Skip to main content

Showing 1–7 of 7 results for author: Martin-Fernandez, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2209.12698  [pdf, other

    cs.CR

    QuantumSolver: A quantum tool-set for developers

    Authors: Daniel Escanez-Exposito, Pino Caballero-Gil, Francisco Martin-Fernandez

    Abstract: This paper introduces a new opensource quantum tool-set called QuantumSolver based on Qiskit to help developers without knowledge in quantum computing. The developed library includes a set of algorithms with different features: random number generation, Bernstein-Vazirani algorithm and quantum key distribution using the BB84 protocol. This paper described the main details about the implementation… ▽ More

    Submitted 23 September, 2022; originally announced September 2022.

    Comments: 10 pages, 4 figures, sumited to CAITS, SAM, CSCE, Springer Nature, Indexed by Computing Research and Education (CORE) with ranking C, Indexed by CS Conference Rankings (0.83), Indexed by GII-GRIN in Class WiP

    Journal ref: CAITS, SAM, CSCE. The 2022 World Congress in Computer Science, Computer Engineering, and Applied Computing. CSCE 2022, pg. 149. ISBN # 1-60132-516-9; American Council on Science & Education Las Vegas, USA. July 25-28, 2022

  2. arXiv:2209.11865  [pdf, other

    cs.NI cs.CR

    Revocation management in vehicular ad-hoc networks

    Authors: F Martín-Fernández, P Caballero-Gil, C Caballero-Gil

    Abstract: This paper describes a solution for the efficient management of revocation in vehicular ad-hoc networks, for both certificate-based and identity-based authentication. It proposes the use of an authenticated data structure based on a dynamic hash tree, which is a perfect $k$-ary tree, together with a new version of the SHA-3 hash function. This combination allows optimizing search and insertion ope… ▽ More

    Submitted 23 September, 2022; originally announced September 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2208.05343

    Journal ref: 2015 IEEE Trustcom/BigDataSE/ISPA 1, 1210-1217, 2015

  3. arXiv:2209.11857  [pdf, other

    cs.CR

    Analysis of the new standard hash function

    Authors: F Martín-Fernández, P Caballero-Gil

    Abstract: On 2$^{nd}$ October 2012 the NIST (National Institute of Standards and Technology) in the United States of America announced the new hashing algorithm which will be adopted as standard from now on. Among a total of 73 candidates, the winner was Keccak, designed by a group of cryptographers from Belgium and Italy. The public selection of a new standard of cryptographic hash function SHA (Secure Has… ▽ More

    Submitted 23 September, 2022; originally announced September 2022.

    Journal ref: International Conference on Computer Aided Systems Theory, 142-149, 2013

  4. Poster: Revocation in VANETs Based on k-ary Huffman Trees

    Authors: Francisco Martín-Fernández, Pino Caballero-Gil, Cándido Caballero-Gil

    Abstract: One of the biggest problems of vehicular ad-hoc networks is revocation. The efficient management of such issue has become one of the major paradigms in this area of research. A solution proposed here is based on the use of authenticated data structures like revocation trees to replace the classical and inefficient certificate revocation lists. In particular, the idea of this paper is to propose th… ▽ More

    Submitted 11 August, 2022; originally announced August 2022.

    Journal ref: Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects, pp. 25-26, 2015

  5. Using query frequencies in tree-based revocation for certificateless authentication in VANETs

    Authors: Pino Caballero-Gil, Francisco Martín-Fernández, Cándido Caballero-Gil

    Abstract: Revocation of dishonest users is not an easy problem. This paper proposes a new way to manage revocation of pseudonyms in vehicular ad-hoc networks when using identity-based authentication to increase efficiency and security through certificateless authentication. In order to improve the performance of revocation lists, this paper proposes the use of a data structure based on authenticated dynamic… ▽ More

    Submitted 6 August, 2022; originally announced August 2022.

    Journal ref: The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), pp. 268-273, 2014

  6. arXiv:2208.04733  [pdf

    cs.NI cs.CR

    Secure Implementation of a Vehicular Application for the Symbian Platform

    Authors: F. Martín-Fernández, C. Caballero-Gil, P. Caballero-Gil, J. Molina-Gil

    Abstract: A vehicular ad-hoc network is a type of communication network where the nodes are vehicles. Their aim is to manage traffic efficiently in order to prevent unwanted events such as accidents, jams, etc. The research on this type of networks assumes the use of additional infrastructure installed on the roads, and special devices installed in vehicles. In this paper we propose a novel solution for the… ▽ More

    Submitted 6 August, 2022; originally announced August 2022.

    Journal ref: International Journal on Information Technologies & Security 4(2), 2012

  7. arXiv:2009.07740  [pdf, other

    cs.CL cs.LG cs.PL cs.SE

    Automated Source Code Generation and Auto-completion Using Deep Learning: Comparing and Discussing Current Language-Model-Related Approaches

    Authors: Juan Cruz-Benito, Sanjay Vishwakarma, Francisco Martin-Fernandez, Ismael Faro

    Abstract: In recent years, the use of deep learning in language models gained much attention. Some research projects claim that they can generate text that can be interpreted as human-writing, enabling new possibilities in many application areas. Among the different areas related to language processing, one of the most notable in applying this type of modeling is programming languages. For years, the Machin… ▽ More

    Submitted 12 January, 2021; v1 submitted 16 September, 2020; originally announced September 2020.

    ACM Class: I.2.7; D.3.0