Cyberspace plays nowadays a key role in modern societies and economies, and its protection is a pivotal challenge in national security strategies. Over the last decade, various technological developments have contributed to make our dependency on cyberspace even greater, including the generation and processing of massive amounts of data, the influence of social networks over all activities of our daily lives, or the trend to connect to Internet virtually every realworld device.
Publicaciones
Linearization of Cryptographic SequencesSara D. Cardell, Amparo Fúster-SabaterMartínez Álvarez F., Troncoso Lora A., Sáez Muñoz J., Quintián H., Corchado E. (eds) International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conferhttps://doi.org/10.1007/978-3-030-20005-3_17http://dx.doi.org/ | GiCSI |
Binomial Representation of Cryptographic Binary Sequences and Its Relation to Cellular AutomataSara D. Cardell, Amparo Fúster-SabaterComplexity, 2019, 2108014https://doi.org/10.1155/2019/2108014 | GiCSI |
Double-Loop Wavefront Tilt Correction for Free- Space Quantum Key DistributionA. Ocampos-Guillén, J. Gómez-García, N. Denisenko and V. FernandezIEEE Access, vol. 7, pp. 114033-114041, 2019https://doi.org/10.1109/ACCESS.2019.2933694 | GiCSI |
Randomness Analysis for the Generalized Self- Shrinking SequencesCardell, S.D.; Requena, V.; Fúster-Sabater, A.; Orúe, A.B.Symmetry 2019, 11, 1460https://doi.org/10.3390/sym11121460 | GiCSI |
Binomial Characterization of Cryptographic SequenceSara D. Cardell, Amparo Fúster-SabaterComputational Science and Its Applications – ICCSA 2019, pp. 803- 816. Part of the Lecture Notes in Computer Science book series (LNCS, volume 11619), Springer International Publishinghttps://doi.org/10.1007/978-3-030-24289-3_59 | GiCSI |
Analysis of the Cryptographic Tools for Blockchain and Bitcoin Víctor Gayoso Martínez, Luis Hernández-Álvarez and Luis Hernández Encinas Mathematics 2020, 8(1), 131; 11 pp. https://doi.org/10.3390/math8010131 | GiCSI |
An Improved Bytewise Approximate Matching Algorithm Suitable for Files of Dissimilar Sizes Víctor Gayoso Martínez, Fernando Hernández-Álvarez, Luis Hernández EncinasMathematics 2020, 8(4), 503https://www.mdpi.com/2227-7390/8/4/503 | GiCSI |
A Group Law on the Projective Plane with Applications in Public Key CryptographyRaúl Durán Díaz, Luis Hernández Encinas and Jaime Muñoz MasquéMathematics, 8(5), 734 (2020), 20pp., Special Issue "Mathematics Cryptography and Information Security (Q1, Mathematics, F.I. 1.105) https://doi.org/10.3390/math8050734 | GiCSI |
The Square-Zero Basis of Matrix Lie AlgebrasR. Durán Díaz, V. Gayoso Martínez, L. Hernández Encinas and J. Muñoz MasquéMathematics, 8(6), 1032 (2020), 9 pp., Special Issue “Algebra and Its Applications” (Q1, Mathematics, F.I. 1.747)https://doi.org/10.3390/math8061032 | GiCSI |
NetVote: A Strict-Coercion Resistance Re-Voting Based Internet Voting Scheme with Linear FilteringIñigo Querejeta-Azurmendi, David Arroyo Guardeño, Jorge L. Hernández-Ardieta, and Luis Hernández EncinasMathematics, 8 (9), 1618 (2020), 37 pp., Special Issue "Mathematics Cryptography and Information Security" (Q1, Mathematics, F.I. 1.747) https://doi.org/10.3390/math8091618 | GiCSI |
Linear complexity of generalized sequences by comparison of PN-sequencesFúster-Sabater, A., Cardell, S.D.Revista de la Real Academia de Ciencias Exactas, Físicas y Naturales. Serie A-Matemáticas, vol. 114, pp. 79-97, April 2020https://doi.org/10.1007/s13398-020-00807-5 | GiCSI |
Security Information Sharing in Smart Grids: Persisting Security Audits to the Blockchain Andrés Marín-López, Sergio Chica-Manjarrez, David Arroyo, Florina Almenares-Mendoza, Daniel Díaz-SánchezElectronics 2020, 9(11), 1865https://doi.org/10.3390/electronics9111865 | GiCSI |
A Study of the Reconciliation Mechanism of NewHopeV. Gayoso Martínez, L. Hernández Encinas, and A. Martín MuñozProc. 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS’2020). Advances in Intelligent Systems and Computing 1267, 361–370, A. Herrero, C. Cambra, D. Urda, J.Sedano, H. Quintián, E. Corchado (Eds.)https://doi.org/10.1007/978-3-030-57805-3 | GiCSI |
Randomness Analysis for GSS-sequences ConcatenatedS. D. Cardell, A. Fúster-Sabater, A. B. Orúe, V. RequenaÁ. Herrero et al. (Eds.). 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020). Advances in Intelligent Systems and Computing (AISC), vol. 1267. Springer, Cham, pp. 350-360, 2021https://doi.org/10.1007/978-3-030-57805-3_33 | GiCSI |
An Innovative Linear Complexity Computation for Cryptographic SequencesJ.L. Martín-Navarro, A. Fúster-Sabater, S. D. CardellÁ. Herrero et al. (Eds.). 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020). Advances in Intelligent Systems and Computing (AISC), vol. 1267. Springer, Cham, pp. 339-349, 2021.https://doi.org/10.1007/978-3-030-57805-3_32 | GiCSI |
Folding-BSD Algorithm for Binary Sequence DecompositionJ.L. Martín-Navarro, A. Fúster-SabaterGervasi et al. (Eds.): ICCSA 2020, LNCS 12249, Part I, pp. 345-359, 2020https://doi.org/10.1007/978-3-030-58799-4_26 | GiCSI |
Folding-BSD Algorithm for Binary Sequence DecompositionJ.L. Martin-Navarro, A. Fúster-SabaterComputers, 2020, 9, 100https://doi.org/10.3390/computers9040100 | GiCSI |
Fake News DetectionIgnacio Palacio Marín, David Arroyo13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020), Springer International Publishing, pp. 229-238, 2021https://doi.org/10.1007/978-3-030-57805-3_22 | GiCSI |
Design and implementation of software tools for side channel attacks to cryptographic devicesAlberto Fuentes RodríguezTesis doctoral presentada en la Universidad de Alcalá el 11 de diciembre de 2020 | GiCSI |
Building A blockchain-based decentralized digital asset management system for commercial aircraft leasingPaul Kuhle, David Arroyo, Eric SchusterComputers in Industry, Volume 126, 2021, 103393https://doi.org/10.1016/j.compind.2020.103393 | GiCSI |
Review of the Lineal Complexity Calculation through Binomial Decomposition-Based AlgorithmsJ. L. Martin-Navarro, A. Fúster-SabaterMathematics, vol. 9(5), 478, February 2021https://doi.org/10.3390/math9050478 | GiCSI |
Interleaving Shifted Versions of a PN-SequenceS.D. Cardell, A. Fúster-Sabater, V. RequenaSpecial Issue “Algebra and Number Theory”, Mathematics, vol. 9(6), 687, March 2021https://doi.org/10.3390/math9060687 | GiCSI |
A Compression-Based Method for Detecting Anomalies in Textual DataGonzalo de la Torre-Abaitua, Luis F. Lago-Fernández and David Arroyo Entropy 2021, 23(5), 61https://doi.org/10.3390/e23050618 | GiCSI |
SmartCAMPP - Smartphone-based continuous authentication leveraging motion sensors with privacy preservationLuis Hernández-Álvarez, José María de Fuentes, Lorena González-Manzano, Luis Hernández EncinasPattern Recognition Letters, Volume 147, 2021, Pages 189-196https://doi.org/10.1016/j.patrec.2021.04.013 | GiCSI |
Achieving cybersecurity in blockchain-based systems: A surveyMar Gimenez-Aguilar, Jose Maria de Fuentes, Lorena Gonzalez-Manzano, David ArroyoFuture Generation Computer Systems, Volume 124, 2021, Pages 91-118https://doi.org/10.1016/j.future.2021.05.007 | GiCSI |
Challenges of the market for initial coin offeringsPablo de Andrés, David Arroyo, Ricardo Correia, Alvaro RezolaInternational Review of Financial Analysis, vol. 79 (2022), 101966https://doi.org/10.1016/j.irfa.2021.101966 | GiCSI |
