Magda Valls

Orcid: 0000-0003-1992-146X

According to our database1, Magda Valls authored at least 24 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Residual spatiotemporal convolutional networks for face anti-spoofing.
J. Vis. Commun. Image Represent., March, 2023

2022
An anonymous and unlinkable electronic toll collection system.
Int. J. Inf. Sec., 2022

2021
How Twitter Interactions Leak Political Trends.
Proceedings of the Intelligent Computing, 2021

2019
Benefits of Applying Big-Data Tools for Log-Centralisation in SMEs.
Proceedings of the Information Technology and Systems, 2019

2018
Boosting professional competences and IT companies' innovation in a Master Degree in Informatics Engineering.
Proceedings of the IEEE Frontiers in Education Conference, 2018

2017
A privacy-preserving reputation system with user rewards.
J. Netw. Comput. Appl., 2017

Cast as Intended Verifiability for Mixed Array Ballots.
Proceedings of the Electronic Government and the Information Systems Perspective, 2017

2016
Efficient smart metering based on homomorphic encryption.
Comput. Commun., 2016

2014
Constructing credential-based E-voting systems from offline E-coin protocols.
J. Netw. Comput. Appl., 2014

2013
On Edwards curves and ZVP-attacks.
Appl. Algebra Eng. Commun. Comput., 2013

Blind Certificates for Secure Electronic Voting.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

2012
The Sudoku completion problem with rectangular hole pattern is NP-complete.
Discret. Math., 2012

2010
Securing the Use of RFID-Enabled Banknotes.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
Computing the ℓ-power torsion of an elliptic curve over a finite field.
Math. Comput., 2009

A Secure Elliptic Curve-Based RFID Protocol.
J. Comput. Sci. Technol., 2009

2008
Computing the height of volcanoes of <i>l</i>-isogenies of elliptic curves over finite fields.
Appl. Math. Comput., 2008

Exploiting Isogeny Cordillera Structure to Obtain Cryptographically Good Elliptic Curves.
J. Res. Pract. Inf. Technol., 2008

On Avoiding ZVP-Attacks Using Isogeny Volcanoes.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

2007
Isogeny cordillera algorithm to obtain cryptographically good elliptic curves.
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007

2006
An algorithm to compute volcanoes of 2-isogenies of elliptic curves over finite fields.
Appl. Math. Comput., 2006

Parallel calculation of volcanoes for cryptographic uses.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

2005
Determining the 2-Sylow subgroup of an elliptic curve over a finite field.
Math. Comput., 2005

Sensor networks and distributed CSP: communication, computation and complexity.
Artif. Intell., 2005

2003
Grid-based SensorDCSP.
Proceedings of the IJCAI-03, 2003


  Loading...