Folding-BSD algorithm for binary sequence decomposition
JL Martin-Navarro, A Fúster-Sabater - Computers, 2020 - mdpi.com
The Internet of Things (IoT) revolution leads to a range of critical services which rely on IoT
devices. Nevertheless, they often lack proper security, becoming the gateway to attack the …
devices. Nevertheless, they often lack proper security, becoming the gateway to attack the …
Review of the lineal complexity calculation through binomial decomposition-based algorithms
JL Martin-Navarro, A Fúster-Sabater - Mathematics, 2021 - mdpi.com
The ubiquity of smart devices and IoT are the main forces behind the development of
cryptographic primitives that preserve the security of this devices, with the resources …
cryptographic primitives that preserve the security of this devices, with the resources …
Review of binomial decomposition-based algorithms for efficient linear complexity computation
JL Martín Navarro, A Fúster Sabater - 2021 - digital.csic.es
The ubiquity of smart devices and IoT are the main forces behind the development of
cryptographic primitives that preserve the security of these devices, with the resource …
cryptographic primitives that preserve the security of these devices, with the resource …
An Operational Concept of an IoT System for the Palletized Distribution Supply Chain
ND Navarro Navarro - 2020 - vtechworks.lib.vt.edu
In recent years, Internet-of-Things technology (IoT) has been the subject of research in a
diverse field of applications, given its essential role in transitioning society towards a more …
diverse field of applications, given its essential role in transitioning society towards a more …
[PDF][PDF] Review of the Lineal Complexity Calculation through Binomial Decomposition-Based Algorithms. Mathematics 2021, 9, 478
JL Martin-Navarro, A Fúster-Sabater - 2021 - academia.edu
The ubiquity of smart devices and IoT are the main forces behind the development of
cryptographic primitives that preserve the security of this devices, with the resources …
cryptographic primitives that preserve the security of this devices, with the resources …