Elegir campos a generar del autor Juan Antonio

Datos personales Todos / Ninguno
Correo Electrónico
Artículos Todos / Ninguno
Cryptanalysis of a key exchange protocol based on a congruence-simple semiring action
On the Solutions of Linear Systems over Additively Idempotent Semirings
Cryptanalysis of Ateniese-Steiner-Tsudik-Authenticated Group Key Management Protocol
A Comprehensive Survey on Generative AI Solutions in IoT Security
El pequeño teorema de Wedderburn
Error-Correcting Codes on Projective Bundles over Deligne-Lusztig Varieties
Secure Group Communications Using Twisted Group Rings
Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications
A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks
La seguridad: ¿una cuestión de azar?
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
Blockchain-based federation of wireless sensor nodes
A Flexible Future Education Model—Strategies Drawn from Teaching during the COVID-19 Pandemic
Matemáticas de una epidemia: ¿Qué significa realmente doblegar la curva?
Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro
Public Key Protocols over Twisted Dihedral Group Rings
Elliptic Curve Cryptography hardware accelerator for high-performance secure servers
Blind signatures using light variations in CCD sensors as a pattern to avoid identity forging
An application of group theory in confidential network communications
Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks
Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks
Group key management based on semigroup actions
AN ACTIVE ATTACK ON A DISTRIBUTED GROUP KEY EXCHANGE SYSTEM
Managing key multicasting through orthogonal systems
Distributed key agreement for group communications based on elliptic curves. An application to sensor networks.
Public key protocols over the ring Ep(m)
El lado oscuro de las matemáticas
A blind signature-based protocol for tracing traitors
A parallel algorithm for secure multicast
Semidualizing and Tilting Adjoint Pairs, Applications to Comodules
A decentralized protocol for mobile control access
Hierarchical approaches for multicast based on Euclid's algorithm
A scalable server for key distribution and its application to accounting
Tensor products of ideal codes over Hopf algebras
A suite of algorithms for key distribution and authentication in centralized secure multicast environments
Group Oriented Renewal of Secrets and Its Application to Secure Multicast
Applications of computational mathematics in science and engineering
Determining all indecomposable codes over some Hopf algebras
Relative spectral sequences with applications to gorenstein dimensions
Gorenstein injective and projective modules and actions of finite-dimensional Hopf algebras
Gorenstein injective envelopes and covers over n-perfect rings
Las matrices, la base 2 y la tecnología digital
A noncommutative generalization of Auslander's last theorem
Dualizing modules and n-perfect rings
Covers and envelopes by V-gorenstein modules
Relative homological coalgebras
Minimal projective resolutions for comodules
The existence of Gorenstein flat covers
Gorenstein modules over Zariski filtered rings
Derived functors of Hom relative to flat covers
Kaplansky classes
On matlis dualizing modules
Graded matlis duality and applications to covers
On the existence of flat covers in <i>R</i>-gr
Gorenstein GR-injective modules over graded isolated singularities
Covers and envelopes over gr-Gorenstein rings
Gorenstein coalgebras
Gorenstein gr-flat modules
Gorenstein GR-injective and GR-projective modules
Libros, capítulos, tesis Todos / Ninguno
A secure and efficient method for communications and energy consumption management in iot wireless sensor networks
Protocolos de clave pública en anillos de grupo torcidos
Grupos, anillos y cuerpos
Problemas de estructuras básicas del álgebra
Protocolos seguros de comunicación basados en curvas elípticas
Criptosistemas de clave pública basados en acciones del anillo Ep(m)
Esquemas de distribución de claves basados en teoría de números con aplicaciones al e-comercio y al e-acounting
A pervasive polling secret-sharing based access control protocol for sensitive information
Hardware secure access to servers and applications
Mathematica discreta
Mathematica discreta J. A. López Ramos, Justo Peralta López
Homología relativa Gorenstein graduada
Homología relativa Gorenstein graduada[«h»Recurso electrónico]
Homología relativa Gorenstein graduada
Conferencias Todos / Ninguno
An Application of Twisted Group Rings in Secure Group Communications
Hardware implementation of a new ECC key distribution protocol for securing Wireless Sensor Networks
Key agreement protocols for distributed secure multicast over the ring E(m) p
Tracking Traitors in Web Services via Blind Signatures
An Interactive Mathematica Book
Remarks and countermeasures on a cryptoanalysis of a secure multicast protocol
A Key Distribution Scheme for Live Streaming Multi-tree Overlays
Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks
Patentes Todos / Ninguno
Unidad Cifradora/Descifradora de Mensajes con información digital, Sistema y Método de Cifrado/Descifrado para Comunicaciones Digitales en Tiempo Real
Informes y otros Todos / Ninguno
Correction to: Error-Correcting Codes on Projective Bundles over Deligne–Lusztig Varieties (Mathematics, (2023), 11, 14, (3079), 10.3390/math11143079)
Métricas del autor Todos / Ninguno
Indice H