default search action
David Arroyo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c22]Paolo Rosso, Berta Chulvi, Damir Korencic, Mariona Taulé, Xavier Bonet Casals, David Camacho, Ángel Panizo, David Arroyo, Juan Gómez, Francisco Rangel:
XAI-DisInfodemics: eXplainable AI for disinformation and conspiracy detection during infodemics. SEPLN (Projects and Demonstrations) 2024: 59-64 - [i15]José Manuel Camacho, Aitor Couce Vieira, David Arroyo, David Ríos Insua:
A Cybersecurity Risk Analysis Framework for Systems with Artificial Intelligence Components. CoRR abs/2401.01630 (2024) - [i14]Juha Nurmi, Arttu Paju, Billy Bob Brumley, Tegan Insoll, Anna K. Ovaska, Valeriia Soloveva, Nina Vaaranen-Valkonen, Mikko Aaltonen, David Arroyo:
Investigating child sexual abuse material availability, searches, and users on the anonymous Tor network for a public health intervention strategy. CoRR abs/2404.14112 (2024) - [i13]Constantinos Patsakis, David Arroyo, Fran Casino:
The Malware as a Service ecosystem. CoRR abs/2405.04109 (2024) - 2023
- [c21]Paul Kuhle, David Arroyo, Pablo de Andrés:
Analyzing the Effectiveness of Native Token Airdrop Campaigns in NFT Marketplaces. BLOCKCHAIN 2023: 383-393 - [c20]David Arroyo, Sara Degli-Esposti, Alberto Gómez-Espés, Santiago Palmero Muñoz, Luis Pérez-Miguel:
On the Design of a Misinformation Widget (MsW) Against Cloaked Science. NSS 2023: 385-396 - [e1]José Manuel F. Machado, Javier Prieto, Paulo Vieira, Hugo Peixoto, António Abelha, David Arroyo, Luigi Vigneri:
Blockchain and Applications, 5th International Congress, BLOCKCHAIN 2023, Guimaraes, Portugal, 12-14 July 2023. Lecture Notes in Networks and Systems 778, Springer 2023, ISBN 978-3-031-45154-6 [contents] - 2022
- [j15]Hanane Azzaoui, Akram Zine Eddine Boukhamla, David Arroyo, Bensayah Abdellah:
Developing new deep-learning model to enhance network intrusion classification. Evol. Syst. 13(1): 17-25 (2022) - [c19]Christian Oliva, Ignacio Palacio Marín, Luis Fernando Lago-Fernández, David Arroyo:
Rumor and clickbait detection by combining information divergence measures and deep learning techniques. ARES 2022: 16:1-16:6 - [c18]Sergio Chica-Manjarrez, Andrés Marín, David Arroyo, Jesus Diaz, Florina Almenáres, Daniel Díaz Sánchez:
Enhancing the Anonymity and Auditability of Whistleblowers Protection. BLOCKCHAIN 2022: 413-422 - [c17]Christian Oliva, Santiago Palmero Muñoz, Luis Fernando Lago-Fernández, David Arroyo:
Improving LSTMs' under-performance in Authorship Attribution for short texts. EICC 2022: 99-101 - [c16]Santiago Palmero Muñoz, Christian Oliva, Luis Fernando Lago-Fernández, David Arroyo:
Advancing the Use of Information Compression Distances in Authorship Attribution. MISDOOM 2022: 114-122 - [c15]Alfonso de Paz, Manuel Suárez, Santiago Palmero Muñoz, Sara Degli-Esposti, David Arroyo:
Following Negationists on Twitter and Telegram: Application of NCD to the Analysis of Multiplatform Misinformation Dynamics. UCAmI 2022: 1110-1116 - 2021
- [j14]Paul Kuhle, David Arroyo, Eric Schuster:
Building A blockchain-based decentralized digital asset management system for commercial aircraft leasing. Comput. Ind. 126: 103393 (2021) - [j13]Gonzalo de la Torre-Abaitua, Luis Fernando Lago-Fernández, David Arroyo:
A Compression-Based Method for Detecting Anomalies in Textual Data. Entropy 23(5): 618 (2021) - [j12]Mar Gimenez-Aguilar, José María de Fuentes, Lorena González-Manzano, David Arroyo:
Achieving cybersecurity in blockchain-based systems: A survey. Future Gener. Comput. Syst. 124: 91-118 (2021) - 2020
