Guillermo Morales-Luna
Orcid: 0000-0001-6800-4081
According to our database1,
Guillermo Morales-Luna
authored at least 84 papers
between 1985 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Comput., 2021
2020
J. Inf. Hiding Multim. Signal Process., 2020
Towards BIMAX: Binary Inclusion-MAXimal Parallel Implementation for Gene Expression Analysis Alejandra.
Computación y Sistemas, 2020
2019
Proceedings of the 16th International Conference on Electrical Engineering, 2019
Proceedings of the 24th Conference of Open Innovations Association, 2019
Information theoretical secure key sharing protocol for noiseless public constant parameter channels without cryptographic assumptions.
Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, 2019
2018
Secret Key Sharing Protocol between Units Connected by Wireless MIMO Fading Channels.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018
2017
CoRR, 2017
Proceedings of the Computer Network Security, 2017
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 2017
2016
Design of High Speed Stegosystem Based on Trellis Codes Jointly with Generalised Viterbi Algorithm.
Int. J. Comput. Sci. Appl., 2016
Computación y Sistemas, 2016
Partitioning of complex networks for heterogeneous computing: A methodological approach.
Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control, 2016
Secret key agreement based on a communication through wireless MIMO-based fading channels.
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016
Accelerating All-Sources BFS Metrics on Multi-core Clusters for Large-Scale Complex Network Analysis.
Proceedings of the High Performance Computing - Third Latin American Conference, 2016
2015
An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 6th International Conference on Information, 2015
Proceedings of the 12th International Conference on Electrical Engineering, 2015
Using the generalised Viterbi algorithm to achieve a highly effective stegosystem for images.
Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, 2015
2014
Synthesis Lectures on Quantum Computing, Morgan & Claypool Publishers, ISBN: 978-3-031-02519-8, 2014
Comput. Sci. Inf. Syst., 2014
Proceedings of the 5th International Conference on Information, 2014
2013
Int. J. Comput. Sci. Appl., 2013
Proceedings of the 18th International Conference on Digital Signal Processing, 2013
Fingerprinting System for Still Images Based on the Use of a Holographic Transform Domain.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013
2012
J. Inf. Hiding Multim. Signal Process., 2012
Int. J. Comput. Sci. Appl., 2012
Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries.
Proceedings of the Computer Network Security, 2012
Proceedings of the 11th Mexican International Conference on Artificial Intelligence, 2012
Proceedings of the Federated Conference on Computer Science and Information Systems, 2012
2011
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna
CoRR, 2011
Proceedings of the 8th International Conference on Electrical Engineering, 2011
Proceedings of the 8th International Conference on Electrical Engineering, 2011
Proceedings of the 8th International Conference on Electrical Engineering, 2011
Proceedings of the Federated Conference on Computer Science and Information Systems, 2011
2010
Int. J. Comput. Sci. Appl., 2010
IACR Cryptol. ePrint Arch., 2010
Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary
CoRR, 2010
Proceedings of the Language and Automata Theory and Applications, 2010
Proceedings of the International Multiconference on Computer Science and Information Technology, 2010
2009
Computación y Sistemas, 2009
Collusion-resistant fingerprints based on the use of superimposed codes in real vector spaces.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2009
2008
Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions With Parameter Optimization.
IEEE Trans. Inf. Theory, 2008
On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems.
Trans. Data Hiding Multim. Secur., 2008
Low-Complexity Bit-Parallel Square Root Computation over GF(2^{m}) for All Trinomials.
IEEE Trans. Computers, 2008
Simulation for bulk synchronous parallel superstep task assignment in desktop grids characterised by gaussian parameter distributions.
Multiagent Grid Syst., 2008
Proceedings of the MICAI 2008: Advances in Artificial Intelligence, 2008
2007
Parallel Itoh-Tsujii multiplicative inversion algorithm for a special class of trinomials.
Des. Codes Cryptogr., 2007
Proceedings of the Reconfigurable Computing: Architectures, 2007
2006
Low Complexity Bit-Parallel Square Root Computation over GF(2<sup>m</sup>) for all Trinomials.
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
A Solution to the Information Retrieval Problem in Desktop Grid Task Assignment Using the Force Field Model.
Proceedings of the 2006 International Conference on Grid Computing & Applications, 2006
2005
Proceedings of the 2005 International Conference on Reconfigurable Computing and FPGAs, 2005
Proceedings of the MICAI 2005: Advances in Artificial Intelligence, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Design of the Force Field Task Assignment Method and Associated Performance Evaluation for Desktop Grids.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005
2004
Proceedings of the MICAI 2004: Advances in Artificial Intelligence, 2004
2003
IEEE Signal Process. Lett., 2003
Proceedings of the Computer Network Security, 2003
Proceedings of the 4th Mexican International Conference on Computer Science (ENC 2003), 2003
2002
Digital Semipublic Watermarking.
Informatica (Slovenia), 2002
Proceedings of the MICAI 2002: Advances in Artificial Intelligence, 2002
Proceedings of the Advances in Artificial Intelligence, 2002
2001
Proceedings of the Information Security, 4th International Conference, 2001
Proceedings of the Information Hiding, 4th International Workshop, 2001
1991
J. Symb. Comput., 1991
1985