Search

Your search keyword '"Guillermo Sosa-Gómez"' showing total 60 results

Search Constraints

Start Over You searched for: Author "Guillermo Sosa-Gómez" Remove constraint Author: "Guillermo Sosa-Gómez"
60 results on '"Guillermo Sosa-Gómez"'

Search Results

1. New Test to Detect Clustered Graphical Passwords in Passpoints Based on the Perimeter of the Convex Hull

2. Practical Improvement in the Implementation of Two Avalanche Tests to Measure Statistical Independence in Stream Ciphers

3. Complexity Reduction in Analyzing Independence between Statistical Randomness Tests Using Mutual Information

4. On the Cryptanalysis of a Simplified AES Using a Hybrid Binary Grey Wolf Optimization

5. A partial evaluation approach for the School Bus Routing Problem

6. On the Fitness Functions Involved in Genetic Algorithms and the Cryptanalysis of Block Ciphers

7. Construction of Boolean Functions from Hermitian Codes

8. Detection of DIAG and LINE Patterns in PassPoints Graphical Passwords Based on the Maximum Angles of Their Delaunay Triangles

9. Using Hadamard transform for cryptanalysis of pseudo-random generators in stream ciphers

10. Algorithm to detect and calculate the cerebrospinal fluid (CSF) through Magnetic Resonance Imaging (MRI)

11. Electronic Voting System Using an Enterprise Blockchain

12. Probabilistic Evaluation of the Exploration–Exploitation Balance during the Search, Using the Swap Operator, for Nonlinear Bijective S-Boxes, Resistant to Power Attacks

13. Matheuristics for the Design of a Multi-Step, Multi-Product Supply Chain with Multimodal Transport

14. Measuring Avalanche Properties on RC4 Stream Cipher Variants

15. Information Theory Based Evaluation of the RC4 Stream Cipher Outputs

16. Search-Space Reduction for S-Boxes Resilient to Power Attacks

17. Study of Parameters in the Genetic Algorithm for the Attack on Block Ciphers

18. Selecting an Effective Entropy Estimator for Short Sequences of Bits and Bytes with Maximum Entropy

19. Test for Detection of Weak Graphic Passwords in Passpoint Based on the Mean Distance between Points

20. A New Family of Boolean Functions with Good Cryptographic Properties

21. Bit Independence Criterion Extended to Stream Ciphers

22. Metaheuristics in the Optimization of Cryptographic Boolean Functions

23. Measuring Independence between Statistical Randomness Tests by Mutual Information

24. Weak PassPoint Passwords Detected by the Perimeter of Delaunay Triangles

28. Evolving Nonlinear S-Boxes With Improved Theoretical Resilience to Power Attacks

29. Conscious Exploration of Alpha-Cuts in the Parametric Solution of the School Bus Routing Problem with Fuzzy Walking Distance

30. Detection of DIAG and LINE Patterns in PassPoints Graphical Passwords Based on the Maximum Angles of Their Delaunay Triangles

31. A partial evaluation approach for the School Bus Routing Problem

32. Matheuristics for the Design of a Multi-Step, Multi-Product Supply Chain with Multimodal Transport

33. Local Search Trajectories over S-box space

34. Study of Parameters in the Genetic Algorithm for the Attack on Block Ciphers

35. Selecting an Effective Entropy Estimator for Short Sequences of Bits and Bytes with Maximum Entropy

36. Test for Detection of Weak Graphic Passwords in Passpoint Based on the Mean Distance between Points

37. Generation of the symmetric group Sn2

38. A New Family of Boolean Functions with Good Cryptographic Properties

39. Analysis of the Number of Sides of Voronoi Polygons in PassPoint

40. Variable Mesh Optimization for Continuous Optimization and Multimodal Problems

41. Effectiveness of Some Tests of Spatial Randomness in the Detection of Weak Graphical Passwords in Passpoint

42. Bit Independence Criterion Extended to Stream Ciphers

43. Measuring Independence between Statistical Randomness Tests by Mutual Information

44. An Application of Hadamard Transform to Test Stream Ciphers

45. An Heuristic Algorithm to Calculate the Minimum Amount of Anesthesia Using MRI

46. Measuring Avalanche Properties on RC4 Stream Cipher Variants

47. Debilidad SAC en el algoritmo de cifrado en flujo RC4

48. Search-Space Reduction for S-Boxes Resilient to Power Attacks

49. A modified Multifractal Detrended Fluctuation Analysis (MFDFA) approach for multifractal analysis of precipitation

50. Algorithm to detect and calculate the cerebrospinal fluid (CSF) through Magnetic Resonance Imaging (MRI)

Catalog

Books, media, physical & digital resources