- [j11]Gonzalo de la Torre-Abaitua, Luis Fernando Lago-Fernández, David Arroyo:
On the application of compression-based metrics to identifying anomalous behaviour in web traffic. Log. J. IGPL 28(4): 546-557 (2020) - [c14]Ismael Arribas, David Arroyo, Denisa Reshef Kera:
Sandbox for Minimal Viable Governance of Blockchain Services and DAOs: CLAUDIA. BLOCKCHAIN 2020: 24-30 - [c13]Ignacio Palacio Marín, David Arroyo:
Fake News Detection - Do Complex Problems Need Complex Solutions? CISIS 2020: 229-238 - [c12]Veronica Fernandez, Amalia Beatriz Orúe López, David Arroyo:
Securing Blockchain with Quantum Safe Cryptography: When and How? CISIS 2020: 371-379
2010 – 2019
- 2019
- [c11]Jesús Iglesias García, Jesus Diaz, David Arroyo:
Hyot: Leveraging Hyperledger for Constructing an Event-Based Traceability System in IoT. CISIS-ICEUTE 2019: 195-204 - [p3]Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodríguez, Moti Yung:
A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions. Advances in Cyber Security 2019: 143-183 - [i12]Gonzalo de la Torre-Abaitua, Luis Fernando Lago-Fernández, David Arroyo:
A compression based framework for the detection of anomalies in heterogeneous data sources. CoRR abs/1908.00417 (2019) - 2018
- [c10]Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodríguez, Moti Yung:
Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs. CSCML 2018: 206-226 - [p2]Alejandro Sanchez-Gomez, Jesus Diaz, Luis Hernández Encinas, David Arroyo:
Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers. Computer and Network Security Essentials 2018: 263-281 - 2017
- [j10]David Arroyo, Fernando Hernandez, Amalia Beatriz Orúe López:
Cryptanalysis of a Classical Chaos-Based Cryptosystem with Some Quantum Cryptography Features. Int. J. Bifurc. Chaos 27(1): 1750004:1-1750004:12 (2017) - [c9]Jesus Diaz, David Arroyo, Francisco B. Rodríguez:
Fair and Accountable Anonymity for the Tor Network. SECRYPT 2017: 560-565 - [c8]Gonzalo de la Torre-Abaitua, Luis Fernando Lago-Fernández, David Arroyo:
A Parameter-Free Method for the Detection of Web Attacks. SOCO-CISIS-ICEUTE 2017: 661-671 - [c7]Alejandro Sanchez-Gomez, Jesus Diaz, David Arroyo:
Encrypted Cloud: A Software Solution for the Secure Use of Free-Access Cloud Storage Services. SOCO-CISIS-ICEUTE 2017: 683-692 - 2016
- [i11]David Arroyo, Fernando Hernandez, Amalia Beatriz Orúe López:
Cryptanalysis of a Classical chaos-based cryptosystem with some quantum cryptography features. CoRR abs/1610.08475 (2016) - [i10]Alejandro Sanchez-Gomez, Jesus Diaz, David Arroyo:
Combining Usability and Privacy Protection in Free-Access Public Cloud Storage Servers: Review of the Main Threats and Challenges. CoRR abs/1610.08727 (2016) - 2015
- [c6]David Arroyo, Jesus Diaz, Francisco de Borja Rodríguez:
Non-conventional Digital Signatures and Their Implementations - A Review. CISIS-ICEUTE 2015: 425-435 - [c5]David Arroyo, Jesus Diaz, Víctor Gayoso:
On the Difficult Tradeoff Between Security and Privacy: Challenges for the Management of Digital Identities. CISIS-ICEUTE 2015: 455-462 - [c4]Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco de Borja Rodríguez, Moti Yung:
Privacy Threats in E-Shopping (Position Paper). DPM/QASA@ESORICS 2015: 217-225 - [i9]Jesus Diaz, David Arroyo, Francisco de Borja Rodríguez:
libgroupsig: An extensible C library for group signatures. IACR Cryptol. ePrint Arch. 2015: 1146 (2015) - 2014
- [j9]David Arroyo, Gonzalo Álvarez:
Application of Gray codes to the study of the theory of symbolic dynamics of unimodal maps. Commun. Nonlinear Sci. Numer. Simul. 19(7): 2345-2353 (2014) - [j8]Jesus Diaz, David Arroyo, Francisco de Borja Rodríguez:
