Papers by Daniel Alejandro Maldonado Ruiz

RESUMEN Desde el desarrollo de los sistemas de computacion, se considero necesario diferenciar la... more RESUMEN Desde el desarrollo de los sistemas de computacion, se considero necesario diferenciar las respuestas que provenian tanto de un sistema informatico como de una persona, para que uno no pueda suplantar al otro en ambientes donde solo una persona deba utilizar, lo cual se realizo a traves de CAPTCHA, que es un eficiente arreglo desde el punto de vista criptografico, pero que al paso del tiempo se ha encontrado con los nuevos sistemas de Inteligencia Artificial. Se incluye un breve analisis teorico de las razones de su uso desde el punto de vista de la criptografia, de la evolucion del sistema en su presentacion para los usuarios, haciendo enfasis en los CAPTCHA mas fuertes del mercado. Adicionalmente una revision de la tecnologia que ha permitido vulnerar a cierto nivel al sistema y la evolucion de los sistemas de Inteligencia Artificial que a mediano plazo podrian vulnerar CAPTCHA; para finalmente realizar recomendaciones de como se debe disenar y mantener CAPTCHA fortalecido...
NestedChain: “Blockchain-inside-a-Blockchain” new generation prototype
Annals of telecommunications/Annales des télécommunications, Apr 4, 2024
Zenodo (CERN European Organization for Nuclear Research), Jul 2, 2019
The new generation of security threats has been promoted by digital currencies and real-time appl... more The new generation of security threats has been promoted by digital currencies and real-time applications, where all users develop new ways to communicate on the Internet. Security has evolved in the need of privacy and anonymity for all users and his portable devices. New technologies in every field prove that users need security features integrated into their communication applications, parallel systems for mobile devices, internet, and identity management. This review presents the key concepts of the main areas in computer security and how it has evolved in the last years. This work focuses on cryptography, user authentication, denial of service attacks, intrusion detection and firewalls.
Fundamentals of Blockchain Technology
Springer eBooks, Jul 4, 2022

2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
Network users usually need a third party validation to prove that they are who they claim to be. ... more Network users usually need a third party validation to prove that they are who they claim to be. Authentication systems mostly assume the existence of a Trusted Third Party (TTP) in the form of a Certificate Authority (CA) or as an authentication server. However, relying on a TTP implies that users do not directly manage their identities, but delegate this role to a third party. This intrinsic issue can generate trust concerns (e.g., identity theft), as well as privacy concerns towards the third party. The main objective of this research is to present an autonomous and independent solution where users can store their self created credentials without depending on TTPs. To this aim, the use of an TTP autonomous and independent network is needed, where users can manage and assess their identities themselves. In this paper, we propose the framework called Three Blockchains Identity Management with Elliptic Curve Cryptography (3BI-ECC). With our proposed framework, the users' identities are self-generated and validated by their owners. Moreover, it allows the users to customize the information they want to share with third parties.
The new generation of security threats has beenpromoted by digital currencies and real-time appli... more The new generation of security threats has beenpromoted by digital currencies and real-time applications, whereall users develop new ways to communicate on the Internet.Security has evolved in the need of privacy and anonymity forall users and his portable devices. New technologies in everyfield prove that users need security features integrated into theircommunication applications, parallel systems for mobile devices,internet, and identity management. This review presents the keyconcepts of the main areas in computer security and how it hasevolved in the last years. This work focuses on cryptography,user authentication, denial of service attacks, intrusion detectionand firewalls.

IEEE Access, 2022
Since the emergence of the Bitcoin cryptocurrency, the blockchain technology has become the new I... more Since the emergence of the Bitcoin cryptocurrency, the blockchain technology has become the new Internet tool with which researchers claim to be able to solve any existing online problem. From immutable log ledger applications to authorisation systems applications, the current technological consensus implies that most of Internet problems could be effectively solved by deploying some form of blockchain environment. Regardless this 'consensus', there are decentralised Internet-based applications on which blockchain technology can actually solve several problems and improve the functionality of these applications. The development of these new blockchain-based solutions is grouped into a new paradigm called Blockchain 3.0 and its concepts go far beyond the well-known cryptocurrencies. In this paper, we study the current trends in the application of blockchain on the paradigm of Public Key Infrastructures (PKI). In particular, we focus on how these current trends can guide the exploration of a fully Decentralised Identity System, with blockchain as be part of the core technology.

Over the past few years, we have seen the emergence of a wide range of banking architectures, tec... more Over the past few years, we have seen the emergence of a wide range of banking architectures, technologies, and applications made possible by the significant improvements in hardware, software, and networking technologies. Nowadays, innovative solutions are being developed by banks to leverage the benefits of blockchain, to improve their business agility and performance, and to make their business operations more efficient and secure. However, there are still cases where regular access to Internet is impossible or unreliable due to saturated networks or harsh environments, hence limiting the deployment of typical blockchain based solutions. In this context, an approach using a new connectivity technology is needed in order to increase mobile Internet services for any device to reach nearly 95% of the world population, instantly, simply by drawing on existing mobile phone networks, with no additional infrastructure development. We aim to give the user full bank access from their device, even if the device is not a smart one, using ordinary mobile phone networks. However, providing efficient and secure communications over lossy and low bandwidth networks remains a challenge. The main objective of this paper will be to design an end-to-end and low overhead secure solution for the communications between mobile devices and their corresponding remote application servers that using blockchain via ordinary mobile networks.

Since the development of computer systems, it becomes necessary to differentiate the responses ca... more Since the development of computer systems, it becomes necessary to differentiate the responses came from both a computer system as a person, so that one cannot replace the other in environments where only one person should use, which was made through CAPTCHA, which is an efficient arrangement from the cryptographic viewpoint, but it has found several issues with the new systems of Artificial Intelligence. This Paper includes a brief theoretical analysis of the reasons for their use from the cryptography viewpoint, the evolution of the system in its presentation for the users, focusing on the strongest CAPTCHA in the market. Additionally, a review of the technology that has allowed to break the system at certain level and the evolution of Artificial Intelligence systems in the medium term could defeat CAPTCHA; to finally make recommendations on how to design and maintain a strong CAPTCHA at short and medium term against the evolution of technology and what kind of features should hav...

A Proposal for an Improved Distributed Architecture for OpenPGP's Web of Trust
2018 International Conference on Computational Science and Computational Intelligence (CSCI), 2018
Security and authenticity issues were never considered when e-mail was originally designed and im... more Security and authenticity issues were never considered when e-mail was originally designed and implemented. Along the time, most of electronic mails have been sent between users in a way that any user, intended or not, could read the message or impersonate a sender. To resolve all these issues and maintain the privacy of e-mails was the reason for the creation of PGP and its complements. However, over the years, PGP revealed unexpected security issues when faced to mistrusted environments where we do not know if someone is who claims to be. To overcome this problem, we propose a trust solution for OpenPGP that improves trust relationships between users and the public key distribution network. Our proposal could be implemented in a system using cryptographic technology efficiently in OpenPGP over an all-new trust approach.
2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 2020
Este trabajo está dedicado a aquellas grandes personas que se adelantaron en El Camino, y que en ... more Este trabajo está dedicado a aquellas grandes personas que se adelantaron en El Camino, y que en lugar de dejar un vacío, me dejaron toda su enseñanza, su sabiduría y su fuerza de voluntad, para que yo nunca me deje vencer. Que La Fuerza sea con ellos… Especialmente a mis Abuelos. Gracias, por todo. v CONTENIDO
Este trabajo está dedicado a aquellas grandes personas que se adelantaron en El Camino, y que en ... more Este trabajo está dedicado a aquellas grandes personas que se adelantaron en El Camino, y que en lugar de dejar un vacío, me dejaron toda su enseñanza, su sabiduría y su fuerza de voluntad, para que yo nunca me deje vencer. Que La Fuerza sea con ellos… Especialmente a mis Abuelos. Gracias, por todo. v CONTENIDO
Uploads
Papers by Daniel Alejandro Maldonado Ruiz