Quadratic maps in two variables on arbitrary fieldsR. Durán Díaz, L. Hernández Encinas and J. Muñoz MasquéCarpathian J. Math. 37, 1 (2021), 91–100 (Q1, Mathematics, F.I. 1.438)https://doi.org/10.37193/CJM.2021.01.09 | GiCSI |
Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A ReviewL. Hernández-Álvarez, J.M. de Fuentes, L. González-Manzano and L. Hernández EncinasSensors, 21(1), 92 (2021), 23 pp., Special Issue “Cryptography and Information Security in Wireless Sensor Networks”https://doi.org/10.3390/s21010092 | GiCSI |
BSD: Algoritmos eficientes para la descomposición binomial de secuencias binariasJ.L. Martín Navarro, A. Fúster SabaterActas de la XVI Reunión Española sobre Criptología y Seguridad de la Información, RECSI XVI, 2021. Josep M. Miret y Francesc Sebé (Eds): pp. 57 - 61, Lleida, 14 – 16 Abril 2021ISBN-13: 978-84-09-29150-2 | GiCSI |
Análisis estadístico del generador de secuencias pseudoaleatorias self-shrinking generalizadoS.D. Cardell, A. Fúster-Sabater, A.B. Orúe, V. RequenaActas de la XVI Reunión Española sobre Criptología y Seguridad de la Información, RECSI XVI, 2021. Josep M. Miret y Francesc Sebé (Eds): pp. 71 - 76, Lleida, 14 – 16 Abril 2021ISBN-13: 978-84-09-29150-2 | GiCSI |
Trustworthy humans and machines Sara Degli-Esposti, David ArroyoTrust and Transparency in an Age of Surveillance, Lora Anne Viola, Paweł Laidler eds., Taylor & Francis Group, London, nov. 2021https://doi.org/10.4324/9781003120827-15 | GiCSI |
Chor-Rivest Knapsack Cryptosystem in a Post-quantum WorldR. Durán Díaz, L. Hernández-Álvarez, Luis Hernández Encinas and A. Queiruga-Dios In: Daimi K., Arabnia H.R., Deligiannidis L., Hwang MS., Tinetti F.G. (eds) Advances in Security, Networks, and Internet of Things. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-030-71017-0_6 | GiCSI |
Criptoanálisis del esquema de dinero cuántico de clave pública de Aaronson y ChristianoM. Conde Pena, L. Hernández Encinas, R. Durán Díaz, J.-C. Faugère, L. PerretActas de la XVI Reunión Española de Criptología y Seguridad de la Información (RECSI 2020), pp. 25-30, J.M. Miret y F. Sebé (Eds.), ISBN: 978-84-09-29150-2, Lérida (Spain), abril 14–16, 2021ISBN: 978-84-09-29150-2 | GiCSI |
Preliminary Analysis of Interleaving PN-SequencesSara D. Cardell, Amparo Fúster-Sabater & Verónica Requena ICCSA 2021: Computational Science and Its Applications – ICCSA 2021 pp 287–297https://doi.org/10.1007/978-3-030-86653-2_21 | GiCSI |
EEG Data for User Authentication with Multi-Class and One-Class ClassifiersL. Hernández-Álvarez, S. Caputo, L. Mucchi, and L. Hernández EncinasActas VII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC'2022), 205-208. J. M. de Fuentes, L. González, J. C. Sancho, A. Ayerbe and M. L. Escalante (Eds.), Bilbao, Junio 27--29, 2022ISBN: 978-84-88734-13-6 | GiCSI |
Biometrics and Artificial Intelligence: Attacks and ChallengesL. Hernández-Álvarez, L. González-Manzano, J.M. Fuentes and L. Hernández Encinaspp. 213–240 in the book “Breakthroughs in Digital Biometrics and Forensics”, Springer, 2022https://doi.org/10.1007/978-3-031-10706-1_10 | GiCSI |
Advancing the Use of Information Compression Distances in Authorship AttributionMuñoz, S.P., Oliva, C., Lago-Fernández, L.F., Arroyo, D. Spezzano, F., Amaral, A., Ceolin, D., Fazio, L., Serra, E. (eds) Disinformation in Open Online Media. MISDOOM 2022. Lecture Notes in Computer Science, vol 13545 . Springer, Cham.https://doi.org/10.1007/978-3-031-18253-2_8 | GiCSI |
