default search action
Vanesa Daza
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c35]Abhimanyu Rawat, Tarun Kumar Vangani, Hanno Cornelius, Vanesa Daza:
Accelerating Prolly Trees: Simplified Chunking for Rapid Updates. DLT 2024 - [c34]Conor McMenamin, Vanesa Daza:
A Blockchain-Based Decentralized and Incentive Compatible Distributed Computing Protocol. ICBC 2024: 240-244 - [c33]Conor McMenamin, Vanesa Daza:
Private, Anonymous, Collateralizable Commitments vs. MEV. ICBC 2024: 521-527 - 2023
- [c32]Conor McMenamin, Vanesa Daza:
An AMM minimizing user-level extractable value and loss-versus-rebalancing. DLT 2023 - [c31]Abhimanyu Rawat, Vanesa Daza, Matteo Signorini:
Not Enough IoT After All: Visiting Transactional Characteristics of IoT Blockchains. DLT 2023 - [c30]Conor McMenamin, Vanesa Daza, Bruno Mazorra:
An Automated Market Maker Minimizing Loss-Versus-Rebalancing. MARBLE 2023: 95-114 - [c29]Sonu Preetam, Maxime Compastié, Vanesa Daza, Shuaib Siddiqui:
An Approach for Intelligent Behaviour-Based Threat Modelling with Explanations. NFV-SDN 2023: 197-200 - [i33]Conor McMenamin, Vanesa Daza:
Dynamic, Private, Anonymous, Collateralizable Commitments vs. MEV. CoRR abs/2301.12818 (2023) - [i32]Conor McMenamin, Vanesa Daza:
An AMM minimizing user-level extractable value and loss-versus-rebalancing. CoRR abs/2301.13599 (2023) - 2022
- [j18]Federico Franzoni, Vanesa Daza:
SoK: Network-Level Attacks on the Bitcoin P2P Network. IEEE Access 10: 94924-94962 (2022) - [j17]Federico Franzoni, Vanesa Daza:
Clover: An anonymous transaction relay protocol for the bitcoin P2P network. Peer-to-Peer Netw. Appl. 15(1): 290-303 (2022) - [j16]Federico Franzoni, Xavier Salleras, Vanesa Daza:
AToM: Active topology monitoring for the bitcoin peer-to-peer network. Peer-to-Peer Netw. Appl. 15(1): 408-425 (2022) - [j15]Abhimanyu Rawat, Vanesa Daza, Matteo Signorini:
Offline Scaling of IoT Devices in IOTA Blockchain. Sensors 22(4): 1411 (2022) - [j14]Marta Bellés-Muñoz, Jordi Baylina Melé, Vanesa Daza, Jose L. Muñoz-Tapia:
New Privacy Practices for Blockchain Software. IEEE Softw. 39(3): 43-49 (2022) - [c28]Bruno Mazorra, Michael Reynolds, Vanesa Daza:
Price of MEV: Towards a Game Theoretical Approach to MEV. DeFi@CCS 2022: 15-22 - [c27]Conor McMenamin, Vanesa Daza, Matthias Fitzi, Padraic O'Donoghue:
FairTraDEX: A Decentralised Exchange Preventing Value Extraction. DeFi@CCS 2022: 39-46 - [c26]Vanesa Daza, Abida Haque, Alessandra Scafuro, Alexandros Zacharakis, Arantxa Zapico:
Mutual Accountability Layer: Accountable Anonymity Within Accountable Trust. CSCML 2022: 318-336 - [i31]Bruno Mazorra, Victor Adan, Vanesa Daza:
Do not rug on me: Zero-dimensional Scam Detection. CoRR abs/2201.07220 (2022) - [i30]Conor McMenamin, Vanesa Daza, Matthias Fitzi:
FairTraDEX: A Decentralised Exchange Preventing Value Extraction. CoRR abs/2202.06384 (2022) - [i29]Xavier Salleras, Sergi Rovira, Vanesa Daza:
FORT: Right-proving and Attribute-blinding Self-sovereign Authentication. CoRR abs/2202.09136 (2022) - [i28]Conor McMenamin, Vanesa Daza:
Marvel DC: A Blockchain-Based Decentralized and Incentive-Compatible Distributed Computing Protocol. CoRR abs/2207.14011 (2022) - [i27]Bruno Mazorra, Michael Reynolds, Vanesa Daza:
Price of MEV: Towards a Game Theoretical Approach to MEV. CoRR abs/2208.13464 (2022) - [i26]Conor McMenamin, Vanesa Daza, Bruno Mazorra:
