Остановите войну!
for scientists:
default search action
Luis Hernández Encinas
Publications
- 2022
- [c36]Araceli Queiruga Dios, Juan José Bullón Pérez, Luis Hernández Encinas:
Self-Sovereign Identity in University Context. FRUCT 2022: 1-6 - 2021
- [j34]Victor Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, Araceli Queiruga Dios:
Using Free Mathematical Software in Engineering Classes. Axioms 10(4): 253 (2021) - 2016
- [c25]Araceli Queiruga Dios, Ascensión Hernández Encinas, Jesús Martín-Vaquero, Luis Hernández Encinas:
Malware Propagation Models in Wireless Sensor Networks: A Review. SOCO-CISIS-ICEUTE 2016: 648-657 - [c23]Araceli Queiruga Dios, Ascensión Hernández Encinas, Gerardo Rodríguez Sánchez, Ángel Martín del Rey, Jesús Martín-Vaquero, Luis Hernández Encinas:
Case study: Malware propagation models for undergraduate engineering students. TEEM 2016: 931-935 - 2015
- [j20]Victor Gayoso Martínez, Luis Hernández Encinas, A. Queiruga Dios:
Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme. Cryptologia 39(3): 244-269 (2015) - 2013
- [c18]Victor Gayoso Martínez, Luis Hernández Encinas, Ascensión Hernández Encinas, Araceli Queiruga Dios:
Disclosure of Sensitive Information in the Virtual Learning Environment Moodle. SOCO-CISIS-ICEUTE 2013: 517-526 - 2010
- [c9]Victor Gayoso Martínez, Ascensión Hernández Encinas, Luis Hernández Encinas, Araceli Queiruga Dios, Isabel Visus Ruiz:
Development of Capstone Projects on Secure Communications for Engineering Students. Security and Management 2010: 516-522 - 2009
- [j16]Seok-Zun Song, Raúl Durán Díaz, Luis Hernández Encinas, Jaime Muñoz Masqué, A. Queiruga Dios:
Dimension of the intersection of a pair of orthogonal groups. Int. J. Comput. Math. 86(10&11): 1678-1683 (2009) - [j15]Luis Hernández Encinas, Jaime Muñoz Masqué, A. Queiruga Dios:
Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range. Inf. Sci. 179(24): 4219-4226 (2009) - 2008
- [j14]Luis Hernández Encinas, Jaime Muñoz Masqué, A. Queiruga Dios:
Safer parameters for the Chor-Rivest cryptosystem. Comput. Math. Appl. 56(11): 2883-2886 (2008) - [c5]A. Queiruga Dios, Luis Hernández Encinas, D. Queiruga:
Cryptography Adapted to the New European Area of Higher Education. ICCS (2) 2008: 706-714 - 2006
- [c4]Luis Hernández Encinas, Jaime Muñoz Masqué, A. Queiruga Dios:
Maple Implementation of the Chor-Rivest Cryptosystem. International Conference on Computational Science (2) 2006: 438-445 - 2003
- [j4]Luis Hernández Encinas, Jaime Muñoz Masqué, A. Queiruga Dios:
Large decryption exponents in RSA. Appl. Math. Lett. 16(3): 293-295 (2003) - [i1]Luis Hernández Encinas, Jaime Muñoz Masqué, A. Queiruga Dios:
An algorithm to obtain an RSA modulus with a large private key. IACR Cryptol. ePrint Arch. 2003: 45 (2003)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint