default search action
Pedro Peris-Lopez
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j65]Alberto Ramos, Honorio Martín, Carmen Camara, Pedro Peris-Lopez:
Stimulated Microcontroller Dataset for New IoT Device Identification Schemes through On-Chip Sensor Monitoring. Data 9(5): 62 (2024) - [j64]Caterina Fuster-Barceló, Alejandro Guerrero-López, Carmen Camara, Pedro Peris-Lopez:
Exploring the power of photoplethysmogram matrix for atrial fibrillation detection with integrated explainability. Eng. Appl. Artif. Intell. 133: 108325 (2024) - 2023
- [j63]Carmen Camara, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri:
ECG Identification Based on the Gramian Angular Field and Tested with Individuals in Resting and Activity States. Sensors 23(2): 937 (2023) - [c30]Pedro Peris-Lopez, Caterina Fuster-Barceló, Carmen Camara, Honorio Martín:
Unveiling Hidden Patterns: Harnessing the Power of Short PPG-Traces for Atrial Fibrillation Detection. BSN 2023: 1-4 - [i9]Caterina Fuster-Barceló, Carmen Camara, Pedro Peris-López:
Unleashing the Power of Electrocardiograms: A novel approach for Patient Identification in Healthcare Systems with ECG Signals. CoRR abs/2302.06529 (2023) - 2022
- [j62]Carmen Camara, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri:
ECGsound for human identification. Biomed. Signal Process. Control. 72(Part): 103335 (2022) - [j61]Caterina Fuster-Barceló, Pedro Peris-Lopez, Carmen Camara:
ELEKTRA: ELEKTRokardiomatrix application to biometric identification with convolutional neural networks. Neurocomputing 506: 37-49 (2022) - [j60]Morteza Adeli, Nasour Bagheri, Honorio Martín, Pedro Peris-Lopez:
Challenging the security of "A PUF-based hardware mutual authentication protocol". J. Parallel Distributed Comput. 169: 199-210 (2022) - [j59]Nasour Bagheri, Saru Kumari, Carmen Camara, Pedro Peris-Lopez:
Defending Industry 4.0: An Enhanced Authentication Scheme for IoT Devices. IEEE Syst. J. 16(3): 4501-4512 (2022) - [c29]Pablo de Juan Fidalgo, Carmen Camara, Pedro Peris-Lopez:
Generation and Classification of Illicit Bitcoin Transactions. UCAmI 2022: 1086-1097 - 2021
- [j58]Carmen Camara, Pedro Peris-Lopez, José María de Fuentes, Samuel Marchal:
Access Control for Implantable Medical Devices. IEEE Trans. Emerg. Top. Comput. 9(3): 1126-1138 (2021) - [j57]Masoumeh Safkhani, Carmen Camara, Pedro Peris-Lopez, Nasour Bagheri:
RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing. Veh. Commun. 28: 100311 (2021) - [i8]Majid Salimi, Hamid Mala, Honorio Martín, Pedro Peris-Lopez:
Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange. CoRR abs/2103.06170 (2021) - 2020
- [j56]Majid Salimi, Hamid Mala, Honorio Martín, Pedro Peris-Lopez:
Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange. IEEE Access 8: 8821-8833 (2020) - [j55]Carmen Camara, Honorio Martín, Pedro Peris-Lopez, Luis Entrena:
A True Random Number Generator Based on Gait Data for the Internet of You. IEEE Access 8: 71642-71651 (2020) - [j54]Lara Ortiz-Martin, Pablo Picazo-Sanchez, Pedro Peris-Lopez:
Are the Interpulse Intervals of an ECG signal a good source of entropy? An in-depth entropy analysis based on NIST 800-90B recommendation. Future Gener. Comput. Syst. 105: 346-360 (2020)
2010 – 2019
- 2019
- [j53]Lara Ortiz-Martin, Pablo Picazo-Sanchez, Pedro Peris-Lopez, Juan Tapiador, Gerardo Schneider:
Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors. Future Gener. Comput. Syst. 96: 283-296 (2019) - [j52]Seyed Farhad Aghili, Hamid Mala, Mohammad Shojafar, Pedro Peris-Lopez:
LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT. Future Gener. Comput. Syst. 96: 410-424 (2019) - [j51]José María de Fuentes, Lorena González-Manzano, Javier López, Pedro Peris-Lopez, Kim-Kwang Raymond Choo:
