
Beware of the Security Software. Inf. Secur. J. A Glob. Perspect. 12(6): 39-45 (2004) - [c14]Antonio Izquierdo, José María Sierra, Julio César Hernández Castro, Arturo Ribagorda:
Security Issues in Network File Systems. ICCSA (1) 2004: 812-820 - [c13]José María Sierra, Julio César Hernández Castro, Almudena Alcaide, Joaquín Torres Márquez:
Validating the Use of BAN LOGIC. ICCSA (1) 2004: 851-858 - [c12]Julio César Hernández Castro, José María Sierra, André Seznec:
The SAC Test: A New Randomness Test, with Some Applications to PRNG Analysis. ICCSA (1) 2004: 960-967 - [c11]José María Sierra, Julio César Hernández Castro, Antonio Izquierdo, Arturo Ribagorda:
Secure Communications in Multi-Agent Systems Protecting KQML. WOSIS 2004: 305-313 - 2003
- [c10]Carlos Javier Hernández-Castro, L. Javier García-Villalba, Julio César Hernández Castro, José María Sierra:
On MARS's s-boxes Strength against Linear Cryptanalysis. ICCSA (3) 2003: 79-83 - [c9]José María Sierra, Julio César Hernández Castro, Eva Ponce, Arturo Ribagorda:
Protection of Multiagent Systems. ICCSA (3) 2003: 123-128 - 2002
- [c8]Julio César Hernández Castro, José María Sierra, Pedro Isasi, Arturo Ribagorda:
Genetic Cryptoanalysis of Two Rounds TEA. International Conference on Computational Science (3) 2002: 1024-1031 - 2001
- [j3]Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos:
Search Engines as a Security Threat. Computer 34(10): 25-30 (2001) - [j2]Julio C. Hernandez-Castro, Arturo Ribagorda, Pedro Isasi, José M. Sierra:
Genetic Algorithms Can be Used to Obtain Good Linear Congruential Generators. Cryptologia 25(3): 213-229 (2001) - [c7]Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos, J. Carlos Mex-Perera:
Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers. IMACC 2001: 374-377 - [c6]David Sánchez, Agustín Orfila, Julio César Hernández Castro, José María Sierra:
Robust New Method in Frequency Domain Watermarking. ISC 2001: 166-182 - [c5]Julio César Hernández Castro, Eva María Cebrián, José María Sierra, Arturo Ribagorda, Benjamín Ramos:
Project WebOracle: Developing an advanced web server security assesment tool. WebNet 2001: 526-529 - [c4]Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos:
Search Engines as a security thread. WebNet 2001: 530-533 - [c3]Javier Ignacio Carbó Rubiera, José María Sierra:
Fast and Secure Recommendations Protocols among Members of a Community of Agents. SEMAS 2001: 17-28 - 2000
- [j1]José María Sierra, Simon J. Shepherd:
New Phase 1 Exchange Mode for IKE framework. ACM SIGOPS Oper. Syst. Rev. 34(4): 34-40 (2000)
1990 – 1999
- 1999
- [c2]Alberto Muñoz, Arturo Ribagorda, José M. Sierra:
IPR techniques applied to a multimedia environment in the HYPERMEDIA project. Security and Watermarking of Multimedia Contents 1999: 125-133 - 1997
- [c1]Benjamín Ramos, José María Sierra, Daniel Garzón Rubio:
Modelo de Seguridad en Bases de Datos: Autenticación Mediante Contraseñas de Un Solo Uso y Cifrado Mediante un Sistema Pseudo-asimétrico. JIDBD 1997: 189-190
Coauthor Index
aka: Julio C. Hernandez-Castro
aka: Antonio Izquierdo
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint