MA MAGDALENA
VALLS MARSAL
CON
Publicaciones (38) Publicaciones de MA MAGDALENA VALLS MARSAL
2023
-
Residual spatiotemporal convolutional networks for face anti-spoofing
Journal of Visual Communication and Image Representation, Vol. 91
2022
-
An anonymous and unlinkable electronic toll collection system
International Journal of Information Security, Vol. 21, Núm. 5, pp. 1151-1162
-
How Twitter Interactions Leak Political Trends
Lecture Notes in Networks and Systems
2020
-
Formación dual en el máster en ingeniería informática: una nueva orientación de formación universitaria
Actas de las Jornadas sobre la Enseñanza Universitaria de la Informática (JENUI), Núm. 5, pp. 189-196
2019
-
Benefits of Applying Big-Data Tools for Log-Centralisation in SMEs
Advances in Intelligent Systems and Computing
-
Boosting professional competences and IT companies' innovation in a Master Degree in Informatics Engineering
Proceedings - Frontiers in Education Conference, FIE
2017
-
A privacy-preserving reputation system with user rewards
Journal of Network and Computer Applications, Vol. 80, pp. 58-66
-
Cast as intended verifiability for mixed array ballots
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016
-
Efficient smart metering based on homomorphic encryption
Computer Communications, Vol. 82, pp. 95-101
2014
-
Constructing credential-based E-voting systems from offline E-coin protocols
Journal of Network and Computer Applications, Vol. 42, pp. 39-44
-
Mejorando la seguridad de un criptosistema OPE mediante la uniformización de los datos
RECSI XIII: actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información. Alicante, 2-5 de septiembre de 2014
-
Securing databases by using diagonal-based order preserving symmetric encryption
Applied Mathematics and Information Sciences, Vol. 8, Núm. 5, pp. 2085-2094
2013
-
Blind certificates for secure electronic voting
Proceedings of the 2013 10th International Conference on Information Technology: New Generations, ITNG 2013
-
On Edwards curves and ZVP-attacks
Applicable Algebra in Engineering, Communications and Computing, Vol. 24, Núm. 6, pp. 507-517
-
Security analysis of order preserving symmetric cryptography
Applied Mathematics and Information Sciences, Vol. 7, Núm. 4, pp. 1285-1295
2012
-
The Sudoku completion problem with rectangular hole pattern is NP-complete
Discrete Mathematics, Vol. 312, Núm. 22, pp. 3306-3315
2010
-
Securing the use of RFID-enabled banknotes
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
-
A secure elliptic curve-based RFID protocol
Journal of Computer Science and Technology, Vol. 24, Núm. 2, pp. 309-318
-
Computing the ℓ-power torsion of an elliptic curve over a finite field
Mathematics of Computation, Vol. 78, Núm. 267, pp. 1767-1786
-
On avoiding ZVP-attacks using isogeny volcanoes
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)