Jesús Téllez Isaac

Learn More
Vehicular ad hoc networks (VANETs) have attracted a lot of attention over the last few years. They have become a fundamental component of many intelligent transportation systems and VANETs are being used to improve road safety and enable a wide variety of value-added services. Many forms of attacks against VANETs have emerged recently that attempt to(More)
Vehicular ad hoc networks (VANETs) are envisioned to support the development of a wide range of attractive applications such as payment services which require the design of payment systems that satisfy additional requirements associated with VANETs. The wide range of scenarios (with or without connectivity restriction) arising from vehicle-to-vehicle and(More)
1. The properties of individual excitatory synaptic sites onto adult CA1 hippocampal neurons were investigated using paired pulse minimal stimulation and low noise whole-cell recordings. Non-NMDA receptor-mediated synaptic responses were isolated using a pharmacological blockade of NMDA and GABAA receptors. Amongst the twenty-five stationary ensembles there(More)
Whole-cell voltage-clamped currents were recorded using low resistance patch electrodes containing K+ channel blockers with the local anaesthetic QX-314 (20mM). Under these conditions voltage-gated Na+ conductances and regenerative spiking activity were blocked, leaving Ca2+ conductances. The effect of QX-314 resembled that of extracellular tetrodotoxin but(More)
In this paper we present an anonymous protocol for a mobile payment system based on a Kiosk Centric Case Mobile Scenario where the customer cannot communicate with the issuer due to absence of Internet access with her mobile device and the costs of implementing other mechanism of communication between both of them are high. Our protocol protects the real(More)
Recent advances in m-commerce have raised the usage of scenarios with communication restrictions. These scenarios create new security challenges which must be considered by protocol's designers in order to achieve the same security capabilities as in those protocols designed for mobile payment systems based on a 'Full connectivity' scenario (where all the(More)