Posts by Collection

portfolio

publications

talks

Time series characterization by means of applied symbolic dynamics

Published:

The relationship between the dynamical systems theory and the principles of cryptography was underlined by Shannon in his seminal work about perfect secrecy. Indeed, it is possible to interpret the main requirements of encryption systems by means of general concepts of dynamical systems theory, as the sensitivity to initial conditions/control parameters and the ergodicity property. However, this relationship could imply security flaws when an attacker can link partial information extracted from the encryption process to a subset of the secret keys of the related cryptosystem. In this work we highlight the outcomes of the applied theory of symbolic dynamics as a tool to detect such a vulnerability.

Blockchain Day

Published:

Moderador de la mesa redonda sobre la tecnología blockchain

A Comprehensive Privacy-Respecting Mechanism for Global E-Commerce

Published:

Complexity is inherent in end-to-end e-commerce mechanisms that are currently deployed in the real world. These mechanisms have to deal with various important and diversified aspects of sales and payment processes. While some aspects of e-commerce have been dealt with from a privacy point of view, other aspects have not been addressed, and therefore the complexity of the complete global e-commerce cycle has been ignored. In this talk, we look at the entire transaction flow and support procedures for e-commerce and payments, including all parties and processes within the e-commerce ecosystem. This analysis is intented to designing a comprehensive system by means of privacy-preserving cryptographic tools. Simultaneously, our efforts are on promoting a high flexible methodology by leveraging functionality of existing processes.

teaching

Information security

Undergraduate course, University Antonio de Nebrija, School of Computer Engineering , 2006

drawing

Programming Project

Undergraduate course, Autonomous University of Madrid (UAM), School of Computer Engineering , 2010

drawing

Introduction to Python

Postgraduate course, Autonomous University of Madrid, Forensic and Security Sciences Institute, 2016

drawing drawing2

Android forensics

Postgraduate course, Autonomous University of Madrid, Forensic and Security Sciences Institute, 2016

drawing drawing2

Android Forensics

Postgraduate course, Autonomous University of Madrid, Forensic and Security Sciences Institute, 2016

drawing

Clustering

Postgraduate course, Autonomous University of Madrid, Institute of Health Carlos III, 2017

drawing drawing2

Clustering

Postgraduate course, Autonomous University of Madrid, UAM-IBM Chair, 2022

drawing drawing2