Author of the publication

An efficient Security Solution for Dealing with Shortened URL Analysis.

, , , and . WOSIS, page 70-79. SciTePress, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure scheme to share secret color images., , , and . Comput. Phys. Commun., 173 (1-2): 9-16 (2005)A multisecret sharing scheme for color images based on cellular automata., , and . Inf. Sci., 178 (22): 4382-4395 (2008)PUMA: Permission Usage to Detect Malware in Android., , , , , and . CISIS/ICEUTE/SOCO Special Sessions, volume 189 of Advances in Intelligent Systems and Computing, page 289-298. Springer, (2012)Estimation of the control parameter from symbolic sequences: Unimodal maps with variable critical point, , and . (2009)On the inadequacy of the logistic map for cryptographic applications, , and . (2008)Emparejamiento de patrones en medallones de espiral múltiple, , , , , and . (2008)Contribución al estudio de la estructura interna del conjunto de Mandelbrot y aplicaciones en criptografía.. Technical University of Madrid, Spain, (2000)A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks., , , and . CISIS, volume 85 of Advances in Intelligent and Soft Computing, page 135-142. Springer, (2010)Conjuntos de Julia alternados, , , , , and . (2008)Sharing secret color images using cellular automata with memory, , and . CoRR, (2003)