Benefits of Applying Big-Data Tools for Log-Centralisation in SMEs | 0 | 0.34 | 2019 |
Boosting professional competences and IT companies’ innovation in a Master Degree in Informatics Engineering | 0 | 0.34 | 2018 |
Cast as Intended Verifiability for Mixed Array Ballots. | 0 | 0.34 | 2017 |
A privacy-preserving reputation system with user rewards. | 2 | 0.38 | 2017 |
Efficient smart metering based on homomorphic encryption | 4 | 0.44 | 2016 |
Constructing credential-based E-voting systems from offline E-coin protocols. | 3 | 0.45 | 2014 |
Blind Certificates for Secure Electronic Voting | 0 | 0.34 | 2013 |
The Sudoku completion problem with rectangular hole pattern is NP-complete. | 2 | 0.43 | 2012 |
Securing the use of RFID-enabled banknotes | 0 | 0.34 | 2010 |
A secure elliptic curve-based RFID protocol | 10 | 0.65 | 2009 |
Computing the ℓ-power torsion of an elliptic curve over a finite field | 3 | 0.43 | 2009 |
Exploiting Isogeny Cordillera Structure to Obtain Cryptographically Good Elliptic Curves | 1 | 0.37 | 2008 |
Parallel calculation of volcanoes for cryptographic uses | 4 | 0.49 | 2006 |
Determining the 2-Sylow subgroup of an elliptic curve over a finite field | 6 | 1.20 | 2005 |
Sensor networks and distributed CSP: communication, computation and complexity | 32 | 1.81 | 2005 |
Grid-based SensorDCSP | 0 | 0.34 | 2003 |