Search Results - "Encinas, Luis Hernández"
-
1
Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review
Published in Sensors (Basel, Switzerland) (25-12-2020)“…Ensuring the confidentiality of private data stored in our technological devices is a fundamental aspect for protecting our personal and professional…”
Get full text
Journal Article -
2
SmartCAMPP - Smartphone-based continuous authentication leveraging motion sensors with privacy preservation
Published in Pattern recognition letters (01-07-2021)“…•We focus on Continuous Authentication (CA) in IoT (particularly smart- phones) assisted by non-trusted servers.•We propose SmartCAMPP, a CA mechanism…”
Get full text
Journal Article -
3
EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers
Published in Sensors (Basel, Switzerland) (24-12-2022)“…In the current Information Age, it is usual to access our personal and professional information, such as bank account data or private documents, in a telematic…”
Get full text
Journal Article -
4
Analysis of the Cryptographic Tools for Blockchain and Bitcoin
Published in Mathematics (Basel) (01-01-2020)“…Blockchain is one of the most interesting emerging technologies nowadays, with applications ranging from cryptocurrencies to smart contracts. This paper…”
Get full text
Journal Article -
5
An Improved Bytewise Approximate Matching Algorithm Suitable for Files of Dissimilar Sizes
Published in Mathematics (Basel) (01-04-2020)“…The goal of digital forensics is to recover and investigate pieces of data found on digital devices, analysing in the process their relationship with other…”
Get full text
Journal Article -
6
Analysis of the FO Transformation in the Lattice-Based Post-Quantum Algorithms
Published in Mathematics (Basel) (01-08-2022)“…Newer variants of the Fujisaki–Okamoto transformation are used in most candidates of the third round of the NIST Post-Quantum Cryptography standardization call…”
Get full text
Journal Article -
7
Using Free Mathematical Software in Engineering Classes
Published in Axioms (01-12-2021)“…There are many computational applications and engines used in mathematics, with some of the best-known arguably being Maple, Mathematica, MATLAB, and Mathcad…”
Get full text
Journal Article -
8
A Group Law on the Projective Plane with Applications in Public Key Cryptography
Published in Mathematics (Basel) (01-05-2020)“…In the context of new threats to Public Key Cryptography arising from a growing computational power both in classic and in quantum worlds, we present a new…”
Get full text
Journal Article -
9
NetVote: A Strict-Coercion Resistance Re-Voting Based Internet Voting Scheme with Linear Filtering
Published in Mathematics (Basel) (01-09-2020)“…This paper proposes NetVote, an internet voting protocol where usability and ease in deployment are a priority. We introduce the notion of strict coercion…”
Get full text
Journal Article -
10
The Square-Zero Basis of Matrix Lie Algebras
Published in Mathematics (Basel) (01-06-2020)“…A method is presented that allows one to compute the maximum number of functionally-independent invariant functions under the action of a linear algebraic…”
Get full text
Journal Article -
11
KeyEncoder: A secure and usable EEG-based cryptographic key generation mechanism
Published in Pattern recognition letters (01-09-2023)“…•Development of a universal key generation mechanism with EEG signals using autoencoders to extract the biometric features.•A result of 0% of False Acceptance…”
Get full text
Journal Article -
12
How to Attack a Galaxy: From Star Wars to Star Trek
Published in 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE) (24-07-2023)“…Recently, the National Institute of Standards and Technology set CRYSTALS-Kyber as post-quantum public key encryption/key encapsulation mechanism standard, and…”
Get full text
Conference Proceeding -
13
Boolean differential operators
Published in Turkish journal of mathematics (2018)Get full text
Journal Article -
14
Strong preservers of symmetric arctic rank of nonnegative real matrices
Published in Journal of the Korean Mathematical Society (01-11-2019)“…A rank $1$ matrix has a factorization as ${\bf u}{\bf v}^t$ for vectors ${\bf u}$ and ${\bf v}$ of some orders. The arctic rank of a rank $1$ matrix is the…”
Get full text
Journal Article -
15
A Modular and Optimized Toolbox for Side-Channel Analysis
Published in IEEE access (2019)“…The aim of this paper is to describe the characteristics of a toolbox developed to carry out a side-channel analysis of cryptosystems implemented in physical…”
Get full text
Journal Article -
16
A characterization of nonprime powers
Published in Turkish journal of mathematics (2017)Get full text
Journal Article -
17
PAgIoT – Privacy-preserving Aggregation protocol for Internet of Things
Published in Journal of network and computer applications (01-08-2016)“…Modern society highly relies on the use of cyberspace to perform a huge variety of activities, such as social networking or e-commerce, and new technologies…”
Get full text
Journal Article -
18
Self-Sovereign Identity in University Context
Published in 2022 31st Conference of Open Innovations Association (FRUCT) (2022)“…A user-centred identifier enables verifiable and de-centralized digital identity, and lead users to control and to generate their own identifiers using systems…”
Get full text
Conference Proceeding Journal Article -
19
A Lightweight Pseudorandom Number Generator for Securing the Internet of Things
Published in IEEE access (2017)“…Lightweight cryptography aims to address the security demands in resource-constrained hardware and software environments, such as the Internet of Things (IoT)…”
Get full text
Journal Article -
20
Designing hypermedia tools for solving problems in mathematics
Published in Computers and education (01-05-2002)“…This article presents the design and preparation using hypermedia tools of an interactive CD-ROM for the active teaching and learning of diverse…”
Get full text
Journal Article