Search Results - "Hernandez Encinas, Luis"

Refine Results
  1. 1

    Strong preservers of symmetric arctic rank of nonnegative real matrices by 비어슬리, Luis Hernandez Encinas, 송석준

    Published in Journal of the Korean Mathematical Society (01-11-2019)
    “…A rank $1$ matrix has a factorization as ${\bf u}{\bf v}^t$ for vectors ${\bf u}$ and ${\bf v}$ of some orders. The arctic rank of a rank $1$ matrix is the…”
    Get full text
    Journal Article
  2. 2

    A Modular and Optimized Toolbox for Side-Channel Analysis by Fuentes Rodriguez, Alberto, Hernandez Encinas, Luis, Martin Munoz, Agustin, Alarcos Alcazar, Bernardo

    Published in IEEE access (2019)
    “…The aim of this paper is to describe the characteristics of a toolbox developed to carry out a side-channel analysis of cryptosystems implemented in physical…”
    Get full text
    Journal Article
  3. 3

    Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review by Hernández-Álvarez, Luis, de Fuentes, José María, González-Manzano, Lorena, Hernández Encinas, Luis

    Published in Sensors (Basel, Switzerland) (25-12-2020)
    “…Ensuring the confidentiality of private data stored in our technological devices is a fundamental aspect for protecting our personal and professional…”
    Get full text
    Journal Article
  4. 4

    SmartCAMPP - Smartphone-based continuous authentication leveraging motion sensors with privacy preservation by Hernández-Álvarez, Luis, de Fuentes, José María, González-Manzano, Lorena, Hernández Encinas, Luis

    Published in Pattern recognition letters (01-07-2021)
    “…•We focus on Continuous Authentication (CA) in IoT (particularly smart- phones) assisted by non-trusted servers.•We propose SmartCAMPP, a CA mechanism…”
    Get full text
    Journal Article
  5. 5

    EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers by Hernández-Álvarez, Luis, Barbierato, Elena, Caputo, Stefano, Mucchi, Lorenzo, Hernández Encinas, Luis

    Published in Sensors (Basel, Switzerland) (24-12-2022)
    “…In the current Information Age, it is usual to access our personal and professional information, such as bank account data or private documents, in a telematic…”
    Get full text
    Journal Article
  6. 6

    PAgIoT – Privacy-preserving Aggregation protocol for Internet of Things by González-Manzano, L., Fuentes, José M. de, Pastrana, Sergio, Peris-Lopez, Pedro, Hernández-Encinas, Luis

    “…Modern society highly relies on the use of cyberspace to perform a huge variety of activities, such as social networking or e-commerce, and new technologies…”
    Get full text
    Journal Article
  7. 7

    Self-Sovereign Identity in University Context by Queiruga-Dios, Araceli, Jose Bullon Perez, Juan, Hernandez Encinas, Luis

    “…A user-centred identifier enables verifiable and de-centralized digital identity, and lead users to control and to generate their own identifiers using systems…”
    Get full text
    Conference Proceeding Journal Article
  8. 8

    Analysis of the Cryptographic Tools for Blockchain and Bitcoin by Martínez, Víctor Gayoso, Hernández-Álvarez, Luis, Encinas, Luis Hernández

    Published in Mathematics (Basel) (01-01-2020)
    “…Blockchain is one of the most interesting emerging technologies nowadays, with applications ranging from cryptocurrencies to smart contracts. This paper…”
    Get full text
    Journal Article
  9. 9

    A Lightweight Pseudorandom Number Generator for Securing the Internet of Things by Orue Lopez, Amalia Beatriz, Hernandez Encinas, Luis, Martin Munoz, Agustin, Montoya Vitini, Fausto

    Published in IEEE access (2017)
    “…Lightweight cryptography aims to address the security demands in resource-constrained hardware and software environments, such as the Internet of Things (IoT)…”
    Get full text
    Journal Article
  10. 10

    An Improved Bytewise Approximate Matching Algorithm Suitable for Files of Dissimilar Sizes by Gayoso Martínez, Víctor, Hernández-Álvarez, Fernando, Hernández Encinas, Luis

    Published in Mathematics (Basel) (01-04-2020)
    “…The goal of digital forensics is to recover and investigate pieces of data found on digital devices, analysing in the process their relationship with other…”
    Get full text
    Journal Article
  11. 11

    Analysis of the FO Transformation in the Lattice-Based Post-Quantum Algorithms by González de la Torre, Miguel Ángel, Hernández Encinas, Luis, Queiruga-Dios, Araceli

    Published in Mathematics (Basel) (01-08-2022)
    “…Newer variants of the Fujisaki–Okamoto transformation are used in most candidates of the third round of the NIST Post-Quantum Cryptography standardization call…”
    Get full text
    Journal Article
  12. 12

    Using Free Mathematical Software in Engineering Classes by Gayoso Martínez, Víctor, Hernández Encinas, Luis, Martín Muñoz, Agustín, Queiruga Dios, Araceli

    Published in Axioms (01-12-2021)
    “…There are many computational applications and engines used in mathematics, with some of the best-known arguably being Maple, Mathematica, MATLAB, and Mathcad…”
    Get full text
    Journal Article
  13. 13

    A Group Law on the Projective Plane with Applications in Public Key Cryptography by Durán Díaz, Raúl, Hernández Encinas, Luis, Muñoz Masqué, Jaime

    Published in Mathematics (Basel) (01-05-2020)
    “…In the context of new threats to Public Key Cryptography arising from a growing computational power both in classic and in quantum worlds, we present a new…”
    Get full text
    Journal Article
  14. 14

    NetVote: A Strict-Coercion Resistance Re-Voting Based Internet Voting Scheme with Linear Filtering by Querejeta-Azurmendi, Iñigo, Arroyo Guardeño, David, Hernández-Ardieta, Jorge L., Hernández Encinas, Luis

    Published in Mathematics (Basel) (01-09-2020)
    “…This paper proposes NetVote, an internet voting protocol where usability and ease in deployment are a priority. We introduce the notion of strict coercion…”
    Get full text
    Journal Article
  15. 15

    The Square-Zero Basis of Matrix Lie Algebras by Durán Díaz, Raúl, Gayoso Martínez, Víctor, Hernández Encinas, Luis, Muñoz Masqué, Jaime

    Published in Mathematics (Basel) (01-06-2020)
    “…A method is presented that allows one to compute the maximum number of functionally-independent invariant functions under the action of a linear algebraic…”
    Get full text
    Journal Article
  16. 16

    KeyEncoder: A secure and usable EEG-based cryptographic key generation mechanism by Hernández-Álvarez, Luis, Barbierato, Elena, Caputo, Stefano, de Fuentes, José María, González-Manzano, Lorena, Encinas, Luis Hernández, Mucchi, Lorenzo

    Published in Pattern recognition letters (01-09-2023)
    “…•Development of a universal key generation mechanism with EEG signals using autoencoders to extract the biometric features.•A result of 0% of False Acceptance…”
    Get full text
    Journal Article
  17. 17

    Brain malformations in the sheep model of myelomeningocele are similar to those found in human disease: preliminary report by Encinas Hernández, Jose Luis, Soto, C., García-Cabezas, M. A., Pederiva, F., Garriboli, M., Rodríguez, R., Peiró, J. L., Carceller, F., López-Santamaría, M., Tovar, J. A.

    Published in Pediatric surgery international (01-12-2008)
    “…Purpose To examine if brain malformations, similar to those which account for cognitive disorders seen in human disease, are present in an ovine model of…”
    Get full text
    Journal Article
  18. 18

    How to Attack a Galaxy: From Star Wars to Star Trek by Hernandez-Alvarez, Luis, de la Torre, Miguel Angel Gonzalez, Hernandez, Eva Iglesias, Encinas, Luis Hernandez

    “…Recently, the National Institute of Standards and Technology set CRYSTALS-Kyber as post-quantum public key encryption/key encapsulation mechanism standard, and…”
    Get full text
    Conference Proceeding
  19. 19
  20. 20