Following Negationists on Twitter and Telegram: Application of NCD to the Analysis of Multiplatform Misinformation Dynamicsde Paz, A., Suárez, M., Palmero, S., Degli-Esposti, S., Arroyo, D. In: Bravo, J., Ochoa, S., Favela, J. (eds) Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022). UCAmI 2022. Lecture Notes in Networks and Systems, vol 594. Springer, Cham.https://doi.org/10.1007/978-3-031-21333-5_110 | GiCSI |
A Review on Continuous-Variable Quantum Key Distribution SecurityGarcia-Callejo, A., Ruiz-Chamorro, A., Cano, D., Fernandez, V. In: Bravo, J., Ochoa, S., Favela, J. (eds) Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022). UCAmI 2022. Lecture Notes in Networks and Systems, vol 594. Springer, Cham. https://doi.org/10.1007/978-3-031-21333-5_107 | GiCSI |
Improving LSTMs' under-performance in authorship attribution for short texts Oliva. Christian; Palmero Muñoz, Santiago; Lago-Fernández, Luis F.; Arroyo Guardeño, DavidProceedings of the 2022 European Interdisciplinary Cybersecurity Conferencehttp://hdl.handle.net/10261/268091 | GiCSI |
Enhancing the Anonymity and Auditability of Whistleblowers ProtectionChica, S., Marín, A., Arroyo, D., Díaz, J., Almenares, F., Díaz, D. In: Prieto, J., Benítez Martínez, F.L., Ferretti, S., Arroyo Guardeño, D., Tomás Nevado-Batalla, P. (eds) Blockchain and Applications, 4th International Congress . BLOCKCHAIN 2022. Lecture Notes in Networks and Systems, vol 595. Springer, Cham.https://doi.org/10.1007/978-3-031-21229-1_38 | GiCSI |
Congresos y reuniones, conferencias
Following Negationists on Twitter and Telegram: Application of NCD to the Analysis of Multiplatform Misinformation DynamicsPresentación oral de Paz, A., Suárez, M., Palmero, S., Degli-Esposti, S., Arroyo, D. |
GiCSI |
Advancing the Use of Information Compression Distances in Authorship AttributionConferencia invitada Santiago Palmero Muñoz, Christian Oliva, Luis F Lago-Fernández, David Arroyo 4th Multidisciplinary International Symposium on Disinformation in Open Online Media. MISDOOM2022 11 y 12 de octubre de 2022, Idaho, EE.UU. |
GiCSI |
EEG Data for User Authentication with Multi-Class and One-Class ClassifiersConferencia invitada L. Hernández-Álvarez, S. Caputo, L. Mucchi, and L. Hernández Encinas |
GiCSI |
Improving LSTMs' under-performance in authorship attribution for short textsPresentación de póster Oliva, Christian; Palmero Muñoz, Santiago; Lago-Fernández, Luis F.; Arroyo Guardeño, David |
GiCSI |
El alto precio de lo gratuito. 10 motivos para (pre)ocuparnos de nuestra privacidad en Internet Ponente: David Arroyo Guardeño Jueves, 28 de abril de 2022, 18:00 horas. Centro Cultural Valdebernardo C/ Indalecio Prieto, 21 • Madrid |
GiCSI |
Different approaches for detecting misinformation by means of novel text analysis tools Different approaches for detecting misinformation by means of novel text analysis tools. Ponente: Christian Oliva Moya |
GiCSI |
Enhancing the Anonymity and Auditability of Whistleblowers ProtectionConferencia invitada Chica, S., Marín, A., Arroyo, D., Díaz, J., Almenares, F., Díaz, D. |
GiCSI |
Workshop on Beyond the promises of web3.0: foundations and challenges of trust decentralization (WEB3-TRUST)Organización de congresos Workshop organizado por David Arroyo (ITEFI-CSIC, España) y Jesús Díaz Vico (IOHK, EE.UU.) Deadline: 22 de abril de 2022 Más información: https://www.blockchain-congress.net/workshops/web3-trust
|
GiCSI |
![]() |
Por qué debes saber qué es la Web 3.0 Entrevista a David Arroyo, el 18 de febrero de 2022, sobre el cambio de paradigma que supone la web 3.0, en el podcast "Ideas con Valor" de El Confidencial. El podcast está disponible aquí. |