Oscar Delgado-Mohatar

According to our database1, Oscar Delgado-Mohatar authored at least 19 papers between 2008 and 2021.

Collaborative distances:

Timeline

2008
2010
2012
2014
2016
2018
2020
0
1
2
3
4
5
1
3
1
2
1
1
2
1
1
2
2
2

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
BeCAPTCHA: Behavioral bot detection using touchscreen and mobile sensors benchmarked on HuMIdb.
Eng. Appl. Artif. Intell., 2021

2020
Blockchain-based semi-autonomous ransomware.
Future Gener. Comput. Syst., 2020

BeCAPTCHA: Bot Detection in Smartphone Interaction using Touchscreen Biometrics and Mobile Sensors.
CoRR, 2020

Blockchain meets Biometrics: Concepts, Application to Template Protection, and Trends.
CoRR, 2020

Blockchain in the Internet of Things: Architectures and Implementation.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
Biometric Template Storage With Blockchain: A First Look Into Cost and Performance Tradeoffs.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019

Blockchain and Biometrics: A First Look into Opportunities and Challenges.
Proceedings of the Blockchain and Applications - International Congress, 2019

2015
Software implementation of cryptographic sequence generators over extended fields.
Log. J. IGPL, 2015

2013
Design of Decimation-Based Sequence Generators over Extended Fields.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2013, 2013

2012
Software Implementation of Linear Feedback Shift Registers over Extended Fields.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

2011
Performance evaluation of highly efficient techniques for software implementation of LFSR.
Comput. Electr. Eng., 2011

A light-weight authentication scheme for wireless sensor networks.
Ad Hoc Networks, 2011

2010
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

On the Linearity of Cryptographic Sequence Generators.
Proceedings of the Computational Science and Its Applications, 2010

2009
Testing Topologies for the Evaluation of IPSEC Implementations.
Proceedings of the Computational Science and Its Applications, 2009

Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application.
Proceedings of the Computational Science, 2009

2008
Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences.
J. Res. Pract. Inf. Technol., 2008

Using New Tools for Certificate Repositories Generation in MANETs.
Proceedings of the Data and Applications Security XXII, 2008

Cellular Automata-Based Structures to Compute the Solutions of Linear Difference Equations.
Proceedings of the Cellular Automata, 2008


  Loading...