Cryptanalysis of a key exchange protocol based on a congruence-simple semiring action |
|
On the Solutions of Linear Systems over Additively Idempotent Semirings |
|
Cryptanalysis of Ateniese-Steiner-Tsudik-Authenticated Group Key Management Protocol |
|
A Comprehensive Survey on Generative AI Solutions in IoT Security |
|
El pequeño teorema de Wedderburn |
|
Error-Correcting Codes on Projective Bundles over Deligne-Lusztig Varieties |
|
Secure Group Communications Using Twisted Group Rings |
|
Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications |
|
A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks |
|
La seguridad: ¿una cuestión de azar? |
|
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme |
|
Blockchain-based federation of wireless sensor nodes |
|
A Flexible Future Education Model—Strategies Drawn from Teaching during the COVID-19 Pandemic |
|
Matemáticas de una epidemia: ¿Qué significa realmente doblegar la curva? |
|
Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro |
|
Public Key Protocols over Twisted Dihedral Group Rings |
|
Elliptic Curve Cryptography hardware accelerator for high-performance secure servers |
|
Blind signatures using light variations in CCD sensors as a pattern to avoid identity forging |
|
An application of group theory in confidential network communications |
|
Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks |
|
Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks |
|
Group key management based on semigroup actions |
|
AN ACTIVE ATTACK ON A DISTRIBUTED GROUP KEY EXCHANGE SYSTEM |
|
Managing key multicasting through orthogonal systems |
|
Distributed key agreement for group communications based on elliptic curves. An application to sensor networks. |
|
Public key protocols over the ring Ep(m) |
|
El lado oscuro de las matemáticas |
|
A blind signature-based protocol for tracing traitors |
|
A parallel algorithm for secure multicast |
|
Semidualizing and Tilting Adjoint Pairs, Applications to Comodules |
|
A decentralized protocol for mobile control access |
|
Hierarchical approaches for multicast based on Euclid's algorithm |
|
A scalable server for key distribution and its application to accounting |
|
Tensor products of ideal codes over Hopf algebras |
|
A suite of algorithms for key distribution and authentication in centralized secure multicast environments |
|
Group Oriented Renewal of Secrets and Its Application to Secure Multicast |
|
Applications of computational mathematics in science and engineering |
|
Determining all indecomposable codes over some Hopf algebras |
|
Relative spectral sequences with applications to gorenstein dimensions |
|
Gorenstein injective and projective modules and actions of finite-dimensional Hopf algebras |
|
Gorenstein injective envelopes and covers over n-perfect rings |
|
Las matrices, la base 2 y la tecnología digital |
|
A noncommutative generalization of Auslander's last theorem |
|
Dualizing modules and n-perfect rings |
|
Covers and envelopes by V-gorenstein modules |
|
Relative homological coalgebras |
|
Minimal projective resolutions for comodules |
|
The existence of Gorenstein flat covers |
|
Gorenstein modules over Zariski filtered rings |
|
Derived functors of Hom relative to flat covers |
|
Kaplansky classes |
|
On matlis dualizing modules |
|
Graded matlis duality and applications to covers |
|
On the existence of flat covers in <i>R</i>-gr |
|
Gorenstein GR-injective modules over graded isolated singularities |
|
Covers and envelopes over gr-Gorenstein rings |
|
Gorenstein coalgebras |
|
Gorenstein gr-flat modules |
|
Gorenstein GR-injective and GR-projective modules |
|