Zobrazeno 1 - 10
of 54
pro vyhledávání: '"Arturo Diaz‐Perez"'
Autor:
Abner Perez-Haro, Arturo Diaz-Perez
Publikováno v:
Information, Vol 15, Iss 1, p 45 (2024)
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrat
Externí odkaz:
https://doaj.org/article/c3ee1c403a73492e917b354ad9daa21a
Autor:
J. L. Gonzalez-Compean, Victor J. Sosa-Sosa, Arturo Diaz-Perez, Jesus Carretero, Ricardo Marcelin-Jimenez
Publikováno v:
International Journal of Digital Earth, Vol 11, Iss 7, Pp 730-751 (2018)
Earth observation satellites produce large amounts of images/data that not only must be processed and preserved in reliable geospatial platforms but also efficiently disseminated among partners/researchers for creating derivative products through col
Externí odkaz:
https://doaj.org/article/a754b541478b47eea1b4d19a6d22d545
Publikováno v:
IEEE Access, Vol 6, Pp 72514-72550 (2018)
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in industry and academy from different perspectives. Some of these aspects include mathematical foundations, protocol design, curve generation, security proofs,
Externí odkaz:
https://doaj.org/article/2b422b2415b9489d967b74f0b03b378c
Publikováno v:
Entropy, Vol 23, Iss 9, p 1216 (2021)
One of the main problems in graph analysis is the correct identification of relevant nodes for spreading processes. Spreaders are crucial for accelerating/hindering information diffusion, increasing product exposure, controlling diseases, rumors, and
Externí odkaz:
https://doaj.org/article/e834571a4f784d5ebda1a5e3e3fa9c93
Publikováno v:
Sensors, Vol 19, Iss 3, p 720 (2019)
Making Elliptic Curve Cryptography (ECC) available for the Internet of Things (IoT) and related technologies is a recent topic of interest. Modern IoT applications transfer sensitive information which needs to be protected. This is a difficult task d
Externí odkaz:
https://doaj.org/article/c7e3f8bcc0664e0f8da1c601c4ccc990
Publikováno v:
IEEE Embedded Systems Letters. 15:73-76
Publikováno v:
Machine Learning Techniques and Analytics for Cloud Security. :379-415
Publikováno v:
2022 IEEE Mexican International Conference on Computer Science (ENC).
Publikováno v:
Entropy
Volume 23
Issue 9
Entropy, Vol 23, Iss 1216, p 1216 (2021)
Volume 23
Issue 9
Entropy, Vol 23, Iss 1216, p 1216 (2021)
One of the main problems in graph analysis is the correct identification of relevant nodes for spreading processes. Spreaders are crucial for accelerating/hindering information diffusion, increasing product exposure, controlling diseases, rumors, and
Publikováno v:
2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4).
Binary Edwards curves (BEC) over finite fields can be used as an additive cyclic elliptic curve group to enable elliptic curve cryptography (ECC), where the most time consuming is scalar multiplication. This operation is computed by means of the grou