@inproceedings {1840,
title = {Game Theory-Based Approach for Defense against APTs},
booktitle = {18th International Conference on Applied Cryptography and Network Security (ACNS{\textquoteright}20)},
volume = {12147},
year = {2020},
month = {10/2020},
pages = {297-320},
publisher = {Springer},
organization = {Springer},
isbn = {978-3-030-57878-7},
doi = {https://doi.org/10.1007/978-3-030-57878-7_15},
author = {Juan E. Rubio and Cristina Alcaraz and Javier Lopez}
}
@inproceedings {Agudo2006a,
title = {Graphical Representation of Authorization Policies for Weighted Credentials},
booktitle = {11th Australasian Conference on Information Security and Privacy (ACISP{\textquoteright}06)},
series = {LNCS},
volume = {4058},
year = {2006},
pages = {383-394},
publisher = {Springer},
organization = {Springer},
address = {Melbourne, Australia},
abstract = {This paper elaborates on a solution to represent authorization and delegation in a graphical way, allowing users to better interpret delegation relationships. We make use of Weighted Trust Graph (WTG) as an instrument to represent delegation and authorization, extending it to cope with more complicated concepts, and providing a graphical representation of the level of confidence that exists between two entities regarding a resource or attribute. We represent the level of confidence for each pair of entities as a point in an axis diagram, as a set of points, or as a set of triangular regions depending on the accuracy we need. Then, we use the same diagram to represent the set of acceptable confidence level, that we call authorization policy set. In this way, a single diagram can be used to decide about authorization, thus providing a powerful tool for systems in which interaction of users is needed.

},
isbn = {978-3-540-35458-1},
issn = {0302-9743 (Print) 1611-3349 (Online)},
doi = {10.1007/11780656_32},
author = {Isaac Agudo and Javier Lopez and Jose A. Montenegro}
}
@inproceedings {JavierLopez1996,
title = {Generaci{\'o}n de N{\'u}meros Primos mediante Tests de Primalidad Probabil{\'\i}stas},
booktitle = {IV Reuni{\'o}n Espa{\~n}ola de Criptolog{\'\i}a (IV REC)},
year = {1996},
month = {Septiembre},
pages = {27-33},
address = {Valladolid, Espa},
abstract = {*Nowadays cryptography is present in nearly every aspect of our everyday life, in particular public-key cryptosystems. Some of them have a mathematical foundation of number theory working with big integer numbers. Factoring these numbers is more complex and time-consuming than generating and testing prime numbers; this is the main reason for the strenght of some public key cryptosystems. This paper presents three different probabilistic methods for testing big prime numbers in a reasonable amount of time. A comparison of their efficiency to test prime numbers is also introduced.*

},
author = {Javier Lopez and Francisco Ona and Lucia Pino and Carlos Maraval}
}