Diamonds are Forever, Loss-Versus-Rebalancing is Not. CoRR abs/2210.10601 (2022) - [i25]Conor McMenamin, Vanesa Daza, Matthias Fitzi:
FairTraDEX: A Decentralised Exchange Preventing Value Extraction. IACR Cryptol. ePrint Arch. 2022: 155 (2022) - [i24]Bruno Mazorra, Victor Adan, Vanesa Daza:
Do not rug on me: zero-dimensional scam detection. IACR Cryptol. ePrint Arch. 2022: 350 (2022) - [i23]Vanesa Daza, Paz Morillo, Sergi Rovira:
Leveled Multikey FHE with constant-size ciphertexts from RLWE. IACR Cryptol. ePrint Arch. 2022: 447 (2022) - [i22]Conor McMenamin, Vanesa Daza, Bruno Mazorra:
Diamonds are Forever, Loss-Versus-Rebalancing is Not. IACR Cryptol. ePrint Arch. 2022: 1420 (2022) - 2021
- [c25]Conor McMenamin, Vanesa Daza, Matteo Pontecorvi:
Achieving state machine replication without honest players. AFT 2021: 1-14 - [c24]Luca Boldrin, Vanesa Daza, Roberto De Prisco, Sergi Rovira, Saverio Sivo:
A trust module for the interaction with virtual characters. ICSAI 2021: 1-8 - [i21]Federico Franzoni, Xavier Salleras, Vanesa Daza:
AToM: Active Topology Monitoring for the Bitcoin Peer-to-Peer Network. CoRR abs/2107.12912 (2021) - [i20]Federico Franzoni, Vanesa Daza:
Clover: an Anonymous Transaction Relay Protocol for the Bitcoin P2P Network. CoRR abs/2109.00376 (2021) - [i19]Vanesa Daza, Abida Haque, Alessandra Scafuro, Alexandros Zacharakis, Arantxa Zapico:
Mutual Accountability Layer: Accountable Anonymity within Accountable Trust. IACR Cryptol. ePrint Arch. 2021: 596 (2021) - [i18]Xavier Salleras, Vanesa Daza:
ZPiE: Zero-knowledge Proofs in Embedded systems. IACR Cryptol. ePrint Arch. 2021: 1382 (2021) - 2020
- [j13]Xavier Salleras, Vanesa Daza:
SANS: Self-Sovereign Authentication for Network Slices. Secur. Commun. Networks 2020: 8823573:1-8823573:8 (2020) - [c23]Federico Franzoni, Vanesa Daza:
Improving Bitcoin Transaction Propagation by Leveraging Unreachable Nodes. Blockchain 2020: 196-203 - [c22]Federico Franzoni, Iván Abellán Álvarez, Vanesa Daza:
Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems. Financial Cryptography 2020: 3-19 - [c21]Vanesa Daza, Carla Ràfols, Alexandros Zacharakis:
Updateable Inner Product Argument with Logarithmic Verifier and Applications. Public Key Cryptography (1) 2020: 527-557 - [i17]Federico Franzoni, Iván Abellán Álvarez, Vanesa Daza:
Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems. CoRR abs/2006.06036 (2020) - [i16]Federico Franzoni, Vanesa Daza:
Improving Bitcoin Transaction Propagation by Leveraging Unreachable Nodes. CoRR abs/2010.15070 (2020) - [i15]Xavier Salleras, Vanesa Daza:
SANS: Self-sovereign Authentication for Network Slices. CoRR abs/2010.15867 (2020) - [i14]Conor McMenamin, Vanesa Daza, Matteo Pontecorvi:
Achieving State Machine Replication without Honesty Assumptions. CoRR abs/2012.10146 (2020) - [i13]Vanesa Daza, Carla Ràfols, Alexandros Zacharakis:
Updateable Inner Product Argument with Logarithmic Verifier and Applications. IACR Cryptol. ePrint Arch. 2020: 1333 (2020) - [i12]Conor McMenamin, Vanesa Daza, Matteo Pontecorvi:
Achieving State Machine Replication without Honesty Assumptions. IACR Cryptol. ePrint Arch. 2020: 1580 (2020)
2010 – 2019
- 2019
- [c20]Vanesa Daza, Xavier Salleras:
LASER: Lightweight and Secure Remote Keyless Entry Protocol. ICETE (2) 2019: 372-377 - [c19]Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols, Javier Silva:
Shorter Quadratic QA-NIZK Proofs. Public Key Cryptography (1) 2019: 314-343 - [i11]Vanesa Daza, Xavier Salleras:
