Search Results - "Hernandez Encinas, Luis"
-
1
Strong preservers of symmetric arctic rank of nonnegative real matrices
Published in Journal of the Korean Mathematical Society (01-11-2019)“…A rank $1$ matrix has a factorization as ${\bf u}{\bf v}^t$ for vectors ${\bf u}$ and ${\bf v}$ of some orders. The arctic rank of a rank $1$ matrix is the…”
Get full text
Journal Article -
2
A Modular and Optimized Toolbox for Side-Channel Analysis
Published in IEEE access (2019)“…The aim of this paper is to describe the characteristics of a toolbox developed to carry out a side-channel analysis of cryptosystems implemented in physical…”
Get full text
Journal Article -
3
Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review
Published in Sensors (Basel, Switzerland) (25-12-2020)“…Ensuring the confidentiality of private data stored in our technological devices is a fundamental aspect for protecting our personal and professional…”
Get full text
Journal Article -
4
SmartCAMPP - Smartphone-based continuous authentication leveraging motion sensors with privacy preservation
Published in Pattern recognition letters (01-07-2021)“…•We focus on Continuous Authentication (CA) in IoT (particularly smart- phones) assisted by non-trusted servers.•We propose SmartCAMPP, a CA mechanism…”
Get full text
Journal Article -
5
EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers
Published in Sensors (Basel, Switzerland) (24-12-2022)“…In the current Information Age, it is usual to access our personal and professional information, such as bank account data or private documents, in a telematic…”
Get full text
Journal Article -
6
PAgIoT – Privacy-preserving Aggregation protocol for Internet of Things
Published in Journal of network and computer applications (01-08-2016)“…Modern society highly relies on the use of cyberspace to perform a huge variety of activities, such as social networking or e-commerce, and new technologies…”
Get full text
Journal Article -
7
Self-Sovereign Identity in University Context
Published in 2022 31st Conference of Open Innovations Association (FRUCT) (2022)“…A user-centred identifier enables verifiable and de-centralized digital identity, and lead users to control and to generate their own identifiers using systems…”
Get full text
Conference Proceeding Journal Article -
8
Analysis of the Cryptographic Tools for Blockchain and Bitcoin
Published in Mathematics (Basel) (01-01-2020)“…Blockchain is one of the most interesting emerging technologies nowadays, with applications ranging from cryptocurrencies to smart contracts. This paper…”
Get full text
Journal Article -
9
A Lightweight Pseudorandom Number Generator for Securing the Internet of Things
Published in IEEE access (2017)“…Lightweight cryptography aims to address the security demands in resource-constrained hardware and software environments, such as the Internet of Things (IoT)…”
Get full text
Journal Article -
10
An Improved Bytewise Approximate Matching Algorithm Suitable for Files of Dissimilar Sizes
Published in Mathematics (Basel) (01-04-2020)“…The goal of digital forensics is to recover and investigate pieces of data found on digital devices, analysing in the process their relationship with other…”
Get full text
Journal Article -
11
Analysis of the FO Transformation in the Lattice-Based Post-Quantum Algorithms
Published in Mathematics (Basel) (01-08-2022)“…Newer variants of the Fujisaki–Okamoto transformation are used in most candidates of the third round of the NIST Post-Quantum Cryptography standardization call…”
Get full text
Journal Article -
12
Using Free Mathematical Software in Engineering Classes
Published in Axioms (01-12-2021)“…There are many computational applications and engines used in mathematics, with some of the best-known arguably being Maple, Mathematica, MATLAB, and Mathcad…”
Get full text
Journal Article -
13
A Group Law on the Projective Plane with Applications in Public Key Cryptography
Published in Mathematics (Basel) (01-05-2020)“…In the context of new threats to Public Key Cryptography arising from a growing computational power both in classic and in quantum worlds, we present a new…”
Get full text
Journal Article -
14
NetVote: A Strict-Coercion Resistance Re-Voting Based Internet Voting Scheme with Linear Filtering
Published in Mathematics (Basel) (01-09-2020)“…This paper proposes NetVote, an internet voting protocol where usability and ease in deployment are a priority. We introduce the notion of strict coercion…”
Get full text
Journal Article -
15
The Square-Zero Basis of Matrix Lie Algebras
Published in Mathematics (Basel) (01-06-2020)“…A method is presented that allows one to compute the maximum number of functionally-independent invariant functions under the action of a linear algebraic…”
Get full text
Journal Article -
16
KeyEncoder: A secure and usable EEG-based cryptographic key generation mechanism
Published in Pattern recognition letters (01-09-2023)“…•Development of a universal key generation mechanism with EEG signals using autoencoders to extract the biometric features.•A result of 0% of False Acceptance…”
Get full text
Journal Article -
17
Brain malformations in the sheep model of myelomeningocele are similar to those found in human disease: preliminary report
Published in Pediatric surgery international (01-12-2008)“…Purpose To examine if brain malformations, similar to those which account for cognitive disorders seen in human disease, are present in an ovine model of…”
Get full text
Journal Article -
18
How to Attack a Galaxy: From Star Wars to Star Trek
Published in 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE) (24-07-2023)“…Recently, the National Institute of Standards and Technology set CRYSTALS-Kyber as post-quantum public key encryption/key encapsulation mechanism standard, and…”
Get full text
Conference Proceeding -
19
Boolean differential operators
Published in Turkish journal of mathematics (2018)Get full text
Journal Article -
20
A characterization of nonprime powers
Published in Turkish journal of mathematics (2017)Get full text
Journal Article