-
39Cooperative games with homogeneous groups of participantsTheory and Decision 79 (3): 451-461. 2015.We consider a class of games, which we call “groups’ games”, in which players are partitioned into classes within which players may be considered indistinguishable. We compute explicit formulas for some of the principal values restricted to these games. This is particularly useful for dealing with games with a large number of players where the usual formulas would be impractical to compute. We give several examples that illustrate how this idea may be applied to concrete situations.
-
24Comparing low and medium cost computer-based technologies suitable for cryptographic attacksLogic Journal of the IGPL 27 (2): 177-188. 2019.
-
26Design and optimization of the input modules of a DPA toolboxLogic Journal of the IGPL 24 (1). 2016.
-
3Linear symmetric rankings for TU-gamesTheory and Decision 82 (4): 461-484. 2017.We define ranking as an equivalence relation on the set of power indices and study those that have a linear and symmetric representative. Moreover, we classify—or parametrize—those rankings that reward “positive” payoffs for “positive” participation. It is shown that these are in 1-1 correspondence with the points of the standard simplex. Moreover, this correspondence is convex. Finally, we contrast this classification with Saari–Sieberg’s approach via “positive” semi-values.
-
40Selected papers from the 6th International Conference on Soft Computing Models in Industrial and Environmental ApplicationsJournal of Applied Logic 10 (4): 275-276. 2012.
-
32Two proposals for group signature schemes based on number theory problemsLogic Journal of the IGPL 21 (4): 648-658. 2013.
-
32Using the Spanish national identity card in social networksLogic Journal of the IGPL 28 (4): 519-530. 2020.The distinctive security features of the Spanish electronic national identity card, known as Documento Nacional de Identidad electrónico, allow us to propose the usage of this cryptographic smart card in an authentication framework that can be used during the registration and login phases of internet services where the validation of the user’s age and real identity are key elements, as it is the case for example of the so-called social networks. Using this mechanism with NFC-capable devices, the…Read more
-
20Beliefs About Parent Participation in School Activities in Rural and Urban Areas: Validation of a Scale in MexicoFrontiers in Psychology 11. 2020.
-
26Ironía y Método en la Filosofía de WittgensteinSignos Filosóficos 6 153-165. 2001.Imnically many academics works has been written about an anti-academic philosophy as Mttgenstein S one. The intention of those works has been pmved what looks like a system, but is hidden in the extravagant Wittgenstein k way of write. The aim of this work is expounfl that this stile is a f..
-
18Reseña de "Amor y filosofía en el Cambridge de principios del siglo XX" de Ludwig Wittgenstein y David PinsentSignos Filosóficos 6 317-321. 2001.
Areas of Specialization
Philosophy, Misc |
Philosophical Traditions |
Other Academic Areas |
Areas of Interest
Philosophy, Misc |
Philosophical Traditions |
Other Academic Areas |