New X.509-based mechanisms for fair anonymity management. Comput. Secur. 46: 111-125 (2014) - [j7]Jesus Diaz, David Arroyo, Francisco de Borja Rodríguez:
A formal methodology for integral security design and verification of network protocols. J. Syst. Softw. 89: 87-98 (2014) - [j6]Jesus Diaz, David Arroyo, Francisco de Borja Rodríguez:
On securing online registration protocols: Formal verification of a new proposal. Knowl. Based Syst. 59: 149-158 (2014) - [c3]Jesus Diaz, David Arroyo, Francisco de Borja Rodríguez:
Methodological Security Verification of a Registration Protocol. SOCO-CISIS-ICEUTE 2014: 453-462 - [i8]Jesus Diaz, David Arroyo, Francisco de Borja Rodríguez:
Fair anonymity for the Tor network. CoRR abs/1412.4707 (2014) - 2013
- [j5]David Arroyo, Roberto Latorre, Pablo Varona, Francisco B. Rodríguez:
Application of symbolic dynamics to characterize coordinated activity in the context of biological neural networks. J. Frankl. Inst. 350(10): 2967-2981 (2013) - [j4]David Arroyo, Jesus Diaz, Francisco de Borja Rodríguez:
Cryptanalysis of a one round chaos-based Substitution Permutation Network. Signal Process. 93(5): 1358-1364 (2013) - 2012
- [c2]Jesus Diaz, David Arroyo, Francisco de Borja Rodríguez:
Anonymity Revocation through Standard Infrastructures. EuroPKI 2012: 112-127 - [i7]Jesus Diaz, David Arroyo, Francisco de Borja Rodríguez:
Formal security analysis of registration protocols for interactive systems: a methodology and a case of study. CoRR abs/1201.1134 (2012) - [i6]Jesus Diaz, David Arroyo, Francisco de Borja Rodríguez:
A formal methodology for integral security design and verification of network protocols. CoRR abs/1201.5666 (2012) - [i5]David Arroyo, Jesus Diaz, Francisco de Borja Rodríguez:
Cryptanalysis of a one round chaos-based Substitution Permutation Network. CoRR abs/1203.6866 (2012) - 2011
- [c1]Jesus Diaz, David Arroyo, Francisco de Borja Rodríguez:
An Approach for Adapting Moodle into a Secure Infrastructure. CISIS 2011: 214-221 - [p1]Gonzalo Álvarez, José María Amigó, David Arroyo, Shujun Li:
Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers. Chaos-Based Cryptography 2011: 257-295 - 2010
- [j3]Chengqing Li, David Arroyo, Kwok-Tung Lo:
Breaking a Chaotic Cryptographic Scheme Based on Composition Maps. Int. J. Bifurc. Chaos 20(8): 2561-2568 (2010)
2000 – 2009
- 2009
- [j2]G. Pastor, M. Romera, Gonzalo Álvarez, David Arroyo, A. B. Orue, Veronica Fernandez, Fausto Montoya Vitini:
A general view of pseudoharmonics and pseudoantiharmonics to calculate external arguments of Douady and Hubbard. Appl. Math. Comput. 213(2): 484-497 (2009) - [i4]Chengqing Li, David Arroyo, Kwok-Tung Lo:
Breaking a Chaotic Cryptographic Scheme Based on Composition Maps. CoRR abs/0907.3177 (2009) - 2008
- [j1]M. Romera, Gonzalo Álvarez, David Arroyo, A. B. Orue, Veronica Fernandez, G. Pastor:
Drawing and computing external rays in the multiple-spiral medallions of the Mandelbrot set. Comput. Graph. 32(5): 597-610 (2008) - [i3]David Arroyo, Gonzalo Álvarez, Veronica Fernandez:
A Basic Framework for the Cryptanalysis of Digital Chaos-Based Cryptography. CoRR abs/0811.1859 (2008) - 2007
- [i2]David Arroyo, Chengqing Li, Shujun Li, Gonzalo Álvarez, Wolfgang A. Halang:
Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm. CoRR abs/0710.5465 (2007) - [i1]David Arroyo, Chengqing Li, Shujun Li, Gonzalo Álvarez:
Cryptanalysis of a computer cryptography scheme based on a filter bank. CoRR abs/0710.5471 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint