• A privacy-preserving key transmission protocol to distribute QRNG keys using zk-SNARKs 

      Soler, David; Dafonte, Carlos; Fernández Veiga, Manuel; Fernández Vilas, Ana; Nóvoa, Francisco (Elsevier B.V., 2024-04)
      [Absctract]: High-entropy random numbers are an essential part of cryptography, and Quantum Random Number Generators (QRNG) are an emergent technology that can provide high-quality keys for cryptographic algorithms but ...
    • AI-based user authentication reinforcement by continuous extraction of behavioral interaction features 

      Garabato, D.; Dafonte, Carlos; Santovena, Raul; Silvelo, Arturo; Nóvoa, Francisco; Manteiga, Minia (Springer, 2022-07)
      [Abstract]: In this work, we conduct an experiment to analyze the feasibility of a continuous authentication method based on the monitorization of the users' activity to verify their identities through specific user profiles ...
    • Auditoría Wi-Fi basada en placas de bajo coste 

      Otero Dans, Anxo; Dafonte, Carlos; Fernández, Diego; Cacheda, Fidel; López-Vizcaíno, Manuel F.; Nóvoa, Francisco (Universidade da Coruña, 2021)
      [Resumen]: En la actualidad, el uso de redes inalámbricas crece exponencialmente en entornos empresariales de todo tipo. Si bien es cierto que existen una gran cantidad de soluciones en el ámbito de auditoría de redes ...
    • Low Cost Automated Security Audit System 

      Fernández-Arruti Gallego, Pedro; Estévez Pereira, Julio Jairo; Nóvoa, Francisco; Dafonte, Carlos; Fernández, Diego (MDPI, 2021)
      [Abstract] In recent years, a quick transition towards digitization has been observed in most organizations. Along with it, certain inherent problems have appeared, such as the increase in cyber threats. Large organizations ...
    • Mouse Behavior Analysis Based on Artificial Intelligence as a Second-Phase Authentication System 

      Garabato, D.; Rodríguez García, Jorge; Nóvoa, Francisco; Dafonte, Carlos (MDPI AG, 2019-08-01)
      [Abstract] Nowadays, a wide variety of computer systems use authentication protocols based on several factors in order to enhance security. In this work, the viability of a second-phase authentication scheme based on users’ ...
    • QKDNetSim+: Improvement of the quantum network simulator for NS-3 

      Soler, David; Cillero Seijas, Iván; Dafonte, Carlos; Fernández Veiga, Manuel; Fernández Vilas, Ana; Nóvoa, Francisco (Elsevier, 2024)
      [Abstract]: The first Quantum Key Distribution (QKD) networks are currently being deployed, but the implementation cost is still prohibitive for most researchers. As such, there is a need for realistic QKD network simulators. ...