J. Carlos Mex-Perera

Orcid: 0000-0001-8682-5983

According to our database1, J. Carlos Mex-Perera authored at least 24 papers between 2001 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
A Low-Cost Jamming Detection Approach Using Performance Metrics in Cluster-Based Wireless Sensor Networks.
Sensors, 2021

The use of ellipse-based estimator as a sub-key distinguisher for Side-Channel Analysis.
Comput. Electr. Eng., 2021

2019
New Detection Paradigms to Improve Wireless Sensor Network Performance under Jamming Attacks.
Sensors, 2019

2017
MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks.
Sensors, 2017

Providing traffic tolerance in optical packet switching networks: a reinforcement learning approach.
Photonic Netw. Commun., 2017

2016
GCM implementations of Camellia-128 and SMS4 by optimizing the polynomial multiplier.
Microprocess. Microsystems, 2016

2015
On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks.
Sensors, 2015

2014
On the MAC/Network/Energy Performance Evaluation of Wireless Sensor Networks: Contrasting MPH, AODV, DSR and ZTR Routing Protocols.
Sensors, 2014

Self-healing in transparent optical packet switching mesh networks: A reinforcement learning perspective.
Comput. Networks, 2014

An efficient Multi-Parent Hierarchical routing protocol for WSNs.
Proceedings of the 2014 Wireless Telecommunications Symposium, 2014

2013
Merging the Camellia, SMS4 and AES S-Boxes in a Single S-Box with Composite Bases.
Proceedings of the Information Security, 16th International Conference, 2013

2012
Analyzing Log Files for Postmortem Intrusion Detection.
IEEE Trans. Syst. Man Cybern. Part C, 2012

Masquerade attacks based on user's profile.
J. Syst. Softw., 2012

Some Representations of the S-Box of Camellia in <i>GF</i>(((2<sup>2</sup>)<sup>2</sup>)<sup>2</sup>).
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2006
Hybrid Method for Detecting Masqueraders Using Session Folding and Hidden Markov Models.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006

Using PCA to Improve the Generation of Speech Keys.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006

2005
Parameter Optimization in a Text-Dependent Cryptographic-Speech-Key Generation Task.
Proceedings of the Nonlinear Analyses and Algorithms for Speech Processing, 2005

Cryptographic-Speech-Key Generation Architecture Improvements.
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005

Phoneme Spotting for Speech-Based Crypto-key Generation.
Proceedings of the Progress in Pattern Recognition, 2005

Multi-speaker voice cryptographic key generation.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

2004
Cryptographic-Speech-Key Generation Using the SVM Technique over the lp-Cepstral Speech Space.
Proceedings of the Nonlinear Speech Modeling and Applications, 2004

SVM Applied to the Generation of Biometric Speech Key.
Proceedings of the Progress in Pattern Recognition, 2004

2002
Cryptanalysis of a summation generator with 2-bit memory.
Signal Process., 2002

2001
Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers.
Proceedings of the Cryptography and Coding, 2001


  Loading...