Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Honorio Martín"'
Publikováno v:
Data, Vol 9, Iss 5, p 62 (2024)
Legitimate identification of devices is crucial to ensure the security of present and future IoT ecosystems. In this regard, AI-based systems that exploit intrinsic hardware variations have gained notable relevance. Within this context, on-chip senso
Externí odkaz:
https://doaj.org/article/a6c04efff71f4dc78252f5999f12b043
Publikováno v:
Sensors, Vol 19, Iss 9, p 2033 (2019)
Today, medical equipment or general-purpose devices such as smart-watches or smart-textiles can acquire a person’s vital signs. Regardless of the type of device and its purpose, they are all equipped with one or more sensors and often have wireless
Externí odkaz:
https://doaj.org/article/a329eee7e90e4befbefd28f46dfd58e5
Publikováno v:
Sensors, Vol 18, Iss 9, p 2747 (2018)
Wireless Sensor Networks (WSNs) are a promising technology with applications in many areas such as environment monitoring, agriculture, the military field or health-care, to name but a few. Unfortunately, the wireless connectivity of the sensors open
Externí odkaz:
https://doaj.org/article/aba755cc0a7a4afb9cf865b2d08e77e5
Publikováno v:
Journal of Parallel and Distributed Computing. 169:199-210
Autor:
Luis A. García-Astudillo, Almudena Lindoso, Luis Entrena, Honorio Martín, Mario García-Valderas, Pedro Martín-Holgado, Yolanda Morilla
Publikováno v:
IEEE Transactions on Nuclear Science. :1-1
Autor:
Sergio Vinagrero, Honorio Martin, Alice de Bignicourt, Elena-Ioana Vatajelu, Giorgio Di Natale
Publikováno v:
Scientific Data, Vol 10, Iss 1, Pp 1-9 (2023)
Abstract Large-scale parameter characterization of Physical Unclonable Functions (PUFs) is of paramount importance in order to assess the quality and thus the suitability of such PUFs which would then be developed as an industrial-grade solution for
Externí odkaz:
https://doaj.org/article/0e77fc73934e4fcebcb8ee03784392fd
Publikováno v:
IEEE Access, Vol 10, Pp 20643-20651 (2022)
Error mitigation techniques, such as Triple Modular Redundancy, introduce very large overheads. To alleviate this overhead, approximate techniques can be used. In this work we propose a novel approximate error mitigation technique based on using redu
Externí odkaz:
https://doaj.org/article/0b5f66f2009040ad84b71ad3101b7b81
Publikováno v:
IEEE Access, Vol 8, Pp 8821-8833 (2020)
Multi-Party Non-Interactive Key Exchange (MP-NIKE) is a fundamental cryptographic primitive in which users register into a key generation centre and receive a public/private key pair each. After that, any subset of these users can compute a shared ke
Externí odkaz:
https://doaj.org/article/5647c55713ea41fa9a5c4349076599f5
Publikováno v:
IEEE Access, Vol 8, Pp 71642-71651 (2020)
The Internet of Things (IoT) is more and more a reality, and every day the number of connected objects increases. The growth is practically exponential -there are currently about 8 billion and expected to reach 21 billion in 2025. The applications of
Externí odkaz:
https://doaj.org/article/f2140015ebda4dfe9201396c3bbb480f
Autor:
Honorio Martín Izquierdo
Publikováno v:
Estudio Agustiniano. 14:449-503