Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Francisco Corella is active.

Publication


Featured researches published by Francisco Corella.


communications and networking symposium | 2014

Identity-based protocol design patterns for machine-to-machine secure channels

Francisco Corella; Karen Pomian Lewison

In the classical design pattern for secure channel protocols, there is a first phase where the endpoints establish a shared secret and one or both endpoints authenticate by presenting a certificate and demonstrating knowledge of the associated private key; and a second phase where application data traffic between the endpoints is protected using symmetric keys for encryption and authentication derived from the shared secret. This classical pattern emerged in the nineties, when most secure channels were intended for human-to-machine (H2M) communications and the latency caused by roundtrips and transmission of bulky certificate chains resulted in no more than inconvenience to the human. In machine-to-machine (M2M) communication, on the other hand, excessive latency may be unacceptable for safety-critical and other applications. We describe a range of alternative protocol design patterns that use identity-based encryption to eliminate roundtrips and certificate transmission. These patterns can be used in the design of new secure channel protocols or retrofitted into existing protocols.


Archive | 2012

BROWSING REAL-TIME SEARCH RESULTS EFFECTIVELY

Francisco Corella; Karen Pomian Lewison


Archive | 2009

Facilitating browsing of result sets

Francisco Corella; Karen Pomian Lewison


Archive | 2011

Security Analysis of Double Redirection Protocols

Francisco Corella; Karen Pomian Lewison


Archive | 2009

METHOD OF COMPUTING A COOPERATIVE ANSWER TO A ZERO-RESULT QUERY THROUGH A HIGH LATENCY API

Francisco Corella; Karen Pomian Lewison


Archive | 2013

Cryptographic authentication techniques for mobile devices

Francisco Corella; Karen Pomian Lewison


Archive | 2012

Browsing real-time search results reliably on a mobile computing device

Francisco Corella; Karen Pomian Lewison


Archive | 2012

Techniques for Implementing Derived Credentials

Francisco Corella; Karen Pomian Lewison


Journal of Digital Imaging | 2002

A teleradiology architecture featuring security and high performance.

Francisco Corella; Karen Pomian Lewison; Mohammed Talukder


Archive | 2013

Effective data protection for mobile devices

Francisco Corella; Karen Pomian Lewison

Collaboration


Dive into the Francisco Corella's collaboration.

Researchain Logo
Decentralizing Knowledge