Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers., , , and . Computer and Network Security Essentials, Springer, (2018)Achieving cybersecurity in blockchain-based systems: A survey, , , and . Future Generation Computer Systems, (2021)Cryptanalysis of a new chaotic cryptosystem based on ergodicity, , , , and . International Journal of Modern Physics B, 23 (05): 651--659 (2009)Developing new deep-learning model to enhance network intrusion classification, , , and . Evolving Systems, 13 (1): 17--25 (2022)Fair and Accountable Anonymity for the Tor Network., , and . SECRYPT, page 560--565. (2017)Blockchain. Los Libros de la Catarata, (2019)Equivalence between subshrubs and chaotic bands in the Mandelbrot set, , , , and . Discrete Dynamics in Nature and Society, (2006)Drawing and computing external rays in the multiple-spiral medallions of the Mandelbrot set, , , , , and . Computers & Graphics, 32 (5): 597--610 (2008)On the inadequacy of the logistic map for cryptographic applications, , and . arXiv preprint arXiv:0805.4355, (2008)Robust dynamical invariants in sequential neural activity, , , , and . Scientific reports, 9 (1): 1--13 (2019)