Enrique Festijo

According to our database1, Enrique Festijo authored at least 19 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Analysis of the use of Analytics Platform for the Commercial Value of Mud crab Production using Non-parametric Model.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Evaluation of the Deep Learning-Based m-Health Application Using Mobile App Development and Assessment Guide.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

2020
Ontology Learning using Hybrid Machine Learning Algorithms for Disaster Risk Management.
Proceedings of the SPML 2020: 3rd International Conference on Signal Processing and Machine Learning, 2020

A Raspberry Pi-Based Identity Verification Through Face Recognition Using Constrained Images.
Proceedings of the Intelligent Computing, 2020

2019
Software-defined security controller-based group management and end-to-end security management.
J. Ambient Intell. Humaniz. Comput., 2019

Identity Verification through Face Recognition Implemented on Raspberry Pi Framework.
Int. J. Commun. Networks Inf. Secur., 2019

A Distance-Based Data-Mule Scheduling Technique for Lesser Nodal Delay in Wireless Sensor Network.
Int. J. Commun. Networks Inf. Secur., 2019

Proposing packet-key based end-to-end security architecture for the post-LTE networks.
ICT Express, 2019

Comparative Analysis of Ensemble Learning Methods in Classifying Network Intrusions.
Proceedings of the 9th IEEE International Conference on System Engineering and Technology, 2019

An Object-Based Supervised Nearest Neighbor Method for Extraction of Rhizophora in Mangrove Forest from LiDAR Data and Orthophoto.
Proceedings of the 9th IEEE International Conference on System Engineering and Technology, 2019

Understanding the Acceptance of a Face Recognition-Based Identity Verification System: An Input to its Design and Development in the Philippines.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

2018
Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm.
Int. J. Commun. Networks Inf. Secur., 2018

2017
Packet key-based security system for the next generation LTE networks.
Proceedings of the 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, 2017

2016
An Open Horizontal Model for Group Management and End-to-End Security Management Suitable for Group-based Private Systems.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

2014
One-time packet key exchange scheme for secure real-time multimedia applications.
J. Comput. Syst. Sci., 2014

Joint operation of routing control and group key management for 5G ad hoc D2D networks.
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014

2013
Securing RTP Packets Using Per-Packet Selective Encryption Scheme for Real-Time Multimedia Applications.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Secure Mobility Management Based on Session Key Agreements.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
Session Key Generation for a Group Call and Device for Security Control.
Proceedings of the IEEE 10th International Conference on Trust, 2011


  Loading...