LASER: Lightweight And SEcure Remote keyless entry protocol (Extended version). CoRR abs/1905.05694 (2019) - [i10]Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols, Javier Silva:
Shorter Quadratic QA-NIZK Proofs. IACR Cryptol. ePrint Arch. 2019: 173 (2019) - 2017
- [c18]Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
CoLLIDE: CLoud Latency-based IDEntification. EUSPN/ICTH 2017: 81-88 - [c17]Vanesa Daza, Roberto Di Pietro, Ivan Klimek, Matteo Signorini:
CONNECT: CONtextual NamE disCovery for blockchain-based services in the IoT. ICC 2017: 1-6 - [c16]Vanesa Daza, Nikolaos Makriyannis:
Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions. TCC (1) 2017: 581-611 - [i9]Vanesa Daza, Nikolaos Makriyannis:
Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions. IACR Cryptol. ePrint Arch. 2017: 98 (2017) - 2016
- [j12]Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments. IEEE Trans. Dependable Secur. Comput. 13(2): 296-311 (2016) - 2015
- [c15]Joan Triay, Julià Minguillón, Teresa Sancho Vinuesa, Vanesa Daza:
Exploring the Effectiveness of Video Viewing in an Introductory x-MOOC of Algebra. CHANGEE/WAPLA/HybridEd@EC-TEL 2015: 63-70 - [p1]Vanesa Daza, Matteo Signorini:
Smart User Authentication for an Improved Data Privacy. Advanced Research in Data Privacy 2015: 345-363 - [i8]Tzeta Tsao, Roger K. Alexander, Mischa Dohler, Vanesa Daza, Angel Lozano, Michael C. Richardson:
A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs). RFC 7416: 1-40 (2015) - 2014
- [j11]Boris Bellalta, Azadeh Faridi, Jaume Barceló, Vanesa Daza, Miquel Oliver:
Performance analysis of a Multiuser Multi-Packet Transmission system for WLANs in non-saturation conditions. Comput. Networks 60: 88-100 (2014) - [c14]Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
SOLDI: Secure Off-Line Disposable CredIts to Secure Mobile Micro Payments. ICETE (Selected Papers) 2014: 340-362 - [c13]Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
FORCE - Fully Off-line secuRe CrEdits for Mobile Micro Payments. SECRYPT 2014: 125-136 - 2012
- [i7]Boris Bellalta, Azadeh Faridi, Jaume Barceló, Vanesa Daza, Miquel Oliver:
Queueing Analysis in Multiuser Multi-Packet Transmission Systems Using Spatial Multiplexing. CoRR abs/1207.3506 (2012) - 2011
- [j10]Boris Bellalta, Vanesa Daza, Miquel Oliver:
An Approximate Queueing Model for Multi-Rate Multi-User MIMO Systems. IEEE Commun. Lett. 15(4): 392-394 (2011) - [c12]Boris Bellalta, Vanesa Daza, Jaume Barceló, Miquel Oliver:
Buffer Sizing in TxSDMA Systems. MACOM 2011: 241-253 - 2010
- [j9]Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols:
Extensions of access structures and their cryptographic applications. Appl. Algebra Eng. Commun. Comput. 21(4): 257-284 (2010)
2000 – 2009
- 2009
- [j8]Vanesa Daza, Javier Herranz, Germán Sáez:
Flaws in some self-healing key distribution schemes with revocation. Inf. Process. Lett. 109(11): 523-526 (2009) - [j7]Vanesa Daza, Josep Domingo-Ferrer, Francesc Sebé, Alexandre Viejo:
Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 58(4): 1876-1886 (2009) - 2008
- [j6]Vanesa Daza, Javier Herranz, Germán Sáez:
On the Computational Security of a Distributed Key Distribution Scheme. IEEE Trans. Computers 57(8): 1087-1097 (2008) - [j5]Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró:
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes. IEEE Trans. Inf. Theory 54(6): 2644-2657 (2008) - [i6]Vanesa Daza, Javier Herranz, Germán Sáez:
