A light-weight authentication scheme for wireless sensor networks O Delgado-Mohatar, A Fúster-Sabater, JM Sierra Ad Hoc Networks 9 (5), 727-735, 2011 | 132 | 2011 |
The Bitcoin mining breakdown: Is mining still profitable? O Delgado-Mohatar, M Felis-Rota, C Fernández-Herraiz Economics Letters 184, 108492, 2019 | 46 | 2019 |
Blockchain and biometrics: A first look into opportunities and challenges O Delgado-Mohatar, J Fierrez, R Tolosana, R Vera-Rodriguez Blockchain and Applications: International Congress, 169-177, 2020 | 44 | 2020 |
BeCAPTCHA: Behavioral bot detection using touchscreen and mobile sensors benchmarked on HuMIdb A Acien, A Morales, J Fierrez, R Vera-Rodriguez, O Delgado-Mohatar Engineering Applications of Artificial Intelligence 98, 104058, 2021 | 37 | 2021 |
Biometric template storage with blockchain: A first look into cost and performance tradeoffs O Delgado-Mohatar, J Fierrez, R Tolosana, R Vera-Rodriguez Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019 | 32 | 2019 |
Blockchain-based semi-autonomous ransomware O Delgado-Mohatar, JM Sierra-Cámara, E Anguiano Future Generation Computer Systems 112, 589-603, 2020 | 29 | 2020 |
Blockchain meets biometrics: Concepts, application to template protection, and trends O Delgado-Mohatar, J Fierrez, R Tolosana, R Vera-Rodriguez arXiv preprint arXiv:2003.09262, 2020 | 20 | 2020 |
Becaptcha: Bot detection in smartphone interaction using touchscreen biometrics and mobile sensors A Acien, A Morales, J Fierrez, R Vera-Rodriguez, O Delgado-Mohatar arXiv preprint arXiv:2005.13655, 2020 | 19 | 2020 |
Performance evaluation of highly efficient techniques for software implementation of LFSR O Delgado-Mohatar, A Fúster-Sabater, JM Sierra Computers & Electrical Engineering 37 (6), 1222-1231, 2011 | 14 | 2011 |
Blockchain in the Internet of Things: Architectures and implementation O Delgado-Mohatar, R Tolosana, J Fierrez, A Morales 2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020 | 12 | 2020 |
Deterministic computation of pseudorandomness in sequences of cryptographic application A Fúster-Sabater, P Caballero-Gil, O Delgado-Mohatar Computational Science–ICCS 2009: 9th International Conference Baton Rouge …, 2009 | 11 | 2009 |
Software implementation of linear feedback shift registers over extended fields O Delgado-Mohatar, A Fúster-Sabater International Joint Conference CISIS’12-ICEUTE´ 12-SOCO´ 12 Special Sessions …, 2013 | 6 | 2013 |
An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks O Delgado-Mohatar, JM Sierra, L Brankovic, A Fúster-Sabater Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010 | 5 | 2010 |
An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks O Delgado-Mohatar, JM Sierra, L Brankovic, A Fúster-Sabater Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010 | 5 | 2010 |
New directions in online fraud OD Mohatar, JM Sierra Cámara AIP Conference Proceedings 963 (2), 973-976, 2007 | 4 | 2007 |
On the linearity of cryptographic sequence generators A Fuster-Sabater, O Delgado-Mohatar, L Brankovic International Conference on Computational Science and Its Applications, 586-596, 2010 | 3 | 2010 |
On the linearity of cryptographic sequence generators A Fuster-Sabater, O Delgado-Mohatar, L Brankovic International Conference on Computational Science and Its Applications, 586-596, 2010 | 3 | 2010 |
Using New Tools for Certificate Repositories Generation in MANETs C Hernández-Goya, P Caballero-Gil, O Delgado-Mohatar, J Molina-Gil, ... Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working …, 2008 | 3 | 2008 |
Testing Topologies for the Evaluation of IPSec implementations F Sánchez-Chaparro, JM Sierra, O Delgado-Mohatar, A Fúster-Sabater Computational Science and Its Applications–ICCSA 2009: International …, 2009 | 2 | 2009 |
Software implementation of cryptographic sequence generators over extended fields O Delgado-Mohatar, A Fúster-Sabater Logic Journal of IGPL 23 (1), 73-87, 2015 | 1 | 2015 |