34 results on '"J. Carlos Mex-Perera"'
Search Results
2. Providing traffic tolerance in optical packet switching networks: a reinforcement learning approach.
3. A Low-Cost Jamming Detection Approach Using Performance Metrics in Cluster-Based Wireless Sensor Networks.
4. The use of ellipse-based estimator as a sub-key distinguisher for Side-Channel Analysis.
5. GCM implementations of Camellia-128 and SMS4 by optimizing the polynomial multiplier.
6. An efficient Multi-Parent Hierarchical routing protocol for WSNs.
7. Merging the Camellia, SMS4 and AES S-Boxes in a Single S-Box with Composite Bases.
8. Some Representations of the S-Box of Camellia in GF(((22)2)2).
9. On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks.
10. Hybrid Method for Detecting Masqueraders Using Session Folding and Hidden Markov Models.
11. Using PCA to Improve the Generation of Speech Keys.
12. Parameter Optimization in a Text-Dependent Cryptographic-Speech-Key Generation Task.
13. Cryptographic-Speech-Key Generation Architecture Improvements.
14. Phoneme Spotting for Speech-Based Crypto-key Generation.
15. Cryptographic-Speech-Key Generation Using the SVM Technique over the lp-Cepstral Speech Space.
16. SVM Applied to the Generation of Biometric Speech Key.
17. On the MAC/Network/Energy Performance Evaluation of Wireless Sensor Networks: Contrasting MPH, AODV, DSR and ZTR Routing Protocols.
18. Self-healing in transparent optical packet switching mesh networks: A reinforcement learning perspective.
19. Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers.
20. Analyzing Log Files for Postmortem Intrusion Detection.
21. Masquerade attacks based on user's profile.
22. New Detection Paradigms to Improve Wireless Sensor Network Performance under Jamming Attacks.
23. Cryptanalysis of a summation generator with 2-bit memory.
24. MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks.
25. A Low-Cost Jamming Detection Approach Using Performance Metrics in Cluster-Based Wireless Sensor Networks
26. Providing traffic tolerance in optical packet switching networks: a reinforcement learning approach
27. Multi-speaker voice cryptographic key generation.
28. On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks
29. MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks
30. On the MAC/Network/Energy Performance Evaluation of Wireless Sensor Networks: Contrasting MPH, AODV, DSR and ZTR Routing Protocols
31. New Detection Paradigms to Improve Wireless Sensor Network Performance under Jamming Attacks
32. Some Representations of the S-Box of Camellia in GF(((22)2)2)
33. Using PCA to Improve the Generation of Speech Keys
34. SVM Applied to the Generation of Biometric Speech Key
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.