A. Queiruga Dios
University of Salamanca
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by A. Queiruga Dios.
international conference on computational science | 2008
A. Queiruga Dios; L. Hernández Encinas; D. Queiruga
A new experience for teaching Cryptography to engineering students is shown. The aim is to give them a better understanding of secure and cryptographic algorithms by using Maple software, in a graduate-level course. In this paper we discuss how to structure, define, and implement a web-based course as a part of the traditional classes, according to the convergence of the European Higher Education Project. The proposed course facilitates the use of new Information and Communication Technologies.
Cryptologia | 2015
V. Gayoso Martínez; L. Hernández Encinas; A. Queiruga Dios
Abstract The most popular encryption scheme based on elliptic curves is the Elliptic Curve Integrated Encryption Scheme (ECIES), which is included in ANSI X9.63, IEEE 1363a, ISO/IEC 18033-2, and SECG SEC 1. These standards offer many ECIES options, not always compatible, making it difficult to decide what parameters and cryptographic elements to use in a specific deployment scenario. In this work, the authors show that a secure and practical implementation of ECIES can only be compatible with two of the four previously mentioned standards. They also provide the list of functions and options that must be used in such an implementation. Finally, they present the results obtained when testing this ECIES version implemented as a Java application, which allows them to offer some comments about the performance and feasibility of their proposed solution.The most popular encryption scheme based on elliptic curves is the Elliptic Curve Integrated Encryption Scheme ECIES, which is included in ANSI X9.63, IEEE 1363a, ISO/IEC 18033-2, and SECG SEC 1. These standards offer many ECIES options, not always compatible, making it difficult to decide what parameters and cryptographic elements to use in a specific deployment scenario. In this work, the authors show that a secure and practical implementation of ECIES can only be compatible with two of the four previously mentioned standards. They also provide the list of functions and options that must be used in such an implementation. Finally, they present the results obtained when testing this ECIES version implemented as a Java application, which allows them to offer some comments about the performance and feasibility of their proposed solution.
distributed computing and artificial intelligence | 2016
J. Bullón Pérez; A. González Arrieta; A. Hernández Encinas; A. Queiruga Dios
Textile Engineering relies increasingly on the use of computer models that seek to predict the properties and performance of certain textile structures. Those models have been using different computational tools to represent fabrics in a suitable computing environment and also to predict its final properties. Among others, the mathematical models to simulate the behavior of the studied textile structures (yarns, fabrics, kniting and nonwoven). The analysis of textile designs or structures through the Finite Element Method (FEM) has largely facilitated the prediction of their behavior of the textile structure under mechanical loads. For classification problems Artificial Neural Networks (ANNs) have proved to be a very effective tool for a quick and accurate solution. The Case-Based Reasoning (CBR) method is proposed, to complement the results of the those systems where the finite element simulation, mathematical modeling and neural networks can not be applied.
Computers & Mathematics With Applications | 2008
L. Hernández Encinas; J. Muñoz Masqué; A. Queiruga Dios
Vaudenays cryptanalysis against Chor-Rivest cryptosystem is applicable when the parameters, p and h, originally proposed by the authors are used. Nevertheless, if p and h are both prime integers, then Vaudenays attack is not applicable. In this work, a choice of these parameters resistant to the existing cryptanalytic attacks, is presented. The parameters are determined in a suitable range guaranteeing its security and the computational feasibility of implementation. Regrettably, the obtained parameters are scarce in practice.
distributed computing and artificial intelligence | 2016
A. Martín del Rey; A. Hernández Encinas; J.D. Hernández Guillén; J. Martín Vaquero; A. Queiruga Dios; G. Rodríguez Sánchez
In this work a novel mathematical model to simulate malware spreading in wireless sensor networks is introduced. This is an improvement of the global model (based on a system of delayed ordinary differential equations) proposed by Zhu and Zhao in 2015 ([15]). Specifically, our model follows the individual-based paradigm which allows us to consider the particular characteristics and specifications of each element of the model.
international work-conference on the interplay between natural and artificial computation | 2015
A. Martín del Rey; A. Hernández Encinas; J. Martín Vaquero; A. Queiruga Dios; G. Rodríguez Sánchez
The mobile devices, and especially the smartphones, are exposed to the malicious effects of malware. In this sense the study, simulation and control of epidemic processes due to malware is an important issue. The main goal of this work is to introduce a new mathematical model to study the spread of a mobile computer worm. Its dynamic is governed by means of two cellular automata based on logic transition functions. Some computer simulations are shown and analyzed in order to determine how a mobile worm might spread under different conditions.
International Journal of Computer Mathematics | 2009
Seok-Zun Song; R. Durán Díaz; L. Hernández Encinas; J. Muñoz Masqué; A. Queiruga Dios
Let g, h:V×V→ℂ be two non-degenerate symmetric bilinear forms on a finite-dimensional complex vector space V. Let G (resp. H) be the Lie group of isometries of g (resp. h). If the endomorphism L:V→V associated to g, h is diagonalizable, then the dimension of the intersection group G∩H is computed in terms of the dimensions of the eigenspaces of L.
distributed computing and artificial intelligence | 2017
Ángel Martín del Rey; Farrah Kristel Batista; A. Queiruga Dios
The main goal of this work is to propose a new framework to design a novel family of mathematical models to simulate malware spreading in wireless sensor networks (WSNs). An analysis of the proposed models in the scientific literature reveals that the great majority are global models based on systems of ordinary differential equations such that they do not consider the individual characteristics of the sensors and their local interactions. This is a major drawback when WSNs are considered. Taking into account the main characteristics of WSNs (elements and topologies of network, life cycle of the nodes, etc.) it is shown that individual-based models are more suitable for this purpose than global ones. The main features of this new type of malware propagation models for WSNs are stated.
Integrated Computer-aided Engineering | 2016
A. Martín del Rey; A. Hernández Encinas; J. Martín Vaquero; A. Queiruga Dios; G. Rodríguez Sánchez
The main goal of this work is to propose a model for the study and analysis of malware propagation in an industrial critical infrastructure. Specifically, an individual-based mathematical model is introduced and its parameters, variables and equations are explicitly defined and constructed. This model follows the agent based modeling paradigm which makes it extremely suitable for use within the small and heterogeneous environments where individual characteristics of all devices can be captured. The main strengths of this model are its ease of computational implementation (both in hardware and software), and its ability to simulate control measures (which can be of great help for security system administrators); however, this model strongly depends on a proper identification of the parameters.
computational intelligence in security for information systems | 2015
A. Martín del Rey; A. Hernández Encinas; J. Martín Vaquero; A. Queiruga Dios; G. Rodríguez Sánchez
In this work a novel mathematical model to simulate the spatio-temporal spreading of mobile malware is introduced. It is a compartmental model where the mobile devices are grouped into two classes: susceptibles and infected devices, and the malware spreads via bluetooth. There are few models dealing with the spreading of mobile malware using bluetooth connections and all of them only study the temporal evolution. Due to the main characteristics of bluetooth it is of interest to simulate not only the temporal evolution but also the spatial spreading, and consequently, this is the main goal of this work. In our model the global dynamic is governed by means of a system of difference equations and the transmission vector is defined by the bluetooth connections. Explicit conditions for spreading are given in terms of the number of susceptible individuals at a particular time step. These could serve as a basis for design control strategies.