Publicaciones (38) Publicaciones de MA MAGDALENA VALLS MARSAL

2023

  1. Residual spatiotemporal convolutional networks for face anti-spoofing

    Journal of Visual Communication and Image Representation, Vol. 91

2022

  1. An anonymous and unlinkable electronic toll collection system

    International Journal of Information Security, Vol. 21, Núm. 5, pp. 1151-1162

  2. How Twitter Interactions Leak Political Trends

    Lecture Notes in Networks and Systems

2020

  1. Formación dual en el máster en ingeniería informática: una nueva orientación de formación universitaria

    Actas de las Jornadas sobre la Enseñanza Universitaria de la Informática (JENUI), Núm. 5, pp. 189-196

2017

  1. A privacy-preserving reputation system with user rewards

    Journal of Network and Computer Applications, Vol. 80, pp. 58-66

  2. Cast as intended verifiability for mixed array ballots

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2016

  1. Efficient smart metering based on homomorphic encryption

    Computer Communications, Vol. 82, pp. 95-101

2014

  1. Constructing credential-based E-voting systems from offline E-coin protocols

    Journal of Network and Computer Applications, Vol. 42, pp. 39-44

  2. Mejorando la seguridad de un criptosistema OPE mediante la uniformización de los datos

    RECSI XIII: actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información. Alicante, 2-5 de septiembre de 2014

  3. Securing databases by using diagonal-based order preserving symmetric encryption

    Applied Mathematics and Information Sciences, Vol. 8, Núm. 5, pp. 2085-2094

2013

  1. Blind certificates for secure electronic voting

    Proceedings of the 2013 10th International Conference on Information Technology: New Generations, ITNG 2013

  2. On Edwards curves and ZVP-attacks

    Applicable Algebra in Engineering, Communications and Computing, Vol. 24, Núm. 6, pp. 507-517

  3. Security analysis of order preserving symmetric cryptography

    Applied Mathematics and Information Sciences, Vol. 7, Núm. 4, pp. 1285-1295

2012

  1. The Sudoku completion problem with rectangular hole pattern is NP-complete

    Discrete Mathematics, Vol. 312, Núm. 22, pp. 3306-3315

2010

  1. Securing the use of RFID-enabled banknotes

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2009

  1. A secure elliptic curve-based RFID protocol

    Journal of Computer Science and Technology, Vol. 24, Núm. 2, pp. 309-318

  2. Computing the ℓ-power torsion of an elliptic curve over a finite field

    Mathematics of Computation, Vol. 78, Núm. 267, pp. 1767-1786

  3. On avoiding ZVP-attacks using isogeny volcanoes

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)