Elegir campos a generar del autor Juan Antonio

Datos personales Todos / Ninguno
Correo Electrónico
Artículos Todos / Ninguno
El pequeño teorema de Wedderburn
Error-Correcting Codes on Projective Bundles over Deligne–Lusztig Varieties
Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications
A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks
Secure Group Communications Using Twisted Group Rings
La seguridad: ¿una cuestión de azar?
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
A Flexible Future Education Model—Strategies Drawn from Teaching during the COVID-19 Pandemic
Blockchain-based federation of wireless sensor nodes
Matemáticas de una epidemia: ¿Qué significa realmente doblegar la curva?
Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro
Public Key Protocols over Twisted Dihedral Group Rings
An application of group theory in confidential network communications
Elliptic Curve Cryptography hardware accelerator for high-performance secure servers
Unified compact ECC-AES co-processor with group-key support for IoT devices in wireless sensor networks
Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks
Group key management based on semigroup actions
An active attack on a distributed group key exchange system
Managing key multicasting through orthogonal systems
Blind signatures using light variations in CCD sensors as a pattern to avoid identity forging
Distributed key agreement for group communications based on elliptic curves. An application to sensor networks.
Public key protocols over the ring Ep(m)
El lado oscuro de las matemáticas
A parallel algorithm for secure multicast
Semidualizing and tilting adjoint pairs, Applications to comodules
A blind signature-based protocol for tracing traitors
A decentralized protocol for mobile control access
Hierarchical approaches for multicast based on Euclid's algorithm
Tensor products of ideal codes over Hopf algebras
A scalable server for key distribution and its application to accounting
A suite of algorithms for key distribution and authentication in centralized secure multicast environments
Group oriented renewal of secrets and its application to secure multicast
Applications of computational mathematics in science and engineering
Determining all indecomposable codes over some Hopf algebras
Relative spectral sequences with applications to gorenstein dimensions
A key distribution scheme for live streaming multi-tree overlays
Key management schemes for peer-to-peer multimedia streaming overlay networks
Gorenstein injective and projective modules and actions of finite-dimensional Hopf algebras
Gorenstein injective envelopes and covers over n-perfect rings
Las matrices, la base 2 y la tecnología digital
A noncommutative generalization of Auslander's last theorem
Dualizing modules and n-perfect rings
Covers and envelopes by V-gorenstein modules
Relative homological coalgebras
Minimal projective resolutions for comodules
The existence of Gorenstein flat covers
Gorenstein modules over Zariski filtered rings
Derived functors of Hom relative to flat covers
On matlis dualizing modules
Kaplansky classes
Graded matlis duality and applications to covers
On the existence of flat covers in R-gr
Gorenstein GR-injective modules over graded isolated singularities
Covers and envelopes over gr-Gorenstein rings
Gorenstein coalgebras
Gorenstein GR-flat modules
Gorenstein GR-injective and GR-projective modules
Libros, capítulos, tesis Todos / Ninguno
Grupos, anillos y cuerpos
Problemas de estructuras básicas del álgebra
Protocolos de clave pública en anillos de grupo torcidos
Protocolos seguros de comunicación basados en curvas elípticas
Criptosistemas de clave pública basados en acciones del anillo Ep(m)
Esquemas de distribución de claves basados en teoría de números con aplicaciones al e-comercio y al e-acounting
Tracking traitors in web services via blind signatures
An interactive mathematica book
A Pervasive Polling Secret-Sharing Based Access Control Protocol for Sensitive Information
Hardware secure access to servers and applications
Mathematica discreta
Mathematica discreta J. A. López Ramos, Justo Peralta López
Homología relativa Gorenstein graduada
Homología relativa Gorenstein graduada Juan Antonio López Ramos
Homología relativa Gorenstein graduada
Homología relativa Gorenstein graduada[«h»Recurso electrónico]
Conferencias Todos / Ninguno
An Application of Twisted Group Rings in Secure Group Communications
Hardware implementation of a new ECC key distribution protocol for securing Wireless Sensor Networks
Key agreement protocols for distributed secure multicast over the ring E(m)p
Remarks and countermeasures on a cryptoanalysis of a secure multicast protocol
Informes y otros Todos / Ninguno
Unidad Cifradora/Descifradora de Mensajes con información digital, Sistema y Método de Cifrado/Descifrado para Comunicaciones Digitales en Tiempo Real
Métricas del autor Todos / Ninguno
Indice H