Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modelo de Seguridad en Bases de Datos: Autenticación Mediante Contraseñas de Un Solo Uso y Cifrado Mediante un Sistema Pseudo-asimétrico., , and . JIDBD, page 189-190. Universidad Carlos III de Madrid, (1997)Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services., , , and . EUC Workshops, volume 3823 of Lecture Notes in Computer Science, page 797-806. Springer, (2005)Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System., , , and . IEEE Trans. Dependable Sec. Comput., 12 (3): 312-325 (2015)A Legal Ontology to Support Privacy Preservation in Location-Based Services., , , and . OTM Workshops (2), volume 4278 of Lecture Notes in Computer Science, page 1755-1764. Springer, (2006)Search Engines as a security thread., , , and . WebNet, page 530-533. AACE, (2001)Leveraging Quiz-based Multiple-prize Web Tournaments for Reinforcing Routine Mathematical Skills., , , and . Educational Technology & Society, 16 (3): 28-43 (2013)Search Engines as a Security Threat., , , and . IEEE Computer, 34 (10): 25-30 (2001)Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers., , , , and . IMA Int. Conf., volume 2260 of Lecture Notes in Computer Science, page 374-377. Springer, (2001)A framework for avoiding steganography usage over HTTP., , , and . J. Network and Computer Applications, 35 (1): 491-501 (2012)A taxonomy and survey of attacks on digital signatures., , , and . Computers & Security, (2013)