Editorial: Security and Privacy in Internet of Things. Mob. Networks Appl. 24(3): 878-880 (2019) - [j50]Carmen Camara, Honorio Martín, Pedro Peris-Lopez, Mu'awya Naser:
Design and Analysis of a True Random Number Generator Based on GSR Signals for Body Sensor Networks. Sensors 19(9): 2033 (2019) - 2018
- [j49]Carmen Camara, Pedro Peris-Lopez, Lorena González-Manzano, Juan E. Tapiador:
Real-time electrocardiogram streams for continuous authentication. Appl. Soft Comput. 68: 784-794 (2018) - [j48]Lara Ortiz-Martin, Pablo Picazo-Sanchez, Pedro Peris-Lopez, Juan E. Tapiador:
Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals. Entropy 20(2): 94 (2018) - [j47]Honorio Martín, Pedro Martín-Holgado, Pedro Peris-Lopez, Yolanda Morilla, Luis Entrena:
On the Entropy of Oscillator-Based True Random Number Generators under Ionizing Radiation. Entropy 20(7): 513 (2018) - [j46]Pedro Peris-Lopez, Lorena González-Manzano, Carmen Camara, José María de Fuentes:
Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things. Future Gener. Comput. Syst. 81: 67-77 (2018) - [j45]Carmen Camara, Pedro Peris-Lopez, Honorio Martín, Mu'awya Naser:
ECG-RNG: A Random Number Generator Based on ECG Signals and Suitable for Securing Wireless Sensor Networks. Sensors 18(9): 2747 (2018) - [j44]Jorge Blasco, Pedro Peris-Lopez:
On the Feasibility of Low-Cost Wearable Sensors for Multi-Modal Biometric Verification. Sensors 18(9): 2782 (2018) - [j43]Seyed Farhad Aghili, Hamid Mala, Pedro Peris-Lopez:
Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol. Sensors 18(11): 3663 (2018) - [c28]Raquel Tabuyo-Benito, Hayretdin Bahsi, Pedro Peris-Lopez:
Forensics Analysis of an On-line Game over Steam Platform. ICDF2C 2018: 106-127 - 2017
- [j42]José María de Fuentes, Lorena González-Manzano, Juan E. Tapiador, Pedro Peris-Lopez:
PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing. Comput. Secur. 69: 127-141 (2017) - [j41]Lorena González-Manzano, José María de Fuentes, Pedro Peris-Lopez, Carmen Camara:
Encryption by Heart (EbH) - Using ECG for time-invariant symmetric key generation. Future Gener. Comput. Syst. 77: 136-148 (2017) - [j40]Honorio Martín, Pedro Peris-López, Enrique San Millán, Juan E. Tapiador:
A lightweight implementation of the Tav-128 hash function. IEICE Electron. Express 14(11): 20161255 (2017) - 2016
- [j39]Jorge Blasco, Thomas M. Chen, Juan E. Tapiador, Pedro Peris-Lopez:
A Survey of Wearable Biometric Recognition Systems. ACM Comput. Surv. 49(3): 43:1-43:35 (2016) - [j38]Lorena González-Manzano, José María de Fuentes, Sergio Pastrana, Pedro Peris-Lopez, Luis Hernández Encinas:
PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things. J. Netw. Comput. Appl. 71: 59-71 (2016) - [j37]Honorio Martín, Pedro Peris-Lopez, Juan E. Tapiador, Enrique San Millán:
A New TRNG Based on Coherent Sampling With Self-Timed Rings. IEEE Trans. Ind. Informatics 12(1): 91-100 (2016) - [c27]Sergio Pastrana, Juan E. Tapiador, Guillermo Suarez-Tangil, Pedro Peris-López:
AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices. DIMVA 2016: 58-77 - 2015
- [j36]José María de Fuentes, Pedro Peris-Lopez, Juan E. Tapiador, Sergio Pastrana:
Probabilistic yoking proofs for large scale IoT systems. Ad Hoc Networks 32: 43-52 (2015) - [j35]Sergio Pastrana, Juan E. Tapiador, Agustín Orfila, Pedro Peris-Lopez:
DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks. Comput. Networks 80: 66-88 (2015) - [j34]Carmen Camara, Pedro Peris-Lopez, Juan E. Tapiador:
Security and privacy issues in implantable medical devices: A comprehensive survey. J. Biomed. Informatics 55: 272-289 (2015) - [j33]Carmen Camara, Pedro Peris-Lopez, Juan E. Tapiador:
Human Identification Using Compressed ECG Signals. J. Medical Syst. 39(11): 148:1-148:10 (2015) - [j32]Jorge Blasco Alís, Juan E. Tapiador, Pedro Peris-Lopez, Guillermo Suarez-Tangil:
Hindering data theft with encrypted data trees. J. Syst. Softw. 101: 147-158 (2015) - [j31]Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez, Sergio Pastrana:
Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation. Pervasive Mob. Comput. 18: 137-151 (2015) - [j30]Pablo Picazo-Sanchez, Lara Ortiz-Martin, Pedro Peris-Lopez, Nasour Bagheri:
Weaknesses of fingerprint-based mutual authentication protocol. Secur. Commun. Networks 8(12): 2124-2134 (2015) - [c26]Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez:
Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach. NSS 2015: 63-77 - [c25]Alejandro Calleja, Pedro Peris-Lopez, Juan E. Tapiador:
Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols. WISTP 2015: 36-51 - [e1]Gabriel Ghinita, Pedro Peris-Lopez:
2015 International Workshop on Secure Internet of Things, SIoT 2015, Vienna, Austria, September 21-25, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7769-0 [contents] - 2014
- [j29]Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez, Arturo Ribagorda:
Evolution, Detection and Analysis of Malware for Smart Devices. IEEE Commun. Surv. Tutorials 16(2): 961-987 (2014) - [j28]David F. Barrero, Julio César Hernández Castro, Pedro Peris-Lopez, David Camacho, María Dolores Rodríguez-Moreno:
A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol. Expert Syst. J. Knowl. Eng. 31(1): 9-19 (2014) - [j27]Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez, Jorge Blasco Alís:
Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families. Expert Syst. Appl. 41(4): 1104-1117 (2014) - [j26]Masoumeh Safkhani, Pedro Peris-Lopez, Julio César Hernández Castro, Nasour Bagheri:
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 259: 571-577 (2014) - [j25]Sergio Pastrana, Agustín Orfila, Juan E. Tapiador, Pedro Peris-Lopez:
Randomized Anagram revisited. J. Netw. Comput. Appl. 41: 182-196 (2014) - [j24]Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador:
Weaknesses in a new ultralightweight RFID authentication protocol with permutation - RAPP. Secur. Commun. Networks 7(6): 945-949 (2014) - [j23]Pablo Picazo-Sanchez, Juan E. Tapiador, Pedro Peris-López, Guillermo Suarez-Tangil:
Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks. Sensors 14(12): 22619-22642 (2014) - [j22]Honorio Martín, Pedro Peris-Lopez, Juan E. Tapiador, Enrique San Millán:
An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms. IEEE Trans. Ind. Informatics 10(2): 1216-1225 (2014) - [c24]Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez:
Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps. Inscrypt 2014: 496-515 - [c23]Robert M. Seepers, Christos Strydis, Pedro Peris-Lopez, Ioannis Sourdis, Chris I. De Zeeuw:
Peak misdetection in heart-beat-based security: Characterization and tolerance. EMBC 2014: 5401-5405 - [c22]Guillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, Pedro Peris-Lopez:
Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models. ESORICS (1) 2014: 183-201 - 2013
- [j21]Aikaterini Mitrokotsa, Pedro Peris-Lopez, Christos Dimitrakakis, Serge Vaudenay:
On Selecting the Nonce Length in Distance-Bounding Protocols. Comput. J. 56(10): 1216-1227 (2013) - [j20]Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador:
Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6". IEEE Commun. Lett. 17(4): 805-807 (2013) - [j19]Pablo Picazo-Sanchez, Nasour Bagheri, Pedro Peris-Lopez, Juan E. Tapiador:
Two RFID Standard-based Security Protocols for Healthcare Environments. J. Medical Syst. 37(5): 9962 (2013) - [j18]Christos Strydis, Robert M. Seepers, Pedro Peris-Lopez, Dimitrios Siskos, Ioannis Sourdis:
A system architecture, processor, and communication protocol for secure implants. ACM Trans. Archit. Code Optim. 10(4): 57:1-57:23 (2013) - [j17]Pablo Picazo-Sanchez, Lara Ortiz-Martin, Pedro Peris-Lopez, Julio César Hernández Castro:
Cryptanalysis of the RNTS system. J. Supercomput. 65(2): 949-960 (2013) - 2012
- [j16]Julio César Hernández Castro, Juan M. Estévez-Tapiador, Pedro Peris-Lopez, John A. Clark, El-Ghazali Talbi:
Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. Int. J. Found. Comput. Sci. 23(2): 543-553 (2012) - [j15]Juan E. Tapiador, Julio C. Hernandez-Castro, Pedro Peris-Lopez:
Online Randomization Strategies to Obfuscate User Behavioral Patterns. J. Netw. Syst. Manag. 20(4): 561-578 (2012) - [j14]Sergio Pastrana, Aikaterini Mitrokotsa, Agustín Orfila, Pedro Peris-Lopez:
Evaluation of classification algorithms for intrusion detection in MANETs. Knowl. Based Syst. 36: 217-225 (2012) - [j13]Pedro Peris-Lopez, Agustín Orfila, Esther Palomar, Julio C. Hernandez-Castro:
A secure distance-based RFID identification protocol with an off-line back-end database. Pers. Ubiquitous Comput. 16(3): 351-365 (2012) - [c21]Masoumeh Safkhani, Pedro Peris-Lopez, Nasour Bagheri, Majid Naderi, Julio César Hernández Castro:
On the Security of Tan et al. Serverless RFID Authentication and Search Protocols. RFIDSec 2012: 1-19 - [c20]Masoumeh Safkhani, Nasour Bagheri, Pedro Peris-Lopez, Aikaterini Mitrokotsa, Julio C. Hernandez-Castro:
Weaknesses in another Gen2-based RFID authentication protocol. RFID-TA 2012: 80-84 - [c19]Masoumeh Safkhani, Nasour Bagheri, Pedro Peris-Lopez, Aikaterini Mitrokotsa:
On the traceability of tags in SUAP RFID authentication protocols. RFID-TA 2012: 292-296 - [c18]Julio César Hernández Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Another Fallen Hash-Based RFID Authentication Protocol. WISTP 2012: 29-37 - [i7]Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador:
Cryptanalysis of RAPP, an RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2012: 702 (2012) - 2011
- [j12]Mu'awya Naser, Pedro Peris-Lopez, Rahmat Budiarto, Benjamín Ramos Álvarez:
A note on the security of PAP. Comput. Commun. 34(18): 2248-2249 (2011) - [j11]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Jan C. A. van der Lubbe:
Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Eng. Appl. Artif. Intell. 24(6): 1061-1069 (2011) - [j10]Pedro Peris-Lopez, Agustín Orfila, Aikaterini Mitrokotsa, Jan C. A. van der Lubbe:
A comprehensive RFID solution to enhance inpatient medication safety. Int. J. Medical Informatics 80(1): 13-24 (2011) - [j9]Pedro Peris-Lopez, Agustín Orfila, Julio C. Hernandez-Castro, Jan C. A. van der Lubbe:
Flaws on RFID grouping-proofs. Guidelines for future sound protocols. J. Netw. Comput. Appl. 34(3): 833-845 (2011) - [c17]Julio César Hernández Castro, Pedro Peris-Lopez, Jean-Philippe Aumasson:
On the Key Schedule Strength of PRESENT. DPM/SETOP 2011: 253-263 - [c16]Jean-Philippe Aumasson, Aikaterini Mitrokotsa, Pedro Peris-Lopez:
A Note on a Privacy-Preserving Distance-Bounding Protocol. ICICS 2011: 78-92 - [c15]Honorio Martín, Enrique San Millán, Luis Entrena, Julio César Hernández Castro, Pedro Peris-Lopez:
AKARI-X: A pseudorandom number generator for secure lightweight systems. IOLTS 2011: 228-233 - [c14]Mohamad Merhi, Julio César Hernández Castro, Pedro Peris-Lopez:
Studying the pseudo random number generator of a low-cost RFID tag. RFID-TA 2011: 381-385 - [i6]Juan E. Tapiador, Julio C. Hernandez-Castro, Pedro Peris-Lopez, John A. Clark:
Cryptanalysis of Song's advanced smart card based password authentication protocol. CoRR abs/1111.2744 (2011) - [i5]Masoumeh Safkhani, Pedro Peris-Lopez, Julio César Hernández Castro, Nasour Bagheri, Majid Naderi:
Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems. IACR Cryptol. ePrint Arch. 2011: 331 (2011) - 2010
- [j8]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Tieyan Li, Yingjiu Li:
Vulnerability analysis of RFID protocols for tag ownership transfer. Comput. Networks 54(9): 1502-1508 (2010) - [j7]Aikaterini Mitrokotsa, Christos Dimitrakakis, Pedro Peris-Lopez, Julio César Hernández Castro:
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Commun. Lett. 14(2): 121-123 (2010) - [j6]Pedro Peris-Lopez, Tieyan Li, Julio C. Hernandez-Castro:
Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. IEICE Trans. Inf. Syst. 93-D(3): 518-527 (2010) - [c13]Pedro Peris-Lopez, Julio César Hernández Castro, Raphael C.-W. Phan, Juan M. Estévez-Tapiador, Tieyan Li:
Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol. Inscrypt 2010: 427-442 - [c12]Pedro Peris-Lopez, Enrique San Millán, Jan C. A. van der Lubbe, Luis Entrena:
Cryptographically secure pseudo-random bit generator for RFID tags. ICITST 2010: 1-6 - [c11]Julio César Hernández Castro, Pedro Peris-Lopez, Raphael C.-W. Phan, Juan M. Estévez-Tapiador:
Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol. RFIDSec 2010: 22-34 - [i4]Mu'awya Naser, Pedro Peris-Lopez, Mohammd Rafie, Jan C. A. van der Lubbe:
Vulnerability Analysis of PAP for RFID Tags. CoRR abs/1008.3625 (2010)
2000 – 2009
- 2009
- [j5]Pedro Peris-Lopez, Tieyan Li, Julio C. Hernandez-Castro, Juan E. Tapiador:
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. Comput. Commun. 32(7-10): 1185-1193 (2009) - [j4]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Comput. Stand. Interfaces 31(1): 88-97 (2009) - [j3]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Comput. Stand. Interfaces 31(2): 372-380 (2009) - [j2]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. J. Inf. Sci. Eng. 25(1): 33-57 (2009) - [c10]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Tieyan Li, Jan C. A. van der Lubbe:
Weaknesses in Two Recent Lightweight RFID Authentication Protocols. Inscrypt 2009: 383-392 - [c9]Julio C. Hernandez-Castro, Juan E. Tapiador, Pedro Peris-Lopez, John A. Clark, El-Ghazali Talbi:
Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol. IPDPS 2009: 1-5 - [c8]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Enrique San Millán, Jan C. A. van der Lubbe:
Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments. SEWCN 2009: 25-35 - [i3]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jan C. A. van der Lubbe:
Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks. CoRR abs/0906.4618 (2009) - [i2]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Jan C. A. van der Lubbe:
Security Flaws in a Recent Ultralightweight RFID Protocol. CoRR abs/0910.2115 (2009) - 2008
- [j1]Juan M. Estévez-Tapiador, Julio César Hernández Castro, Pedro Peris-Lopez, Arturo Ribagorda:
Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. J. Inf. Sci. Eng. 24(5): 1485-1504 (2008) - [c7]Pedro Peris-Lopez, Tong-Lee Lim, Tieyan Li:
Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework. EUC (2) 2008: 159-166 - [c6]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. WISA 2008: 56-68 - [i1]Julio César Hernández Castro, Juan M. Estévez-Tapiador, Pedro Peris-Lopez, Jean-Jacques Quisquater:
Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations. CoRR abs/0811.4257 (2008) - 2007
- [c5]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. EUC Workshops 2007: 781-794 - [c4]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags. SECPerU 2007: 55-60 - 2006
- [c3]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
RFID Systems: A Survey on Security Threats and Proposed Solutions. PWC 2006: 159-170 - [c2]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. OTM Workshops (1) 2006: 352-361 - [c1]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. UIC 2006: 912-923
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint