Juan Antonio López-Ramos

Orcid: 0000-0002-2263-2178

According to our database1, Juan Antonio López-Ramos authored at least 31 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cryptoanalysis of a key exchange protocol based on a congruence-simple semiring action.
CoRR, 2024

Error-Correcting Codes on Projective Bundles over Deligne-Lusztig varieties.
CoRR, 2024

2023
Revisiting Multiple Ring Oscillator-Based True Random Generators to Achieve Compact Implementations on FPGAs for Cryptographic Applications.
Cryptogr., June, 2023

2022
Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications.
Sensors, 2022

2021
Blockchain-based federation of wireless sensor nodes.
J. Supercomput., 2021

2020
Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro.
Sensors, 2020

2019
Elliptic Curve Cryptography hardware accelerator for high-performance secure servers.
J. Supercomput., 2019

Efficient image-based analysis of fruit surfaces using CCD cameras and smartphones.
J. Supercomput., 2019

Public Key Protocols over Twisted Dihedral Group Rings.
Symmetry, 2019

2018
Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks.
Sensors, 2018

2017
An active attack on a distributed Group Key Exchange system.
Adv. Math. Commun., 2017

2016
An Application of Group Theory in Confidential Network Communications.
CoRR, 2016

Public Key Protocols over the Ring E_p(m).
CoRR, 2016

Public key protocols over the ring E<sub>p</sub><sup>m</sup>.
Adv. Math. Commun., 2016

2015
A parallel algorithm for secure multicast.
J. Supercomput., 2015

A blind signature-based protocol for tracing traitors.
Int. J. Comput. Math., 2015

An Active Attack on a Multiparty Key Exchange Protocol.
CoRR, 2015

Group key management based on semigroup actions.
CoRR, 2015

2014
A decentralized protocol for mobile control access.
J. Supercomput., 2014

2013
Hierarchical approaches for multicast based on Euclid's algorithm.
J. Supercomput., 2013

A scalable server for key distribution and its application to accounting.
J. Supercomput., 2013

2012
A suite of algorithms for key distribution and authentication in centralized secure multicast environments.
J. Comput. Appl. Math., 2012

Tracking Traitors in Web Services via Blind Signatures.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

An Interactive Mathematica Book.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

2011
Group Oriented Renewal of Secrets and Its Application to Secure Multicast.
J. Inf. Sci. Eng., 2011

Determining all indecomposable codes over some Hopf algebras.
J. Comput. Appl. Math., 2011

Applications of computational mathematics in science and engineering.
Int. J. Comput. Math., 2011

Managing key multicasting through orthogonal systems
CoRR, 2011

2010
A Key Distribution Scheme for Live Streaming Multi-tree Overlays.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

2009
Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

2005
A noncommutative generalization of Auslander's last theorem.
Int. J. Math. Math. Sci., 2005


  Loading...