Flaws in Some Self-Healing Key Distribution Schemes with Revocation. IACR Cryptol. ePrint Arch. 2008: 351 (2008) - [i5]Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols:
Extended Access Structures and Their Cryptographic Applications. IACR Cryptol. ePrint Arch. 2008: 502 (2008) - 2007
- [j4]Agusti Solanas, Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Vanesa Daza:
A distributed architecture for scalable private RFID tag identification. Comput. Networks 51(9): 2268-2279 (2007) - [j3]Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols:
Cryptographic techniques for mobile ad-hoc networks. Comput. Networks 51(18): 4938-4950 (2007) - [c11]Vanesa Daza, Josep Domingo-Ferrer:
On Partial Anonymity in Secret Sharing. EuroPKI 2007: 193-202 - [c10]Jordi Castellà-Roca, Vanesa Daza, Josep Domingo-Ferrer, Jesús A. Manjón, Francesc Sebé, Alexandre Viejo:
An Incentive-Based System for Information Providers over Peer-to-Peer Mobile Ad-Hoc Networks. MDAI 2007: 380-392 - [c9]Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols:
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. ProvSec 2007: 35-50 - [c8]Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols:
Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts. WCAN@ICALP 2007: 3-15 - [i4]Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols:
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. IACR Cryptol. ePrint Arch. 2007: 127 (2007) - 2006
- [c7]Jordi Castellà-Roca, Vanesa Daza, Josep Domingo-Ferrer, Francesc Sebé:
Privacy homomorphisms for e-gambling and mental poker. GrC 2006: 788-791 - [c6]Vanesa Daza, Paz Morillo, Carla Ràfols:
On Dynamic Distribution of Private Keys over MANETs. WCAN@ICALP 2006: 33-41 - 2005
- [c5]Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró:
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes. CRYPTO 2005: 327-343 - 2004
- [j2]Vanesa Daza, Javier Herranz, Germán Sáez:
Protocols useful on the Internet from distributed signature schemes. Int. J. Inf. Sec. 3(2): 61-69 (2004) - [j1]Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró:
Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures. Theor. Comput. Sci. 320(2-3): 269-291 (2004) - [i3]Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró:
On codes, matroids and secure multi-party computation from linear secret sharing schemes. IACR Cryptol. ePrint Arch. 2004: 245 (2004) - 2003
- [c4]Vanesa Daza, Javier Herranz, Germán Sáez:
Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join. ACISP 2003: 464-475 - [c3]Vanesa Daza, Javier Herranz, Germán Sáez:
Some Protocols Useful on the Internet from Threshold Signature Schemes. DEXA Workshops 2003: 359-363 - 2002
- [c2]Vanesa Daza, Javier Herranz, Carles Padró, Germán Sáez:
A Distributed and Computationally Secure Key Distribution Scheme. ISC 2002: 342-356 - [i2]Vanesa Daza, Javier Herranz, Carles Padró, Germán Sáez:
A Distributed and Computationally Secure Key Distribution Scheme. IACR Cryptol. ePrint Arch. 2002: 69 (2002) - [i1]Vanesa Daza, Javier Herranz, Germán Sáez:
Some Applications of Threshold Signature Schemes to Distributed Protocols. IACR Cryptol. ePrint Arch. 2002: 81 (2002) - 2001
- [c1]Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró:
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. ISC 2001: 1-17
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint