El pequeño teorema de Wedderburn |
|
Error-Correcting Codes on Projective Bundles over Deligne–Lusztig Varieties |
|
Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications |
|
A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks |
|
Secure Group Communications Using Twisted Group Rings |
|
La seguridad: ¿una cuestión de azar? |
|
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme |
|
A Flexible Future Education Model—Strategies Drawn from Teaching during the COVID-19 Pandemic |
|
Blockchain-based federation of wireless sensor nodes |
|
Matemáticas de una epidemia: ¿Qué significa realmente doblegar la curva? |
|
Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro |
|
Public Key Protocols over Twisted Dihedral Group Rings |
|
An application of group theory in confidential network communications |
|
Elliptic Curve Cryptography hardware accelerator for high-performance secure servers |
|
Unified compact ECC-AES co-processor with group-key support for IoT devices in wireless sensor networks |
|
Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks |
|
Group key management based on semigroup actions |
|
An active attack on a distributed group key exchange system |
|
Managing key multicasting through orthogonal systems |
|
Blind signatures using light variations in CCD sensors as a pattern to avoid identity forging |
|
Distributed key agreement for group communications based on elliptic curves. An application to sensor networks. |
|
Public key protocols over the ring Ep(m) |
|
El lado oscuro de las matemáticas |
|
A parallel algorithm for secure multicast |
|
Semidualizing and tilting adjoint pairs, Applications to comodules |
|
A blind signature-based protocol for tracing traitors |
|
A decentralized protocol for mobile control access |
|
Hierarchical approaches for multicast based on Euclid's algorithm |
|
Tensor products of ideal codes over Hopf algebras |
|
A scalable server for key distribution and its application to accounting |
|
A suite of algorithms for key distribution and authentication in centralized secure multicast environments |
|
Group oriented renewal of secrets and its application to secure multicast |
|
Applications of computational mathematics in science and engineering |
|
Determining all indecomposable codes over some Hopf algebras |
|
Relative spectral sequences with applications to gorenstein dimensions |
|
A key distribution scheme for live streaming multi-tree overlays |
|
Key management schemes for peer-to-peer multimedia streaming overlay networks |
|
Gorenstein injective and projective modules and actions of finite-dimensional Hopf algebras |
|
Gorenstein injective envelopes and covers over n-perfect rings |
|
Las matrices, la base 2 y la tecnología digital |
|
A noncommutative generalization of Auslander's last theorem |
|
Dualizing modules and n-perfect rings |
|
Covers and envelopes by V-gorenstein modules |
|
Relative homological coalgebras |
|
Minimal projective resolutions for comodules |
|
The existence of Gorenstein flat covers |
|
Gorenstein modules over Zariski filtered rings |
|
Derived functors of Hom relative to flat covers |
|
On matlis dualizing modules |
|
Kaplansky classes |
|
Graded matlis duality and applications to covers |
|
On the existence of flat covers in R-gr |
|
Gorenstein GR-injective modules over graded isolated singularities |
|
Covers and envelopes over gr-Gorenstein rings |
|
Gorenstein coalgebras |
|
Gorenstein GR-flat modules |
|
Gorenstein GR-injective and GR-projective modules |
|